Home
last modified time | relevance | path

Searched refs:EAP_AKA_RAND_LEN (Results 1 – 6 of 6) sorted by relevance

/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.c96 #define EAP_AKA_RAND_LEN 16 macro
774 u8 _rand[EAP_AKA_RAND_LEN]; in aka_req_auth()
786 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) in aka_req_auth()
805 memset(_rand, '0', EAP_AKA_RAND_LEN); in aka_req_auth()
829 pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN); in aka_req_auth()
846 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; in aka_auts()
868 hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) { in aka_auts()
/external/wpa_supplicant_8/src/eap_peer/
Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
168 pos += wpa_snprintf_hex(pos, end - pos, data->rand, EAP_AKA_RAND_LEN); in eap_aka_ext_sim_req()
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); in eap_aka_ext_sim_result()
958 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); in eap_aka_process_challenge()
1459 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1465 os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LEN); in eap_aka_get_session_id()
1466 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/external/wpa_supplicant_8/src/eap_server/
Deap_sim_db.c50 u8 rand[EAP_AKA_RAND_LEN];
512 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth()
1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
1470 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
Deap_server_aka.c28 u8 rand[EAP_AKA_RAND_LEN];
475 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); in eap_aka_build_challenge()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h57 #define EAP_AKA_RAND_LEN 16 macro
Deap_sim_common.c538 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()