Home
last modified time | relevance | path

Searched refs:_rand (Results 1 - 25 of 34) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dmilenage.c29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument
44 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f1()
80 * @_rand: RAND = 128-bit random challenge
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f2345() argument
96 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f2345()
166 * @_rand: RAND = 128-bit random challenge
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate()
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate()
185 milenage_f2345(opc, k, _rand, re in milenage_generate()
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument
208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) milenage_auts() argument
235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) gsm_milenage() argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument
[all...]
H A Dmilenage.h13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand,
22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand,
24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dmilenage.c29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument
44 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f1()
80 * @_rand: RAND = 128-bit random challenge
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f2345() argument
96 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f2345()
166 * @_rand: RAND = 128-bit random challenge
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate()
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate()
185 milenage_f2345(opc, k, _rand, re in milenage_generate()
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument
208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) milenage_auts() argument
235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) gsm_milenage() argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument
[all...]
H A Dmilenage.h13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand,
22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand,
24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
H A Dhlr_auc_gw.c76 u8 _rand[16]; member
344 hexstr2bin(pos, g->_rand, 16)) { in read_gsm_triplets()
617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local
619 if (random_get_bytes(_rand, 16) < 0) in sim_req_auth()
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth()
627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); in sim_req_auth()
646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); in sim_req_auth()
684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local
686 if (hexstr2bin(pos, _rand, 16) != 0) in gsm_auth_req()
688 gsm_milenage(m->opc, m->ki, _rand, sre in gsm_auth_req()
738 u8 _rand[EAP_AKA_RAND_LEN]; aka_req_auth() local
814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; aka_auts() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
H A Dhlr_auc_gw.c76 u8 _rand[16]; member
344 hexstr2bin(pos, g->_rand, 16)) { in read_gsm_triplets()
617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local
619 if (random_get_bytes(_rand, 16) < 0) in sim_req_auth()
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth()
627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); in sim_req_auth()
646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); in sim_req_auth()
684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local
686 if (hexstr2bin(pos, _rand, 16) != 0) in gsm_auth_req()
688 gsm_milenage(m->opc, m->ki, _rand, sre in gsm_auth_req()
738 u8 _rand[EAP_AKA_RAND_LEN]; aka_req_auth() local
814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; aka_auts() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_sim_db.h42 u8 *_rand, u8 *kc, u8 *sres,
86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
91 const u8 *_rand);
H A Deap_sim_db.c907 * @_rand: Buffer for RAND values
927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets()
968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); in eap_sim_db_get_gsm_triplets()
1373 * @_rand: Buffer for RAND value
1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth()
1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
1480 * @_rand: RAND value used in the rejected message
1491 const u8 *auts, const u8 *_rand) in eap_sim_db_resynchronize()
1531 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) eap_sim_db_get_gsm_triplets() argument
1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) eap_sim_db_resynchronize() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_sim_db.h42 u8 *_rand, u8 *kc, u8 *sres,
86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
91 const u8 *_rand);
H A Deap_sim_db.c907 * @_rand: Buffer for RAND values
927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets()
968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); in eap_sim_db_get_gsm_triplets()
1373 * @_rand: Buffer for RAND value
1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth()
1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
1480 * @_rand: RAND value used in the rejected message
1491 const u8 *auts, const u8 *_rand) in eap_sim_db_resynchronize()
1531 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) eap_sim_db_get_gsm_triplets() argument
1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) eap_sim_db_resynchronize() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_sake_common.c335 u8 _rand[2 * EAP_SAKE_RAND_LEN]; in eap_sake_compute_mic() local
357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic()
372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
373 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, in eap_sake_compute_mic()
382 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen, in eap_sake_compute_mic()
H A Deap_pwd_common.h73 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_sake_common.c335 u8 _rand[2 * EAP_SAKE_RAND_LEN]; in eap_sake_compute_mic() local
357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic()
372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
373 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, in eap_sake_compute_mic()
382 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen, in eap_sake_compute_mic()
H A Deap_pwd_common.h73 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Dpcsc_funcs.h19 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand,
21 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
H A Dpcsc_funcs.c1229 * @_rand: 16-byte RAND value from HLR/AuC
1241 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, in scard_gsm_auth() argument
1254 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); in scard_gsm_auth()
1257 os_memcpy(cmd + 5, _rand, 16); in scard_gsm_auth()
1264 os_memcpy(cmd + 6, _rand, 16); in scard_gsm_auth()
1323 * @_rand: 16-byte RAND value from HLR/AuC
1340 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, in scard_umts_auth() argument
1361 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); in scard_umts_auth()
1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN); in scard_umts_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Dpcsc_funcs.h19 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand,
21 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
H A Dpcsc_funcs.c1229 * @_rand: 16-byte RAND value from HLR/AuC
1241 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, in scard_gsm_auth() argument
1254 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); in scard_gsm_auth()
1257 os_memcpy(cmd + 5, _rand, 16); in scard_gsm_auth()
1264 os_memcpy(cmd + 6, _rand, 16); in scard_gsm_auth()
1323 * @_rand: 16-byte RAND value from HLR/AuC
1340 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, in scard_umts_auth() argument
1361 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); in scard_umts_auth()
1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN); in scard_umts_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddragonfly.c192 struct crypto_bignum *_rand, in dragonfly_generate_scalar()
201 if (dragonfly_get_rand_2_to_r_1(_rand, order) && in dragonfly_generate_scalar()
203 crypto_bignum_add(_rand, _mask, scalar) == 0 && in dragonfly_generate_scalar()
191 dragonfly_generate_scalar(const struct crypto_bignum *order, struct crypto_bignum *_rand, struct crypto_bignum *_mask, struct crypto_bignum *scalar) dragonfly_generate_scalar() argument
H A Ddragonfly.h27 struct crypto_bignum *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddragonfly.c192 struct crypto_bignum *_rand, in dragonfly_generate_scalar()
201 if (dragonfly_get_rand_2_to_r_1(_rand, order) && in dragonfly_generate_scalar()
203 crypto_bignum_add(_rand, _mask, scalar) == 0 && in dragonfly_generate_scalar()
191 dragonfly_generate_scalar(const struct crypto_bignum *order, struct crypto_bignum *_rand, struct crypto_bignum *_mask, struct crypto_bignum *scalar) dragonfly_generate_scalar() argument
H A Ddragonfly.h27 struct crypto_bignum *_rand,
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Deapol_test.c1067 unsigned char _rand[16]; in scard_test() local
1111 os_memset(_rand, 0, sizeof(_rand)); in scard_test()
1112 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test()
1115 os_memset(_rand, 0xff, sizeof(_rand)); in scard_test()
1116 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test()
1176 unsigned char _rand[16]; in scard_get_triplets() local
1211 os_memset(_rand, i, sizeof(_rand)); in scard_get_triplets()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Deapol_test.c1066 unsigned char _rand[16]; in scard_test() local
1110 os_memset(_rand, 0, sizeof(_rand)); in scard_test()
1111 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test()
1114 os_memset(_rand, 0xff, sizeof(_rand)); in scard_test()
1115 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test()
1175 unsigned char _rand[16]; in scard_get_triplets() local
1210 os_memset(_rand, i, sizeof(_rand)); in scard_get_triplets()
[all...]
/third_party/python/Lib/multiprocessing/
H A Dheap.py36 _rand = tempfile._RandomNameSequence() variable in Arena
41 name = 'pym-%d-%s' % (os.getpid(), next(self._rand))

Completed in 18 milliseconds

12