/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 177 os_memcpy(msk, pos, EAP_MSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 212 * MSK = GKDF-160 (MK, inputString)[0..63] 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 248 * MSK = GKDF-160 (MK, inputString)[0..63] 261 msk, emsk, sk, *sk_len, 279 * @msk: Buffer for 64-byte MS [all...] |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 90 const u8 *nonce_s, const u8 *mk, u8 *msk, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 125 const u8 *nonce_s, u8 *msk,
|
eap_fast_common.h | 108 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
eap_gpsk_common.h | 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 76 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 95 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 104 msk, EAP_SIM_KEYING_DATA_LEN); 114 const u8 *nonce_s, const u8 *mk, u8 *msk, 155 if (msk) { 156 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 158 msk, EAP_SIM_KEYING_DATA_LEN); 283 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk [all...] |
eap_sake_common.h | 92 u8 *tek, u8 *msk, u8 *emsk);
|
eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) 155 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64) 160 msk, EAP_FAST_KEY_LEN); 161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 162 msk, EAP_FAST_KEY_LEN);
|
eap_sake_common.c | 260 * @msk: Buffer for 64-byte MSK 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 300 os_memcpy(msk, key_buf, EAP_MSK_LEN); 302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 203 * MSK = GKDF-160 (MK, inputString)[0..63] 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 239 * MSK = GKDF-160 (MK, inputString)[0..63] 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MS [all...] |
eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk,
|
eap_fast_common.h | 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 99 msk, EAP_SIM_KEYING_DATA_LEN); 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 150 if (msk) { 151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 153 msk, EAP_SIM_KEYING_DATA_LEN); 278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk [all...] |
eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) 149 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64) 154 msk, EAP_FAST_KEY_LEN); 155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 156 msk, EAP_FAST_KEY_LEN);
|
eap_sake_common.c | 254 * @msk: Buffer for 64-byte MSK 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 253 data->msk, data->emsk)) { 259 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 436 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 27 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 248 data->msk, data->emsk)) { 254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 431 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 89 const u8 msk[] = { local 158 printf("- T-PRF (SHA1) test case / MSK\n"); 160 (u8 *) "", 0, buf, sizeof(msk)); 161 if (memcmp(msk, buf, sizeof(msk)) != 0) { 168 (u8 *) "", 0, buf, sizeof(msk));
|