Searched refs:smk (Results 1 - 22 of 22) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpeerkey_auth.c137 const u8 *smk)
166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
190 const u8 *smk, const u8 *peer)
223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
279 if (random_get_bytes(smk, PMK_LEN)) {
295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
296 smk, PMK_LEN);
298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
299 smk, PMK_LE
133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/src/ap/
H A Dpeerkey_auth.c137 const u8 *smk)
166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
190 const u8 *smk, const u8 *peer)
223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
279 if (random_get_bytes(smk, PMK_LEN)) {
295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
296 smk, PMK_LEN);
298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
299 smk, PMK_LE
133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpeerkey_auth.c137 const u8 *smk)
166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
190 const u8 *smk, const u8 *peer)
223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
279 if (random_get_bytes(smk, PMK_LEN)) {
295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
296 smk, PMK_LEN);
298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
299 smk, PMK_LE
133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
[all...]
H A Dwpa_auth_ie.h23 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth_ie.c873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c284 * @smk: Station master key (32 bytes)
294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c284 * @smk: Station master key (32 bytes)
294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.h25 const u8 *smk; member in struct:wpa_eapol_ie_parse
H A Dpeerkey.h23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
H A Dpeerkey.c284 * @smk: Station master key (32 bytes)
294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument
312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE
[all...]
H A Dwpa_ie.c423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
/external/webrtc/webrtc/common_audio/vad/
H A Dvad_core.c135 int16_t nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local
284 smk = self->speech_means[gaussian];
329 smk2 = smk + ((tmp_s16 + 1) >> 1);
342 tmp_s16 = ((smk + 4) >> 3);

Completed in 229 milliseconds