Searched refs:EAP_AKA_RAND_LEN (Results 1 – 15 of 15) sorted by relevance
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
D | hlr_auc_gw.c | 81 #define EAP_AKA_RAND_LEN 16 macro 473 u8 _rand[EAP_AKA_RAND_LEN]; in aka_req_auth() 484 if (os_get_random(_rand, EAP_AKA_RAND_LEN) < 0) in aka_req_auth() 497 memset(_rand, '0', EAP_AKA_RAND_LEN); in aka_req_auth() 514 pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN); in aka_req_auth() 536 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; in aka_auts() 553 hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) { in aka_auts()
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.c | 82 #define EAP_AKA_RAND_LEN 16 macro 474 u8 _rand[EAP_AKA_RAND_LEN]; in aka_req_auth() 485 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) in aka_req_auth() 498 memset(_rand, '0', EAP_AKA_RAND_LEN); in aka_req_auth() 515 pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN); in aka_req_auth() 537 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; in aka_auts() 554 hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) { in aka_auts()
|
/external/wpa_supplicant/ |
D | eap_sim_common.h | 63 #define EAP_AKA_RAND_LEN 16 macro
|
D | eap_aka.c | 33 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 444 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); in eap_aka_process_challenge()
|
D | eap_sim_common.c | 273 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sim_db.c | 55 u8 rand[EAP_AKA_RAND_LEN]; 220 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth() 1223 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth() 1329 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
|
D | eap_aka.c | 34 u8 rand[EAP_AKA_RAND_LEN]; 371 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); in eap_aka_build_challenge()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 56 u8 rand[EAP_AKA_RAND_LEN]; 221 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth() 1224 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth() 1330 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
|
D | eap_server_aka.c | 34 u8 rand[EAP_AKA_RAND_LEN]; 371 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); in eap_aka_build_challenge()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 63 #define EAP_AKA_RAND_LEN 16 macro
|
D | eap_sim_common.c | 544 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.h | 63 #define EAP_AKA_RAND_LEN 16 macro
|
D | eap_sim_common.c | 543 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_aka.c | 40 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 825 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); in eap_aka_process_challenge()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 38 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 823 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); in eap_aka_process_challenge()
|