/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 60 "Sending SMK Error"); 91 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1"); 98 "SMK M1"); 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 128 /* SMK M2: 134 "Sending SMK M2"); 149 const u8 *smk) 155 /* SMK M4: 157 * MIC=MIC, DataKDs=(MAC_I KDE, INonce KDE, SMK KDE, 177 /* SMK with PNonce * 260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; local [all...] |
wpa_auth_ie.h | 23 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
wpa_auth_ie.c | 675 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 25 const u8 *smk; member in struct:wpa_eapol_ie_parse
|
peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ 23 u8 smk[PMK_LEN]; member in struct:wpa_peerkey
|
peerkey.c | 50 /* TODO: time out SMK and any STK that was generated using this SMK */ 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 188 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for " 195 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2"); 202 "SMK M2"); 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR [all...] |
wpa_ie.c | 302 ie->smk = pos + 2 + RSN_SELECTOR_LEN; 304 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
|
/external/webrtc/src/common_audio/vad/ |
vad_core.c | 340 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; local 512 smk = *smean2ptr; 558 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22) 570 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3);
|