Searched refs:smk (Results 1 - 23 of 23) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpeerkey_auth.c149 const u8 *smk)
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
202 const u8 *smk, const u8 *peer)
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
292 if (random_get_bytes(smk, PMK_LEN)) {
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LE
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/src/ap/
H A Dpeerkey_auth.c149 const u8 *smk)
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
202 const u8 *smk, const u8 *peer)
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
292 if (random_get_bytes(smk, PMK_LEN)) {
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LE
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpeerkey_auth.c149 const u8 *smk)
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
202 const u8 *smk, const u8 *peer)
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
292 if (random_get_bytes(smk, PMK_LEN)) {
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LE
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c782 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c286 * @smk: Station master key (32 bytes)
296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c286 * @smk: Station master key (32 bytes)
296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c286 * @smk: Station master key (32 bytes)
296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c404 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/chromium_org/third_party/webrtc/common_audio/vad/
H A Dvad_core.c135 int16_t nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local
284 smk = self->speech_means[gaussian];
337 smk2 = smk + ((tmp_s16 + 1) >> 1);
350 tmp_s16 = ((smk + 4) >> 3);
/external/webrtc/src/common_audio/vad/
H A Dvad_core.c340 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local
512 smk = *smean2ptr;
558 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22)
570 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3);

Completed in 475 milliseconds