/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyTest.java | 51 checkKey mk = new checkKey(); local 52 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 56 const u8 *mk); 72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
|
eap_pax.c | 41 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 390 data->rand.e, data->mk, data->ck, 508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
eap_sim.c | 24 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 243 sm->identity_len, data->nonce_s, data->mk, 432 os_memcpy(data->mk, data->reauth->mk, 493 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation", 500 data->num_chal, (const u8 *) data->kc, data->mk); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 552 data->mk); 632 data->counter + 1, data->mk); [all...] |
eap_aka.c | 27 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 460 data->mk, data->msk, data->emsk); 661 os_memcpy(data->mk, data->reauth->mk, 737 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation", 746 data->ck, data->mk); 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 909 data->mk); 1048 data->mk); [all...] |
/external/wpa_supplicant/ |
eap_gpsk_common.c | 123 u8 mk[32], *pos, *data; local 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 210 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString) 211 * MSK = GKDF-160 (MK, inputString)[0..63] 212 * EMSK = GKDF-160 (MK, inputString)[64..127] 213 * SK = GKDF-160 (MK, inputString)[128..143 [all...] |
eap_pax.c | 46 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 199 data->mk, data->ck, data->ick) < 0) 500 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 521 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
eap_aka.c | 28 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 469 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK " 472 data->mk); 473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 678 data->mk, NULL, NULL); 684 * used in MK derivation. */ 705 data->nonce_s, data->mk, data->msk,
|
eap_sim.c | 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 545 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK " 550 (const u8 *) data->kc, data->mk); 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 757 * used in MK derivation. */ 774 data->nonce_s, data->mk, data->msk,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.c | 124 u8 mk[32], *pos, *data; local 162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString) 212 * MSK = GKDF-160 (MK, inputString)[0..63] 213 * EMSK = GKDF-160 (MK, inputString)[64..127] 214 * SK = GKDF-160 (MK, inputString)[128..143 [all...] |
/packages/apps/Email/src/org/apache/james/mime4j/field/address/parser/ |
JJTAddressListParserState.java | 10 private int mk; // current mark field in class:JJTAddressListParserState 17 mk = 0; 33 mk = 0; 51 if (--sp < mk) { 52 mk = ((Integer)marks.pop()).intValue(); 65 return sp - mk; 70 while (sp > mk) { 73 mk = ((Integer)marks.pop()).intValue(); 78 marks.push(new Integer(mk)); 79 mk = sp [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 45 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 481 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 502 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
eap_aka.c | 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 866 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK " 874 data->mk); 875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 1087 * used in MK derivation. */ 1114 data->nonce_s, data->mk, [all...] |
eap_sim.c | 36 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 637 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK " 642 (const u8 *) data->kc, data->mk); 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 846 * used in MK derivation. */ 863 data->nonce_s, data->mk, data->msk,
|