/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member 42 u8 rand_s[EAP_PSK_RAND_LEN]; member 51 u8 rand_s[EAP_PSK_RAND_LEN]; member 59 u8 rand_s[EAP_PSK_RAND_LEN]; member
|
H A D | eap_sake_common.c | 31 attr->rand_s = data; in eap_sake_parse_add_attr() 256 * @rand_s: 16-byte RAND_S 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() 279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 284 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 296 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 301 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 315 * @rand_s: 16-byte RAND_S 329 const u8 *rand_s, const u8 *rand_p, in eap_sake_compute_mic() 357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE in eap_sake_compute_mic() 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument 328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) eap_sake_compute_mic() argument [all...] |
H A D | eap_sake_common.h | 59 const u8 *rand_s; member 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member 42 u8 rand_s[EAP_PSK_RAND_LEN]; member 51 u8 rand_s[EAP_PSK_RAND_LEN]; member 59 u8 rand_s[EAP_PSK_RAND_LEN]; member
|
H A D | eap_sake_common.c | 31 attr->rand_s = data; in eap_sake_parse_add_attr() 256 * @rand_s: 16-byte RAND_S 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() 279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 284 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 296 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 301 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 315 * @rand_s: 16-byte RAND_S 329 const u8 *rand_s, const u8 *rand_p, in eap_sake_compute_mic() 357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE in eap_sake_compute_mic() 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument 328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) eap_sake_compute_mic() argument [all...] |
H A D | eap_sake_common.h | 59 const u8 *rand_s; member 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, in eap_psk_process_1() 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 142 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 156 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 214 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, in eap_psk_process_3() 323 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LE in eap_psk_process_3() [all...] |
H A D | eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member 209 if (!attr.rand_s) { in eap_sake_process_challenge() 215 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 217 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 239 data->rand_s, data->rand_p, in eap_sake_process_challenge() 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 478 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LE in eap_sake_get_session_id() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, in eap_psk_process_1() 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 142 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 156 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_1() 214 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, in eap_psk_process_3() 323 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LE in eap_psk_process_3() [all...] |
H A D | eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member 209 if (!attr.rand_s) { in eap_sake_process_challenge() 215 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 217 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 239 data->rand_s, data->rand_p, in eap_sake_process_challenge() 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 478 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LE in eap_sake_get_session_id() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member 153 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { in eap_sake_build_challenge() 159 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_build_challenge() 170 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_build_challenge() 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 345 data->rand_s, data->rand_p, in eap_sake_process_challenge() 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 521 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_get_session_id() 522 os_memcpy(id + 1 + EAP_SAKE_RAND_LEN, data->rand_s, EAP_SAKE_RAND_LE in eap_sake_get_session_id() [all...] |
H A D | eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member 62 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { in eap_psk_build_1() 68 data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() 306 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_2() 499 os_memcpy(id + 1 + EAP_PSK_RAND_LEN, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member 153 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { in eap_sake_build_challenge() 159 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_build_challenge() 170 data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_build_challenge() 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 345 data->rand_s, data->rand_p, in eap_sake_process_challenge() 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 521 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LEN); in eap_sake_get_session_id() 522 os_memcpy(id + 1 + EAP_SAKE_RAND_LEN, data->rand_s, EAP_SAKE_RAND_LE in eap_sake_get_session_id() [all...] |
H A D | eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member 62 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { in eap_psk_build_1() 68 data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() 306 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_process_2() 499 os_memcpy(id + 1 + EAP_PSK_RAND_LEN, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
|
/third_party/libcoap/src/ |
H A D | coap_prng.c | 33 errno_t __cdecl rand_s(_Out_ unsigned int *_RandomValue); 45 if (rand_s(&r) != 0) in coap_prng_impl()
|
/third_party/node/deps/v8/src/base/utils/ |
H A D | random-number-generator.cc | 50 // Use rand_s() to gather entropy on Windows. See: in RandomNumberGenerator() 53 errno_t result = rand_s(&first_half); in RandomNumberGenerator() 55 result = rand_s(&second_half); in RandomNumberGenerator()
|
/third_party/skia/third_party/externals/expat/expat/lib/ |
H A D | xmlparse.c | 62 /* force stdlib to define rand_s() */ 74 #include <stdlib.h> /* getenv, rand_s */ 144 * Windows >=Vista (rand_s): _WIN32. \ 847 /* Provide declaration of rand_s() for MinGW-32 (not 64, which has it), 853 __declspec(dllimport) int rand_s(unsigned int *); 856 /* Obtain entropy on Windows using the rand_s() function which 868 if (rand_s(&random32)) in writeRandomBytes_rand_s() 934 return ENTROPY_DEBUG("rand_s", entropy); in generate_hash_secret_salt()
|
/third_party/python/Modules/expat/ |
H A D | xmlparse.c | 70 /* force stdlib to define rand_s() */ 81 #include <stdlib.h> /* getenv, rand_s */ 139 * Windows >=Vista (rand_s): _WIN32. \ 830 /* Provide declaration of rand_s() for MinGW-32 (not 64, which has it), 836 __declspec(dllimport) int rand_s(unsigned int *); 839 /* Obtain entropy on Windows using the rand_s() function which 851 if (rand_s(&random32)) in writeRandomBytes_rand_s() 917 return ENTROPY_DEBUG("rand_s", entropy); in generate_hash_secret_salt()
|