/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | milenage.c | 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 44 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f1() 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f2345() argument 96 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f2345() 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate() 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, in milenage_auts() argument 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) in milenage_auts() 219 if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) || in milenage_auts() [all …]
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, 24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | milenage.c | 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument 44 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f1() 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f2345() argument 96 tmp1[i] = _rand[i] ^ opc[i]; in milenage_f2345() 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate() 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, in milenage_auts() argument 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) in milenage_auts() 219 if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) || in milenage_auts() [all …]
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 22 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, 24 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand,
|
/third_party/mindspore/tests/st/model_zoo_tests/yolov3/src/ |
D | dataset.py | 41 def _rand(a=0., b=1.): function 151 flip = _rand() < .5 156 new_ar = float(w) / float(h) * _rand(1 - jitter, 1 + jitter) / \ 157 _rand(1 - jitter, 1 + jitter) 158 scale = _rand(0.25, 2) 167 dx = int(_rand(0, w - nw)) 168 dy = int(_rand(0, h - nh)) 201 gray = _rand() < .25 212 hue = _rand(-hue, hue) 213 sat = _rand(1, sat) if _rand() < .5 else 1 / _rand(1, sat) [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hlr_auc_gw.c | 76 u8 _rand[16]; member 344 hexstr2bin(pos, g->_rand, 16)) { in read_gsm_triplets() 617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local 619 if (random_get_bytes(_rand, 16) < 0) in sim_req_auth() 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth() 627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); in sim_req_auth() 646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); in sim_req_auth() 684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local 686 if (hexstr2bin(pos, _rand, 16) != 0) in gsm_auth_req() 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in gsm_auth_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hlr_auc_gw.c | 76 u8 _rand[16]; member 344 hexstr2bin(pos, g->_rand, 16)) { in read_gsm_triplets() 617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local 619 if (random_get_bytes(_rand, 16) < 0) in sim_req_auth() 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth() 627 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); in sim_req_auth() 646 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); in sim_req_auth() 684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local 686 if (hexstr2bin(pos, _rand, 16) != 0) in gsm_auth_req() 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in gsm_auth_req() [all …]
|
/third_party/mindspore/tests/st/model_zoo_tests/yolov3_darknet53/src/ |
D | transforms.py | 25 def _rand(a=0., b=1.): function 242 hue = _rand(-hue, hue) 243 sat = _rand(1, sat) if _rand() < .5 else 1 / _rand(1, sat) 244 val = _rand(1, val) if _rand() < .5 else 1 / _rand(1, val) 302 …new_ar = float(input_w) / float(input_h) * _rand(1 - jitter, 1 + jitter) / _rand(1 - jitter, 1 + j… 303 scale = _rand(0.25, 2) 312 dx = int(_rand(0, input_w - nw)) 313 dy = int(_rand(0, input_h - nh)) 390 flip = _rand() < .5
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 91 const u8 *_rand);
|
D | eap_sim_db.c | 927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets() argument 968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); in eap_sim_db_get_gsm_triplets() 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth() argument 1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth() 1491 const u8 *auts, const u8 *_rand) in eap_sim_db_resynchronize() argument 1531 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 91 const u8 *_rand);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sake_common.c | 335 u8 _rand[2 * EAP_SAKE_RAND_LEN]; in eap_sake_compute_mic() local 357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic() 358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic() 372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic() 373 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, in eap_sake_compute_mic() 382 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen, in eap_sake_compute_mic()
|
D | eap_pwd_common.h | 73 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sake_common.c | 335 u8 _rand[2 * EAP_SAKE_RAND_LEN]; in eap_sake_compute_mic() local 357 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic() 358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic() 372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic() 373 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, in eap_sake_compute_mic() 382 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen, in eap_sake_compute_mic()
|
D | eap_pwd_common.h | 73 int eap_pwd_get_rand_mask(EAP_PWD_group *group, struct crypto_bignum *_rand,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | pcsc_funcs.h | 19 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, 21 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
|
D | pcsc_funcs.c | 1241 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, in scard_gsm_auth() argument 1254 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); in scard_gsm_auth() 1257 os_memcpy(cmd + 5, _rand, 16); in scard_gsm_auth() 1264 os_memcpy(cmd + 6, _rand, 16); in scard_gsm_auth() 1340 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, in scard_umts_auth() argument 1361 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); in scard_umts_auth() 1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN); in scard_umts_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | pcsc_funcs.h | 19 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, 21 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand,
|
D | pcsc_funcs.c | 1241 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, in scard_gsm_auth() argument 1254 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); in scard_gsm_auth() 1257 os_memcpy(cmd + 5, _rand, 16); in scard_gsm_auth() 1264 os_memcpy(cmd + 6, _rand, 16); in scard_gsm_auth() 1340 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, in scard_umts_auth() argument 1361 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); in scard_umts_auth() 1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN); in scard_umts_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dragonfly.c | 192 struct crypto_bignum *_rand, in dragonfly_generate_scalar() argument 201 if (dragonfly_get_rand_2_to_r_1(_rand, order) && in dragonfly_generate_scalar() 203 crypto_bignum_add(_rand, _mask, scalar) == 0 && in dragonfly_generate_scalar()
|
D | dragonfly.h | 27 struct crypto_bignum *_rand,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | dragonfly.c | 192 struct crypto_bignum *_rand, in dragonfly_generate_scalar() argument 201 if (dragonfly_get_rand_2_to_r_1(_rand, order) && in dragonfly_generate_scalar() 203 crypto_bignum_add(_rand, _mask, scalar) == 0 && in dragonfly_generate_scalar()
|
D | dragonfly.h | 27 struct crypto_bignum *_rand,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 1066 unsigned char _rand[16]; in scard_test() local 1110 os_memset(_rand, 0, sizeof(_rand)); in scard_test() 1111 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1114 os_memset(_rand, 0xff, sizeof(_rand)); in scard_test() 1115 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1175 unsigned char _rand[16]; in scard_get_triplets() local 1210 os_memset(_rand, i, sizeof(_rand)); in scard_get_triplets() 1211 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_get_triplets() 1225 printf("%02X", _rand[j]); in scard_get_triplets()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 1067 unsigned char _rand[16]; in scard_test() local 1111 os_memset(_rand, 0, sizeof(_rand)); in scard_test() 1112 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1115 os_memset(_rand, 0xff, sizeof(_rand)); in scard_test() 1116 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1176 unsigned char _rand[16]; in scard_get_triplets() local 1211 os_memset(_rand, i, sizeof(_rand)); in scard_get_triplets() 1212 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_get_triplets() 1226 printf("%02X", _rand[j]); in scard_get_triplets()
|