/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 60 const u8 *rand_p; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 41 if (aes_128_encrypt_block(kdk, rand_p, hash))
|
eap_psk_common.h | 43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
eap_sake_common.c | 40 attr->rand_p = pos + 2; 252 * @rand_p: 16-byte RAND_P 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 305 * @rand_p: 16-byte RAND_P [all...] |
/external/chromium_org/third_party/smhasher/src/ |
Random.h | 72 void rand_p ( void * blob, int bytes ) function in struct:Rand 99 inline void rand_p ( void * blob, int bytes ) function
|
AvalancheTest.h | 43 r.rand_p(&K,keybytes); 131 r.rand_p(&key,keybytes); 267 r.rand_p(&key,keybytes); 375 r.rand_p(&key,keybytes);
|
DifferentialTest.h | 156 r.rand_p(&k1,sizeof(keytype)); 196 rand_p(&keys[i],sizeof(keytype)); 265 r.rand_p(&k,sizeof(keytype));
|
KeysetTest.cpp | 107 r.rand_p(buffer1,buflen); 108 r.rand_p(buffer2,buflen); 178 r.rand_p(key,32);
|
SpeedTest.cpp | 181 r.rand_p(block,blocksize); 190 r.rand_p(block,blocksize);
|
KeysetTest.h | 12 #include "Random.h" // for rand_p 268 r.rand_p(cycle,cycleLen);
|
Bitvec.cpp | 687 r.rand_p(&k,nbytes);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 317 if (!attr.rand_p || !attr.mic_p) { 323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); 346 data->rand_s, data->rand_p, 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
eap_server_psk.c | 24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 112 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN); 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 293 resp->rand_p, EAP_PSK_RAND_LEN); 294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 296 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 309 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { 144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 228 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 226 data->rand_p, EAP_SAKE_RAND_LEN); 242 data->rand_s, data->rand_p, 257 data->rand_p, EAP_SAKE_RAND_LEN); 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|