/freebsd-12-stable/contrib/wpa/src/crypto/ |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, 24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
|
H A D | milenage.c | 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument 44 tmp1[i] = _rand[i] ^ opc[i]; 80 * @_rand: RAND = 128-bit random challenge 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument 96 tmp1[i] = _rand[i] ^ opc[i]; 166 * @_rand: RAND = 128-bit random challenge 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 185 milenage_f2345(opc, k, _rand, re 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument 235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/freebsd-12-stable/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 19 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, 21 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
|
H A D | pcsc_funcs.c | 1229 * @_rand: 16-byte RAND value from HLR/AuC 1241 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument 1254 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1257 os_memcpy(cmd + 5, _rand, 16); 1264 os_memcpy(cmd + 6, _rand, 16); 1323 * @_rand: 16-byte RAND value from HLR/AuC 1340 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument 1361 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
|
/freebsd-12-stable/contrib/wpa/src/common/ |
H A D | dragonfly.h | 27 struct crypto_bignum *_rand,
|
H A D | dragonfly.c | 192 struct crypto_bignum *_rand, 201 if (dragonfly_get_rand_2_to_r_1(_rand, order) && 203 crypto_bignum_add(_rand, _mask, scalar) == 0 && 191 dragonfly_generate_scalar(const struct crypto_bignum *order, struct crypto_bignum *_rand, struct crypto_bignum *_mask, struct crypto_bignum *scalar) argument
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 91 const u8 *_rand);
|
H A D | eap_sim_db.c | 907 * @_rand: Buffer for RAND values 927 u8 *_rand, u8 *kc, u8 *sres, 968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1373 * @_rand: Buffer for RAND value 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); 1480 * @_rand: RAND value used in the rejected message 1491 const u8 *auts, const u8 *_rand) 1531 _rand, EAP_AKA_RAND_LEN); 925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.c | 335 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 373 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 382 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
H A D | eap_pwd_common.h | 73 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand,
|
H A D | eap_pwd_common.c | 443 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand, argument 448 _rand, _mask, scalar);
|
/freebsd-12-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 76 u8 _rand[16]; member in struct:gsm_triplet 344 hexstr2bin(pos, g->_rand, 16)) { 617 u8 _rand[16], sres[4], kc[8]; local 619 if (random_get_bytes(_rand, 16) < 0) 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); 646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); 684 u8 _rand[16], sres[4], kc[8]; local 686 if (hexstr2bin(pos, _rand, 16) != 0) 688 gsm_milenage(m->opc, m->ki, _rand, sre 738 u8 _rand[EAP_AKA_RAND_LEN]; local 814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/freebsd-12-stable/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 1067 unsigned char _rand[16]; local 1111 os_memset(_rand, 0, sizeof(_rand)); 1112 if (scard_gsm_auth(scard, _rand, sres, kc)) 1115 os_memset(_rand, 0xff, sizeof(_rand)); 1116 if (scard_gsm_auth(scard, _rand, sres, kc)) 1176 unsigned char _rand[16]; local 1211 os_memset(_rand, i, sizeof(_rand)); [all...] |
H A D | rrm.c | 1151 u32 _rand; local 1229 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0) 1230 _rand = os_random(); 1231 interval_usec = (_rand % (rand_interval + 1)) * 1024;
|
H A D | sme.c | 2453 u32 _rand; local 2463 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0) 2464 _rand = os_random(); 2465 usec = _rand % (sa_query_ch_switch_max_delay + 1);
|
/freebsd-12-stable/contrib/wpa/src/ap/ |
H A D | dfs.c | 446 u32 _rand; local 465 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0) 467 chan_idx = _rand % num_available_chandefs;
|