Home
last modified time | relevance | path

Searched refs:ckn (Results 1 – 15 of 15) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpas_kay.c326 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor() local
340 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
369 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor()
371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
376 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor()
378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor()
387 os_free(ckn); in ieee802_1x_notify_create_actor()
401 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka() local
407 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpas_kay.c326 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor() local
340 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
369 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor()
371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
376 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor()
378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor()
387 os_free(ckn); in ieee802_1x_notify_create_actor()
401 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka() local
407 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_kay.c414 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor_hapd() local
428 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
459 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor_hapd()
461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
465 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor_hapd()
467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd()
473 os_free(ckn); in ieee802_1x_notify_create_actor_hapd()
484 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka_hapd() local
490 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka_hapd()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_kay.c414 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor_hapd() local
428 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
459 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor_hapd()
461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
465 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor_hapd()
467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd()
473 os_free(ckn); in ieee802_1x_notify_create_actor_hapd()
484 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka_hapd() local
490 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka_hapd()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
Dieee802_1x_key.c110 size_t sid_bytes, u8 *ckn) in ieee802_1x_ckn_aes_cmac() argument
125 context, ctx_len * 8, 128, ckn); in ieee802_1x_ckn_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
144 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
165 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_ick_aes_cmac()
Dieee802_1x_key.h16 size_t sid_bytes, u8 *ckn);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
Dieee802_1x_kay_i.h72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
74 const u8 *ckn, size_t ckn_len,
77 const u8 *ckn, size_t ckn_len,
88 struct mka_key_name ckn; member
216 u8 ckn[0]; member
402 u8 ckn[0]; member
Dieee802_1x_kay.c163 wpa_hexdump(MSG_DEBUG, "\tCAK Name", body->ckn, in ieee802_1x_mka_dump_basic_body()
280 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn, in ieee802_1x_kay_get_participant() argument
287 if (participant->ckn.len == len && in ieee802_1x_kay_get_participant()
288 os_memcmp(participant->ckn.name, ckn, in ieee802_1x_kay_get_participant()
289 participant->ckn.len) == 0) in ieee802_1x_kay_get_participant()
726 length += participant->ckn.len; in ieee802_1x_mka_basic_body_length()
743 length += participant->ckn.len; in ieee802_1x_mka_encode_basic_body()
769 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); in ieee802_1x_mka_encode_basic_body()
821 participant = ieee802_1x_kay_get_participant(kay, body->ckn, ckn_len); in ieee802_1x_mka_decode_basic_body()
2662 ieee802_1x_kay_delete_mka(kay, &participant->ckn); in ieee802_1x_participant_timer()
[all …]
Dieee802_1x_kay.h248 const struct mka_key_name *ckn,
253 struct mka_key_name *ckn);
255 struct mka_key_name *ckn,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
Dieee802_1x_key.c110 size_t sid_bytes, u8 *ckn) in ieee802_1x_ckn_aes_cmac() argument
125 context, ctx_len * 8, 128, ckn); in ieee802_1x_ckn_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
144 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
165 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_ick_aes_cmac()
Dieee802_1x_key.h16 size_t sid_bytes, u8 *ckn);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
Dieee802_1x_kay_i.h72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
74 const u8 *ckn, size_t ckn_len,
77 const u8 *ckn, size_t ckn_len,
88 struct mka_key_name ckn; member
216 u8 ckn[0]; member
402 u8 ckn[0]; member
Dieee802_1x_kay.c163 wpa_hexdump(MSG_DEBUG, "\tCAK Name", body->ckn, in ieee802_1x_mka_dump_basic_body()
280 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn, in ieee802_1x_kay_get_participant() argument
287 if (participant->ckn.len == len && in ieee802_1x_kay_get_participant()
288 os_memcmp(participant->ckn.name, ckn, in ieee802_1x_kay_get_participant()
289 participant->ckn.len) == 0) in ieee802_1x_kay_get_participant()
726 length += participant->ckn.len; in ieee802_1x_mka_basic_body_length()
743 length += participant->ckn.len; in ieee802_1x_mka_encode_basic_body()
769 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); in ieee802_1x_mka_encode_basic_body()
821 participant = ieee802_1x_kay_get_participant(kay, body->ckn, ckn_len); in ieee802_1x_mka_decode_basic_body()
2625 ieee802_1x_kay_delete_mka(kay, &participant->ckn); in ieee802_1x_participant_timer()
[all …]
Dieee802_1x_kay.h248 const struct mka_key_name *ckn,
253 struct mka_key_name *ckn);
255 struct mka_key_name *ckn,
/third_party/astc-encoder/Test/Images/HDRIHaven/HDR-RGB/
Dhdr-rgb-arboretum.hdr1431 …�����ق���ڃ���������®������ī����wq�k�wb`jwbmx��~^�k�n_��blowrdce\`�l�gwYb���ckn�iaN�e@T>ED���KO�T��…