HomeSort by relevance Sort by last modified time
    Searched refs:rand_s (Results 1 - 10 of 10) sorted by null

  /external/chromium/base/
rand_util_win.cc 16 CHECK_EQ(rand_s(&number), 0);
sync_socket_win.cc 53 if (rand_s(&rnd_name) != 0)
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.h 35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
eap_sake_common.h 59 const u8 *rand_s; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
eap_sake_common.c 31 attr->rand_s = pos + 2;
251 * @rand_s: 16-byte RAND_S
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
304 * @rand_s: 16-byte RAND_S
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 24 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
143 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
157 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s
    [all...]
eap_sake.c 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
211 if (!attr.rand_s) {
217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
218 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
219 data->rand_s, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p
    [all...]
  /external/srtp/crypto/rng/
rand_source.c 115 errno_t err = rand_s(&val);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
64 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) {
69 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
70 data->rand_s, EAP_PSK_RAND_LEN);
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
298 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
309 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN)
    [all...]
eap_server_sake.c 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
164 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) {
169 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
170 data->rand_s, EAP_SAKE_RAND_LEN);
183 data->rand_s, EAP_SAKE_RAND_LEN);
215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
361 data->rand_s, data->rand_p,
364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 96 milliseconds