/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) { [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/x11/ |
SDL_x11events.c | 584 char *keydata = keybuf; local 591 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 596 keydata = SDL_malloc(count); 597 if ( keydata == NULL ) { 601 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 645 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size); 647 /* The keydata contained an invalid byte 712 if (keydata != NULL && keybuf != keydata) { 713 SDL_free(keydata); [all...] |
/external/wpa_supplicant/ |
eapol_sm.c | 624 struct eap_key_data keydata; local 656 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 664 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 672 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 696 hmac_md5(keydata.sign_key, sign_key_len, 717 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 735 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |
wpa.c | 2820 const u8 *keydata; local 2869 const u8 *keydata; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 649 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len); [all...] |