HomeSort by relevance Sort by last modified time
    Searched refs:msk (Results 1 - 25 of 57) sorted by null

1 2 3

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
eap_gpsk_common.c 120 u8 *msk, u8 *emsk,
176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
177 os_memcpy(msk, pos, EAP_MSK_LEN);
199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
212 * MSK = GKDF-160 (MK, inputString)[0..63]
227 msk, emsk, sk, *sk_len,
235 u8 *msk, u8 *emsk,
248 * MSK = GKDF-160 (MK, inputString)[0..63]
261 msk, emsk, sk, *sk_len,
279 * @msk: Buffer for 64-byte MS
    [all...]
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
90 const u8 *nonce_s, const u8 *mk, u8 *msk,
100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
118 u8 *msk, u8 *emsk)
125 const u8 *nonce_s, u8 *msk,
eap_fast_common.h 108 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
eap_gpsk_common.h 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 76 u8 *msk, u8 *emsk);
eap_sim_common.c 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
95 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
104 msk, EAP_SIM_KEYING_DATA_LEN);
114 const u8 *nonce_s, const u8 *mk, u8 *msk,
155 if (msk) {
156 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
158 msk, EAP_SIM_KEYING_DATA_LEN);
283 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk
    [all...]
eap_sake_common.h 92 u8 *tek, u8 *msk, u8 *emsk);
eap_fast_common.c 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk)
155 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64)
160 msk, EAP_FAST_KEY_LEN);
161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
162 msk, EAP_FAST_KEY_LEN);
eap_sake_common.c 260 * @msk: Buffer for 64-byte MSK
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
300 os_memcpy(msk, key_buf, EAP_MSK_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
eap_gpsk_common.c 111 u8 *msk, u8 *emsk,
167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
168 os_memcpy(msk, pos, EAP_MSK_LEN);
190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
203 * MSK = GKDF-160 (MK, inputString)[0..63]
218 msk, emsk, sk, *sk_len,
226 u8 *msk, u8 *emsk,
239 * MSK = GKDF-160 (MK, inputString)[0..63]
252 msk, emsk, sk, *sk_len,
270 * @msk: Buffer for 64-byte MS
    [all...]
eap_sim_common.h 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
119 const u8 *nonce_s, u8 *msk,
eap_fast_common.h 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
eap_gpsk_common.h 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 70 u8 *msk, u8 *emsk);
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
99 msk, EAP_SIM_KEYING_DATA_LEN);
109 const u8 *nonce_s, const u8 *mk, u8 *msk,
150 if (msk) {
151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
153 msk, EAP_SIM_KEYING_DATA_LEN);
278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk
    [all...]
eap_sake_common.h 86 u8 *tek, u8 *msk, u8 *emsk);
eap_fast_common.c 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk)
149 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64)
154 msk, EAP_FAST_KEY_LEN);
155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
156 msk, EAP_FAST_KEY_LEN);
eap_sake_common.c 254 * @msk: Buffer for 64-byte MSK
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
294 os_memcpy(msk, key_buf, EAP_MSK_LEN);
296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
  /packages/apps/Camera/jni/feature_stab/db_vlvm/
db_feature_detection.h 138 * \param msk row array pointer to mask image
142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
  /packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/
db_feature_detection.h 138 * \param msk row array pointer to mask image
142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
253 data->msk, data->emsk)) {
259 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
436 os_memcpy(key, data->msk, EAP_MSK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 27 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
248 data->msk, data->emsk)) {
254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
431 os_memcpy(key, data->msk, EAP_MSK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 89 const u8 msk[] = { local
158 printf("- T-PRF (SHA1) test case / MSK\n");
160 (u8 *) "", 0, buf, sizeof(msk));
161 if (memcmp(msk, buf, sizeof(msk)) != 0) {
168 (u8 *) "", 0, buf, sizeof(msk));

Completed in 238 milliseconds

1 2 3