Home
last modified time | relevance | path

Searched refs:msk (Results 1 – 25 of 133) sorted by relevance

123456

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpas_kay.c293 u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument
314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
328 struct mka_key *msk; in ieee802_1x_notify_create_actor() local
338 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
345 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
346 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor()
360 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor()
370 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor()
382 if (msk) { in ieee802_1x_notify_create_actor()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpas_kay.c293 u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument
314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
328 struct mka_key *msk; in ieee802_1x_notify_create_actor() local
338 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
345 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
346 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor()
360 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor()
370 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor()
382 if (msk) { in ieee802_1x_notify_create_actor()
[all …]
/third_party/qrcodegen/java-fast/io/nayuki/fastqrcodegen/
DQrCode.java238 public QrCode(int ver, Ecc ecl, byte[] dataCodewords, int msk) { in QrCode() argument
242 if (msk < -1 || msk > 7) in QrCode()
255 mask = handleConstructorMasking(tpl.masks, msk); in QrCode()
285 private void drawFormatBits(int msk) { in drawFormatBits() argument
287 int data = errorCorrectionLevel.formatBits << 3 | msk; // errCorrLvl is uint2, mask is uint3 in drawFormatBits()
380 private void applyMask(int[] msk) { in applyMask() argument
381 if (msk.length != modules.length) in applyMask()
383 for (int i = 0; i < msk.length; i++) in applyMask()
384 modules[i] ^= msk[i]; in applyMask()
391 private int handleConstructorMasking(int[][] masks, int msk) { in handleConstructorMasking() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_kay.c382 struct sta_info *sta, u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument
402 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
416 struct mka_key *msk; in ieee802_1x_notify_create_actor_hapd() local
426 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
433 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
434 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor_hapd()
451 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd()
460 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd()
471 bin_clear_free(msk, sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_kay.c382 struct sta_info *sta, u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument
402 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
416 struct mka_key *msk; in ieee802_1x_notify_create_actor_hapd() local
426 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
433 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
434 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor_hapd()
451 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd()
460 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd()
471 bin_clear_free(msk, sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd()
/third_party/ffmpeg/libavcodec/
Ddxa.c56 uint8_t *code, *data, *mv, *msk, *tmp, *tmp2; in decode_13() local
68 msk = mv + AV_RB32(src + 4); in decode_13()
72 if (data > src_end || mv > src_end || msk > src_end) in decode_13()
103 mask = AV_RB16(msk); in decode_13()
104 msk += 2; in decode_13()
107 mask = ((msk[0] & 0xF0) << shift1[type]) | ((msk[0] & 0xF) << shift2[type]); in decode_13()
108 msk++; in decode_13()
134 mask = *msk++; in decode_13()
173 mask = AV_RB16(msk); in decode_13()
174 msk += 2; in decode_13()
[all …]
Dvmnc.c157 uint8_t *cd = c->curbits, *msk = c->curmask; in put_cursor() local
160 dst[i] = (dst[i] & cd[i]) ^ msk[i]; in put_cursor()
161 msk += c->cur_w; in put_cursor()
166 uint16_t *cd = (uint16_t*)c->curbits, *msk = (uint16_t*)c->curmask; in put_cursor() local
171 dst2[i] = (dst2[i] & cd[i]) ^ msk[i]; in put_cursor()
172 msk += c->cur_w; in put_cursor()
177 uint32_t *cd = (uint32_t*)c->curbits, *msk = (uint32_t*)c->curmask; in put_cursor() local
182 dst2[i] = (dst2[i] & cd[i]) ^ msk[i]; in put_cursor()
183 msk += c->cur_w; in put_cursor()
/third_party/qrcodegen/java/src/main/java/io/nayuki/qrcodegen/
DQrCode.java248 public QrCode(int ver, Ecc ecl, byte[] dataCodewords, int msk) { in QrCode() argument
252 if (msk < -1 || msk > 7) in QrCode()
267 if (msk == -1) { // Automatically choose best mask in QrCode()
274 msk = i; in QrCode()
280 assert 0 <= msk && msk <= 7; in QrCode()
281 mask = msk; in QrCode()
282 applyMask(msk); // Apply the final choice of mask in QrCode()
283 drawFormatBits(msk); // Overwrite old format bits in QrCode()
341 private void drawFormatBits(int msk) { in drawFormatBits() argument
343 int data = errorCorrectionLevel.formatBits << 3 | msk; // errCorrLvl is uint2, mask is uint3 in drawFormatBits()
[all …]
/third_party/qrcodegen/cpp/
Dqrcodegen.cpp320 QrCode::QrCode(int ver, Ecc ecl, const vector<uint8_t> &dataCodewords, int msk) : in QrCode() argument
326 if (msk < -1 || msk > 7) in QrCode()
