HomeSort by relevance Sort by last modified time
    Searched defs:mk (Results 1 - 14 of 14) sorted by null

  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyTest.java 51 checkKey mk = new checkKey(); local
52 assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 56 const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
eap_pax.c 41 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
390 data->rand.e, data->mk, data->ck,
508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
eap_sim.c 24 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
243 sm->identity_len, data->nonce_s, data->mk,
432 os_memcpy(data->mk, data->reauth->mk,
493 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation",
500 data->num_chal, (const u8 *) data->kc, data->mk);
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
552 data->mk);
632 data->counter + 1, data->mk);
    [all...]
eap_aka.c 27 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
460 data->mk, data->msk, data->emsk);
661 os_memcpy(data->mk, data->reauth->mk,
737 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation",
746 data->ck, data->mk);
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
909 data->mk);
1048 data->mk);
    [all...]
  /external/wpa_supplicant/
eap_gpsk_common.c 123 u8 mk[32], *pos, *data; local
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
210 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString)
211 * MSK = GKDF-160 (MK, inputString)[0..63]
212 * EMSK = GKDF-160 (MK, inputString)[64..127]
213 * SK = GKDF-160 (MK, inputString)[128..143
    [all...]
eap_pax.c 46 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
199 data->mk, data->ck, data->ick) < 0)
500 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
521 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
eap_aka.c 28 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
469 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK "
472 data->mk);
473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
678 data->mk, NULL, NULL);
684 * used in MK derivation. */
705 data->nonce_s, data->mk, data->msk,
eap_sim.c 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
545 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK "
550 (const u8 *) data->kc, data->mk);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
757 * used in MK derivation. */
774 data->nonce_s, data->mk, data->msk,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_gpsk_common.c 124 u8 mk[32], *pos, *data; local
162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString)
212 * MSK = GKDF-160 (MK, inputString)[0..63]
213 * EMSK = GKDF-160 (MK, inputString)[64..127]
214 * SK = GKDF-160 (MK, inputString)[128..143
    [all...]
  /packages/apps/Email/src/org/apache/james/mime4j/field/address/parser/
JJTAddressListParserState.java 10 private int mk; // current mark field in class:JJTAddressListParserState
17 mk = 0;
33 mk = 0;
51 if (--sp < mk) {
52 mk = ((Integer)marks.pop()).intValue();
65 return sp - mk;
70 while (sp > mk) {
73 mk = ((Integer)marks.pop()).intValue();
78 marks.push(new Integer(mk));
79 mk = sp
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 45 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
188 data->mk, data->ck, data->ick) < 0)
481 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
502 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
eap_aka.c 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
866 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK "
874 data->mk);
875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
1087 * used in MK derivation. */
1114 data->nonce_s, data->mk,
    [all...]
eap_sim.c 36 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
637 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK "
642 (const u8 *) data->kc, data->mk);
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
846 * used in MK derivation. */
863 data->nonce_s, data->mk, data->msk,

Completed in 1361 milliseconds