HomeSort by relevance Sort by last modified time
    Searched refs:smk (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 66 "Sending SMK Error");
97 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1");
104 "SMK M1");
114 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
134 /* SMK M2:
140 "Sending SMK M2");
155 const u8 *smk)
161 /* SMK M4:
163 * MIC=MIC, DataKDs=(MAC_I KDE, INonce KDE, SMK KDE,
183 /* SMK with PNonce *
266 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local
    [all...]
wpa_auth_ie.h 29 const u8 *smk; member in struct:wpa_eapol_ie_parse
wpa_auth_ie.c 733 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ie.h 29 const u8 *smk; member in struct:wpa_eapol_ie_parse
peerkey.h 21 int initiator; /* whether this end was initator for SMK handshake */
29 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
peerkey.c 55 /* TODO: time out SMK and any STK that was generated using this SMK */
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
116 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
171 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
190 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
193 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
200 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
207 "SMK M2");
211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR
    [all...]
wpa_ie.c 444 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 31 const u8 *smk; member in struct:wpa_eapol_ie_parse
peerkey.h 21 int initiator; /* whether this end was initator for SMK handshake */
29 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
peerkey.c 56 /* TODO: time out SMK and any STK that was generated using this SMK */
113 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
117 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
172 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
191 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
194 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
201 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
208 "SMK M2");
212 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR
    [all...]
wpa_ie.c 316 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
318 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
  /external/webrtc/src/common_audio/vad/main/source/
vad_core.c 302 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local
474 smk = *smean2ptr;
520 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22)
532 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3);
  /external/wpa_supplicant/
wpa_i.h 50 int initiator; /* whether this end was initator for SMK handshake */
58 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
wpa.c 875 * STK = PRF-X(SMK, "Peer key expansion",
1070 "SMK M1");
1083 /* SMK M1:
1092 /* Group Suite can be anything for SMK RSN IE; receiver will just
1114 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
1184 const u8 *smk; member in struct:wpa_eapol_ie_parse
    [all...]

Completed in 46 milliseconds