/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk,
|
eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 203 * MSK = GKDF-160 (MK, inputString)[0..63] 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 239 * MSK = GKDF-160 (MK, inputString)[0..63] 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MS [all...] |
eap_fast_common.h | 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 99 msk, EAP_SIM_KEYING_DATA_LEN); 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 150 if (msk) { 151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 153 msk, EAP_SIM_KEYING_DATA_LEN); 278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk [all...] |
eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) 149 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64) 154 msk, EAP_FAST_KEY_LEN); 155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 156 msk, EAP_FAST_KEY_LEN);
|
eap_sake_common.c | 254 * @msk: Buffer for 64-byte MSK 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
|
eap_pwd_common.c | 287 u32 *ciphersuite, u8 *msk, u8 *emsk) 334 /* stretch the mk with the session-id to get MSK | EMSK */ 341 os_memcpy(msk, msk_emsk, EAP_MSK_LEN);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|
/packages/apps/Gallery2/jni_mosaic/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_feature_detection.h | 138 * \param msk row array pointer to mask image 142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
|
/hardware/samsung_slsi/exynos5/original-kernel-headers/linux/ |
fimg2d.h | 260 (u)->msk, \ 362 * @msk: set when using mask image 373 struct fimg2d_image *msk; member in struct:fimg2d_blit 403 * @dma_all: total dma size of src, msk, dst 404 * @dma: array of dma info for each src, msk, tmp and dst
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 433 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sake.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 448 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 132 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 458 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_aka.c | 26 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 558 data->msk, data->emsk); 561 data->msk, data->emsk); 564 data->mk, data->msk, data->emsk); 838 data->k_re, data->msk, data->emsk); 843 data->msk, data->emsk); [all...] |
eap_server_sim.c | 24 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 264 data->msk, data->emsk); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 793 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
eap_server_gpsk.c | 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 420 data->msk, data->emsk, 572 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_sake.c | 25 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 362 (u8 *) &data->tek, data->msk, data->emsk); 481 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/hardware/samsung_slsi/exynos5/include/ |
fimg2d.h | 254 struct fimg2d_image *msk; member in struct:fimg2d_blit
|
/external/libppp/src/ |
ncpaddr.c | 102 u_int32_t msk = ntohl(mask.s_addr); local 107 if (msk & tst) 111 if (!(msk & tst)) 677 ncprange_setip4(struct ncprange *range, struct in_addr from, struct in_addr msk) 681 range->ncprange_ip4mask = msk; 682 range->ncprange_ip4width = mask42bits(msk);
|
/frameworks/av/media/libstagefright/codecs/m4v_h263/dec/src/ |
bitstream.cpp | 24 static const uint32 msk[33] = variable 573 if (pattern == msk[n_stuffed-1]) return PV_TRUE; [all...] |