339 if (msk == -1) { // Automatically choose best mask in QrCode()
346 msk = i; in QrCode()
352 assert(0 <= msk && msk <= 7); in QrCode()
353 mask = msk; in QrCode()
354 applyMask(msk); // Apply the final choice of mask in QrCode()
355 drawFormatBits(msk); // Overwrite old format bits in QrCode()
416 void QrCode::drawFormatBits(int msk) { in drawFormatBits() argument
418 int data = getFormatBits(errorCorrectionLevel) << 3 | msk; // errCorrLvl is uint2, msk is uint3 in drawFormatBits()
[all …]
Dqrcodegen.hpp334 public: QrCode(int ver, Ecc ecl, const std::vector<std::uint8_t> &dataCodewords, int msk);
381 private: void drawFormatBits(int msk);
425 private: void applyMask(int msk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() argument
Deap_gpsk_common.c112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument
169 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_gpsk_derive_keys_helper()
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument
219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes()
227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument
253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256()
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument
320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys()
327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys()
99 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys()
109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() argument
150 if (msk) { in eap_sim_derive_keys_reauth()
151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth()
153 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth()
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
315 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_aka_prime_derive_keys()
316 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN); in eap_aka_prime_derive_keys()
[all …]
Deap_teap_common.c80 int eap_teap_derive_eap_msk(const u8 *simck, u8 *msk) in eap_teap_derive_eap_msk() argument
89 msk, EAP_TEAP_KEY_LEN) < 0) in eap_teap_derive_eap_msk()
92 msk, EAP_TEAP_KEY_LEN); in eap_teap_derive_eap_msk()
140 const u8 *msk, size_t msk_len, in eap_teap_derive_imck() argument
164 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK[j]", msk, msk_len); in eap_teap_derive_imck()
197 if (msk && msk_len > 0) { in eap_teap_derive_imck()
203 os_memcpy(imsk, msk, copy_len); in eap_teap_derive_imck()
Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() argument
Deap_gpsk_common.c112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument
169 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_gpsk_derive_keys_helper()
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument
219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes()
227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument
253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256()
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument
320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys()
327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys()
99 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys()
109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() argument
150 if (msk) { in eap_sim_derive_keys_reauth()
151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth()
153 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth()
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
315 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_aka_prime_derive_keys()
316 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN); in eap_aka_prime_derive_keys()
[all …]
Deap_teap_common.c86 int eap_teap_derive_eap_msk(u16 tls_cs, const u8 *simck, u8 *msk) in eap_teap_derive_eap_msk() argument
95 msk, EAP_TEAP_KEY_LEN) < 0) in eap_teap_derive_eap_msk()
98 msk, EAP_TEAP_KEY_LEN); in eap_teap_derive_eap_msk()
147 const u8 *msk, size_t msk_len, in eap_teap_derive_imck() argument
171 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK[j]", msk, msk_len); in eap_teap_derive_imck()
206 if (msk && msk_len > 0) { in eap_teap_derive_imck()
212 os_memcpy(imsk, msk, copy_len); in eap_teap_derive_imck()
Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
Dieee802_1x_key.c91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_cak_aes_cmac() argument
97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK", in ieee802_1x_cak_aes_cmac()
108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_ckn_aes_cmac() argument
124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN", in ieee802_1x_ckn_aes_cmac()
Dieee802_1x_key.h12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
Dieee802_1x_key.c91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_cak_aes_cmac() argument
97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK", in ieee802_1x_cak_aes_cmac()
108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_ckn_aes_cmac() argument
124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN", in ieee802_1x_ckn_aes_cmac()
Dieee802_1x_key.h12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
/third_party/qrcodegen/typescript-javascript/
Dqrcodegen.ts184 msk: int) {
189 if (msk < -1 || msk > 7)
208 if (msk == -1) { // Automatically choose best mask
215 msk = i;
221 assert(0 <= msk && msk <= 7);
222 this.mask = msk;
223 this.applyMask(msk); // Apply the final choice of mask
224 this.drawFormatBits(msk); // Overwrite old format bits

123456