/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 27 os_memset(ak, 0, aes_block_size); 28 if (aes_128_encrypt_block(psk, ak, ak)) 30 os_memcpy(kdk, ak, aes_block_size); 31 ak[aes_block_size - 1] ^= 0x01; 33 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 125 * @ak: Authentication Key 132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
/external/speex/libspeex/ |
H A D | filters_bfin.h | 368 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) argument 428 : "a" (awk2), "a" (ak), "d" (ord), "m" (N), "0" (ytmp2), "1" (y) 438 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) 458 yi2 = MAC16_16(yi2, ak[j], -y[i-j-1]);
|
H A D | cb_search.c | 102 spx_coef_t ak[], /* LPCs for this subframe */ 234 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack); 244 spx_coef_t ak[], /* LPCs for this subframe */ 297 split_cb_search_shape_sign_N1(target,ak,awk1,awk2,par,p,nsf,exc,r,bits,stack,update_target); 507 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack); 574 spx_coef_t ak[], /* LPCs for this subframe */ 591 residue_percep_zero16(target, ak, awk1, awk2, tmp, nsf, p, stack); 100 split_cb_search_shape_sign_N1( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int update_target ) argument 242 split_cb_search_shape_sign( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int complexity, int update_target ) argument 572 noise_codebook_quant( spx_word16_t target[], spx_coef_t ak[], spx_coef_t awk1[], spx_coef_t awk2[], const void *par, int p, int nsf, spx_sig_t *exc, spx_word16_t *r, SpeexBits *bits, char *stack, int complexity, int update_target ) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 44 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
H A D | eap_psk.c | 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 53 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 40 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 389 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
H A D | eap_psk.c | 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) 290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.c | 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 123 if (ak) 124 os_memcpy(ak, tmp3, 6); /* f5 */ 184 u8 mac_a[8], ak[6]; local 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 199 autn[i] = sqn[i] ^ ak[i]; 218 u8 ak[6], mac_s[8]; local 221 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 224 sqn[i] = auts[i] ^ ak[ 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 281 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pax.c | 37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
H A D | eap_psk.c | 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 48 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pax.c | 35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
H A D | eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 122 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { 287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 291 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pax.c | 37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
H A D | eap_psk.c | 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 48 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pax.c | 35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|