Searched defs:ak (Results 1 - 25 of 39) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
27 os_memset(ak, 0, aes_block_size);
28 if (aes_128_encrypt_block(psk, ak, ak))
30 os_memcpy(kdk, ak, aes_block_size);
31 ak[aes_block_size - 1] ^= 0x01;
33 if (aes_128_encrypt_block(psk, ak, ak) ||
H A Deap_pax_common.c125 * @ak: Authentication Key
132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument
136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
21 os_memset(ak, 0, aes_block_size);
22 if (aes_128_encrypt_block(psk, ak, ak))
24 os_memcpy(kdk, ak, aes_block_size);
25 ak[aes_block_size - 1] ^= 0x01;
27 if (aes_128_encrypt_block(psk, ak, ak) ||
H A Deap_pax_common.c119 * @ak: Authentication Key
126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument
130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
21 os_memset(ak, 0, aes_block_size);
22 if (aes_128_encrypt_block(psk, ak, ak))
24 os_memcpy(kdk, ak, aes_block_size);
25 ak[aes_block_size - 1] ^= 0x01;
27 if (aes_128_encrypt_block(psk, ak, ak) ||
H A Deap_pax_common.c119 * @ak: Authentication Key
126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument
130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
21 os_memset(ak, 0, aes_block_size);
22 if (aes_128_encrypt_block(psk, ak, ak))
24 os_memcpy(kdk, ak, aes_block_size);
25 ak[aes_block_size - 1] ^= 0x01;
27 if (aes_128_encrypt_block(psk, ak, ak) ||
H A Deap_pax_common.c119 * @ak: Authentication Key
126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument
130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
/external/speex/libspeex/
H A Dfilters_bfin.h368 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) argument
428 : "a" (awk2), "a" (ak), "d" (ord), "m" (N), "0" (ytmp2), "1" (y)
438 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
458 yi2 = MAC16_16(yi2, ak[j], -y[i-j-1]);
H A Dcb_search.c102 spx_coef_t ak[], /* LPCs for this subframe */
234 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack);
244 spx_coef_t ak[], /* LPCs for this subframe */
297 split_cb_search_shape_sign_N1(target,ak,awk1,awk2,par,p,nsf,exc,r,bits,stack,update_target);
507 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack);
574 spx_coef_t ak[], /* LPCs for this subframe */
591 residue_percep_zero16(target, ak, awk1, awk2, tmp, nsf, p, stack);
100 split_cb_search_shape_sign_N1( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int update_target ) argument
242 split_cb_search_shape_sign( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int complexity, int update_target ) argument
572 noise_codebook_quant( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int complexity, int update_target ) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
117 if (ak)
118 os_memcpy(ak, tmp3, 6); /* f5 */
178 u8 mac_a[8], ak[6]; local
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
193 autn[i] = sqn[i] ^ ak[i];
212 u8 ak[6], mac_s[8]; local
215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
218 sqn[i] = auts[i] ^ ak[
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
275 u8 mac_a[8], ak[6], rx_sqn[6]; local
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
117 if (ak)
118 os_memcpy(ak, tmp3, 6); /* f5 */
178 u8 mac_a[8], ak[6]; local
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
193 autn[i] = sqn[i] ^ ak[i];
212 u8 ak[6], mac_s[8]; local
215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
218 sqn[i] = auts[i] ^ ak[
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
275 u8 mac_a[8], ak[6], rx_sqn[6]; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
117 if (ak)
118 os_memcpy(ak, tmp3, 6); /* f5 */
178 u8 mac_a[8], ak[6]; local
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
193 autn[i] = sqn[i] ^ ak[i];
212 u8 ak[6], mac_s[8]; local
215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
218 sqn[i] = auts[i] ^ ak[
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
275 u8 mac_a[8], ak[6], rx_sqn[6]; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_pax.c44 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
H A Deap_psk.c29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_pax.c40 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
389 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
H A Deap_psk.c32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
H A Dmilenage.c90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
123 if (ak)
124 os_memcpy(ak, tmp3, 6); /* f5 */
184 u8 mac_a[8], ak[6]; local
191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
199 autn[i] = sqn[i] ^ ak[i];
218 u8 ak[6], mac_s[8]; local
221 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
224 sqn[i] = auts[i] ^ ak[
94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
281 u8 mac_a[8], ak[6], rx_sqn[6]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pax.c37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
H A Deap_psk.c24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pax.c35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
122 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {
287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
291 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pax.c37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
H A Deap_psk.c24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pax.c35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,

Completed in 276 milliseconds

12