/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 149 const u8 *smk) 178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 202 const u8 *smk, const u8 *peer) 235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 292 if (random_get_bytes(smk, PMK_LEN)) { 308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 309 smk, PMK_LEN); 311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 312 smk, PMK_LE 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 149 const u8 *smk) 178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 202 const u8 *smk, const u8 *peer) 235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 292 if (random_get_bytes(smk, PMK_LEN)) { 308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 309 smk, PMK_LEN); 311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 312 smk, PMK_LE 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 149 const u8 *smk) 178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 202 const u8 *smk, const u8 *peer) 235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 292 if (random_get_bytes(smk, PMK_LEN)) { 308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 309 smk, PMK_LEN); 311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 312 smk, PMK_LE 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 286 * @smk: Station master key (32 bytes) 296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 286 * @smk: Station master key (32 bytes) 296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 286 * @smk: Station master key (32 bytes) 296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/chromium_org/third_party/webrtc/common_audio/vad/ |
H A D | vad_core.c | 135 int16_t nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local 284 smk = self->speech_means[gaussian]; 337 smk2 = smk + ((tmp_s16 + 1) >> 1); 350 tmp_s16 = ((smk + 4) >> 3);
|
/external/webrtc/src/common_audio/vad/ |
H A D | vad_core.c | 340 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local 512 smk = *smean2ptr; 558 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22) 570 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3);
|