/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 27 os_memset(ak, 0, aes_block_size); 28 if (aes_128_encrypt_block(psk, ak, ak)) 30 os_memcpy(kdk, ak, aes_block_size); 31 ak[aes_block_size - 1] ^= 0x01; 33 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 125 * @ak: Authentication Key 132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 94 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
H A D | eap_psk_common.h | 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 88 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 88 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
H A D | milenage.h | 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
H A D | milenage.h | 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/speex/libspeex/ |
H A D | cb_search.h | 53 spx_coef_t ak[], /* LPCs for this subframe */ 79 spx_coef_t ak[], /* LPCs for this subframe */
|
H A D | lsp.h | 57 void lsp_to_lpc(spx_lsp_t *freq, spx_coef_t *ak, int lpcrdr, char *stack);
|
H A D | filters.h | 73 void syn_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 74 void residue_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 76 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 81 spx_coef_t *ak, /*LPC filter coefs*/
|
H A D | ltp.h | 61 spx_coef_t ak[], /* LPCs for this subframe */ 104 spx_coef_t ak[], /* LPCs for this subframe */
|
H A D | filters_bfin.h | 368 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) argument 428 : "a" (awk2), "a" (ak), "d" (ord), "m" (N), "0" (ytmp2), "1" (y) 438 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) 458 yi2 = MAC16_16(yi2, ak[j], -y[i-j-1]);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 162 AES_KEY *ak; local 163 ak = os_malloc(sizeof(*ak)); 164 if (ak == NULL) 166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 167 os_free(ak); 170 return ak; 188 AES_KEY *ak; local 189 ak = os_malloc(sizeof(*ak)); [all...] |