Home
last modified time | relevance | path

Searched refs:smk (Results 1 – 14 of 14) sorted by relevance

/external/wpa_supplicant_8/src/ap/
Dpeerkey_auth.c155 const u8 *smk) in wpa_send_smk_m4() argument
184 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m4()
208 const u8 *smk, const u8 *peer) in wpa_send_smk_m5() argument
241 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m5()
266 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos; in wpa_smk_m3() local
298 if (random_get_bytes(smk, PMK_LEN)) { in wpa_smk_m3()
314 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3()
315 smk, PMK_LEN); in wpa_smk_m3()
317 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3()
318 smk, PMK_LEN); in wpa_smk_m3()
[all …]
Dwpa_auth_ie.h29 const u8 *smk; member
Dwpa_auth_ie.c733 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/wpa_supplicant_8/src/rsn_supp/
Dpeerkey.c308 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument
326 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
329 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
452 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
494 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
549 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
579 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
581 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
593 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45()
598 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45()
[all …]
Dwpa_ie.h31 const u8 *smk; member
Dpeerkey.h29 u8 smk[PMK_LEN]; member
Dwpa_ie.c316 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dpeerkey.c307 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument
325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
592 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45()
597 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45()
[all …]
Dwpa_ie.h29 const u8 *smk; member
Dpeerkey.h29 u8 smk[PMK_LEN]; member
Dwpa_ie.c444 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/webrtc/src/common_audio/vad/main/source/
Dvad_core.c302 WebRtc_Word16 nmk, nmk2, nmk3, smk, smk2, nsk, ssk; in WebRtcVad_GmmProbability() local
474 smk = *smean2ptr; in WebRtcVad_GmmProbability()
520 smk2 = smk + (tmp16 >> 1); // Q7 + (Q14 * Q15 >> 22) in WebRtcVad_GmmProbability()
532 tmp16 = WEBRTC_SPL_RSHIFT_W16((smk + 4), 3); in WebRtcVad_GmmProbability()
/external/wpa_supplicant/
Dwpa.c1184 const u8 *smk; member
1248 ie->smk = pos + 2 + RSN_SELECTOR_LEN; in wpa_supplicant_parse_generic()
2373 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument
2388 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
2530 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
2570 if (os_memcmp(kde.smk + PMK_LEN, peerkey->inonce, in wpa_supplicant_process_smk_m45()
2602 if (os_memcmp(kde.smk + PMK_LEN, peerkey->pnonce, in wpa_supplicant_process_smk_m45()
2617 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
2619 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
2631 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45()
[all …]
Dwpa_i.h58 u8 smk[PMK_LEN]; member