/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, 24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
|
milenage.c | 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, 44 tmp1[i] = _rand[i] ^ opc[i]; 80 * @_rand: RAND = 128-bit random challenge 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, 96 tmp1[i] = _rand[i] ^ opc[i]; 166 * @_rand: RAND = 128-bit random challenge 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 91 const u8 *_rand);
|
eap_sim_db.c | 841 * @_rand: Buffer for RAND values 861 u8 *_rand, u8 *kc, u8 *sres, 902 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 26 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, 28 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
|
pcsc_funcs.c | 1212 * @_rand: 16-byte RAND value from HLR/AuC 1224 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 68 u8 _rand[16]; member in struct:gsm_triplet 351 if (strlen(pos) != 32 || hexstr2bin(pos, g->_rand, 16)) { 643 u8 _rand[16], sres[4], kc[8]; local 645 if (random_get_bytes(_rand, 16) < 0) 647 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 653 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); 672 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); 719 u8 _rand[EAP_AKA_RAND_LEN]; local 731 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) 742 milenage_generate(m->opc, m->amf, m->ki, m->sqn, _rand, 795 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 869 unsigned char _rand[16]; local 913 os_memset(_rand, 0, sizeof(_rand)); 914 if (scard_gsm_auth(scard, _rand, sres, kc)) 917 os_memset(_rand, 0xff, sizeof(_rand)); 918 if (scard_gsm_auth(scard, _rand, sres, kc)) 978 unsigned char _rand[16]; local 1013 os_memset(_rand, i, sizeof(_rand)); [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/style/checkers/ |
cpp_unittest.py | [all...] |