Searched refs:EAP_AKA_RAND_LEN (Results 1 – 6 of 6) sorted by relevance
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.c | 96 #define EAP_AKA_RAND_LEN 16 macro 774 u8 _rand[EAP_AKA_RAND_LEN]; in aka_req_auth() 786 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) in aka_req_auth() 805 memset(_rand, '0', EAP_AKA_RAND_LEN); in aka_req_auth() 829 pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN); in aka_req_auth() 846 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; in aka_auts() 868 hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) { in aka_auts()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 168 pos += wpa_snprintf_hex(pos, end - pos, data->rand, EAP_AKA_RAND_LEN); in eap_aka_ext_sim_req() 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); in eap_aka_ext_sim_result() 958 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); in eap_aka_process_challenge() 1459 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1465 os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LEN); in eap_aka_get_session_id() 1466 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 50 u8 rand[EAP_AKA_RAND_LEN]; 512 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth() 1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth() 1470 _rand, EAP_AKA_RAND_LEN); in eap_sim_db_resynchronize()
|
D | eap_server_aka.c | 28 u8 rand[EAP_AKA_RAND_LEN]; 475 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); in eap_aka_build_challenge()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 57 #define EAP_AKA_RAND_LEN 16 macro
|
D | eap_sim_common.c | 538 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()
|