/external/wpa_supplicant/tests/ |
test_sha1.c | 89 const u8 msk[] = { local 147 printf("- T-PRF (SHA1) test case / MSK\n"); 149 (u8 *) "", 0, buf, sizeof(msk)); 150 if (memcmp(msk, buf, sizeof(msk)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 89 const u8 msk[] = { local 158 printf("- T-PRF (SHA1) test case / MSK\n"); 160 (u8 *) "", 0, buf, sizeof(msk)); 161 if (memcmp(msk, buf, sizeof(msk)) != 0) { 168 (u8 *) "", 0, buf, sizeof(msk));
|
/external/wpa_supplicant/ |
eap_psk.c | 34 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 244 data->msk, data->emsk); 246 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 422 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sake.c | 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 258 (u8 *) &data->tek, data->msk, data->emsk); 469 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_aka.c | 31 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 705 data->nonce_s, data->mk, data->msk, 884 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
eap_gpsk.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 368 data->msk, data->emsk, 712 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sim.c | 37 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 774 data->nonce_s, data->mk, data->msk, 953 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 253 data->msk, data->emsk)) { 259 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 436 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sake.c | 31 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 248 (u8 *) &data->tek, data->msk, data->emsk); 453 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_gpsk.c | 25 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 353 data->msk, data->emsk, 691 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_aka.c | 38 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 871 data->k_re, data->msk, data->emsk); 876 data->msk, data->emsk); 1110 data->msk, data->emsk); 1115 data->msk, data->emsk); [all...] |
eap_sim.c | 39 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 863 data->nonce_s, data->mk, data->msk, 1052 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 425 data->msk, data->emsk, 577 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_psk.c | 33 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 461 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sake.c | 30 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 367 (u8 *) &data->tek, data->msk, data->emsk); 486 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sim.c | 29 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 244 data->msk, data->emsk); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 743 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
eap_aka.c | 32 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 454 data->msk, data->emsk); 457 data->msk, data->emsk); 460 data->mk, data->msk, data->emsk); 743 data->k_re, data->msk, data->emsk); 748 data->msk, data->emsk); 1193 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN); [all...] |
/frameworks/base/media/libstagefright/codecs/avc/enc/src/ |
findhalfpel.cpp | 155 int msk; local 382 msk = 0; 438 // msk |= b; msk|=a; 449 /* if(msk & 0xFF00FF00) // need clipping
|
/frameworks/base/media/libstagefright/codecs/m4v_h263/dec/src/ |
bitstream.cpp | 24 static const uint32 msk[33] = variable 573 if (pattern == msk[n_stuffed-1]) return PV_TRUE; [all...] |
/external/bluetooth/bluez/src/ |
storage.c | 429 char filename[PATH_MAX + 1], addr[18], *str, *space, *msk; local 444 msk = space + 1; 457 if (msk[0] == '-') 461 *mask = (uint32_t) strtol(msk, NULL, 16);
|