/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 137 const u8 *smk) 166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 190 const u8 *smk, const u8 *peer) 223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 279 if (random_get_bytes(smk, PMK_LEN)) { 295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 296 smk, PMK_LEN); 298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 299 smk, PMK_LE 133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 137 const u8 *smk) 166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 190 const u8 *smk, const u8 *peer) 223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 279 if (random_get_bytes(smk, PMK_LEN)) { 295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 296 smk, PMK_LEN); 298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 299 smk, PMK_LE 133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 137 const u8 *smk) 166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 190 const u8 *smk, const u8 *peer) 223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 249 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local 279 if (random_get_bytes(smk, PMK_LEN)) { 295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 296 smk, PMK_LEN); 298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 299 smk, PMK_LE 133 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 186 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument [all...] |
H A D | wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ie.c | 873 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 284 * @smk: Station master key (32 bytes) 294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 284 * @smk: Station master key (32 bytes) 294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey.h | 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
H A D | peerkey.c | 284 * @smk: Station master key (32 bytes) 294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, argument 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LE [all...] |
H A D | wpa_ie.c | 423 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/webrtc/webrtc/common_audio/vad/ |
H A D | vad_core.c | 135 int16_t nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local 284 smk = self->speech_means[gaussian]; 329 smk2 = smk + ((tmp_s16 + 1) >> 1); 342 tmp_s16 = ((smk + 4) >> 3);
|