/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 155 const u8 *smk) in wpa_send_smk_m4() argument 184 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m4() 208 const u8 *smk, const u8 *peer) in wpa_send_smk_m5() argument 241 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m5() 266 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; in wpa_smk_m3() local 298 if (random_get_bytes(smk, PMK_LEN)) { in wpa_smk_m3() 314 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3() 315 smk, PMK_LEN); in wpa_smk_m3() 317 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3() 318 smk, PMK_LEN); in wpa_smk_m3() [all …]
|
D | wpa_auth_ie.h | 29 const u8 *smk; member
|
D | wpa_auth_ie.c | 733 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 308 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument 326 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 329 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 452 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4() 494 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5() 549 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45() 579 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 581 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 593 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45() 598 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45() [all …]
|
D | wpa_ie.h | 31 const u8 *smk; member
|
D | peerkey.h | 29 u8 smk[PMK_LEN]; member
|
D | wpa_ie.c | 316 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | peerkey.c | 307 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument 325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4() 493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5() 548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45() 578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 592 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45() 597 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45() [all …]
|
D | wpa_ie.h | 29 const u8 *smk; member
|
D | peerkey.h | 29 u8 smk[PMK_LEN]; member
|
D | wpa_ie.c | 444 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/webrtc/src/common_audio/vad/main/source/ |
D | vad_core.c | 302 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; in WebRtcVad_GmmProbability() local 474 smk = *smean2ptr; in WebRtcVad_GmmProbability() 520 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22) in WebRtcVad_GmmProbability() 532 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3); in WebRtcVad_GmmProbability()
|
/external/wpa_supplicant/ |
D | wpa.c | 1184 const u8 *smk; member 1248 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_supplicant_parse_generic() 2373 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument 2388 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 2530 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45() 2570 if (os_memcmp(kde.smk + PMK_LEN, peerkey->inonce, in wpa_supplicant_process_smk_m45() 2602 if (os_memcmp(kde.smk + PMK_LEN, peerkey->pnonce, in wpa_supplicant_process_smk_m45() 2617 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 2619 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 2631 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45() [all …]
|
D | wpa_i.h | 58 u8 smk[PMK_LEN]; member
|