/external/wpa_supplicant/ |
eap_psk_common.c | 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 53 aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]);
|
eap_gpsk_common.c | 119 u8 *msk, u8 *emsk, 175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 176 os_memcpy(msk, pos, EAP_MSK_LEN); 198 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 211 * MSK = GKDF-160 (MK, inputString)[0..63] 226 msk, emsk, sk, *sk_len, 234 u8 *msk, u8 *emsk, 247 * MSK = GKDF-160 (MK, inputString)[0..63] 260 msk, emsk, sk, *sk_len, 278 * @msk: Buffer for 64-byte MS [all...] |
eap_gpsk_common.h | 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
|
eap_sim_common.h | 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 83 const u8 *nonce_s, const u8 *mk, u8 *msk,
|
eap_sake_common.h | 96 u8 *tek, u8 *msk, u8 *emsk);
|
eap_sake_common.c | 259 * @msk: Buffer for 64-byte MSK 265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 299 os_memcpy(msk, key_buf, EAP_MSK_LEN); 301 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 177 os_memcpy(msk, pos, EAP_MSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 212 * MSK = GKDF-160 (MK, inputString)[0..63] 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 248 * MSK = GKDF-160 (MK, inputString)[0..63] 261 msk, emsk, sk, *sk_len, 279 * @msk: Buffer for 64-byte MS [all...] |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 90 const u8 *nonce_s, const u8 *mk, u8 *msk, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 125 const u8 *nonce_s, u8 *msk,
|
eap_fast_common.h | 108 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
eap_gpsk_common.h | 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 76 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 95 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 104 msk, EAP_SIM_KEYING_DATA_LEN); 114 const u8 *nonce_s, const u8 *mk, u8 *msk, 155 if (msk) { 156 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 158 msk, EAP_SIM_KEYING_DATA_LEN); 283 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk [all...] |
eap_sake_common.h | 92 u8 *tek, u8 *msk, u8 *emsk);
|
eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) 155 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64) 160 msk, EAP_FAST_KEY_LEN); 161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 162 msk, EAP_FAST_KEY_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
eap_gpsk_common.c | 117 u8 *msk, u8 *emsk, 173 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 174 os_memcpy(msk, pos, EAP_MSK_LEN); 196 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 209 * MSK = GKDF-160 (MK, inputString)[0..63] 224 msk, emsk, sk, *sk_len, 232 u8 *msk, u8 *emsk, 245 * MSK = GKDF-160 (MK, inputString)[0..63] 258 msk, emsk, sk, *sk_len, 276 * @msk: Buffer for 64-byte MS [all...] |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 90 const u8 *nonce_s, const u8 *mk, u8 *msk, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 125 const u8 *nonce_s, u8 *msk,
|
eap_fast_common.h | 108 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
eap_gpsk_common.h | 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 76 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 83 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 96 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 104 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 105 msk, EAP_SIM_KEYING_DATA_LEN); 115 const u8 *nonce_s, const u8 *mk, u8 *msk, 156 if (msk) { 157 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 158 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 159 msk, EAP_SIM_KEYING_DATA_LEN); 284 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk [all...] |
eap_sake_common.h | 92 u8 *tek, u8 *msk, u8 *emsk);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|