/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
H A D | eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 88 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/freebsd-10.1-release/lib/libc/stdlib/ |
H A D | radixsort.c | 142 const u_char **ak, *r; local 161 for (ak = a; ak < an;) { 162 c = tr[(*ak++)[i]]; 196 top[0] = ak = a + count[0]; 198 ak = a; 209 push(ak, *cp, i+1); 211 top[cp-count] = ak += *cp; 221 * ak = top[r[i]] = location to put the next element. 224 * Once the 1st disordered bin is done, ie. aj >= ak, 244 const u_char **ak, **ai; local 315 const u_char **ak, **ai, *s, *t; local [all...] |
/freebsd-10.1-release/contrib/wpa/src/crypto/ |
H A D | milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 193 autn[i] = sqn[i] ^ ak[i]; 212 u8 ak[6], mac_s[8]; local 215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) 218 sqn[i] = auts[i] ^ ak[ 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
H A D | milenage.h | 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/freebsd-10.1-release/contrib/unbound/daemon/ |
H A D | cachedump.c | 379 struct ub_packed_rrset_key* ak; local 385 ak = alloc_special_obtain(&worker->alloc); 386 if(!ak) { 390 ak->entry.data = NULL; 391 ak->rk = k->rk; 392 ak->entry.hash = rrset_key_hash(&k->rk); 393 ak->rk.dname = (uint8_t*)memdup(k->rk.dname, k->rk.dname_len); 394 if(!ak->rk.dname) { 396 ub_packed_rrset_parsedelete(ak, &worker->alloc); 406 ub_packed_rrset_parsedelete(ak, [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 48 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
H A D | eap_pax.c | 37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
/freebsd-10.1-release/sys/security/audit/ |
H A D | audit.c | 181 audit_set_kinfo(struct auditinfo_addr *ak) argument 184 KASSERT(ak->ai_termid.at_type == AU_IPv4 || 185 ak->ai_termid.at_type == AU_IPv6, 189 audit_kinfo = *ak; 194 audit_get_kinfo(struct auditinfo_addr *ak) argument 202 *ak = audit_kinfo;
|
H A D | audit_bsm.c | 117 struct auditinfo_addr ak; local 120 audit_get_kinfo(&ak); 122 switch (ak.ai_termid.at_type) { 124 hdrsize = (ak.ai_termid.at_addr[0] == INADDR_ANY) ? 125 AUDIT_HEADER_SIZE : AUDIT_HEADER_EX_SIZE(&ak); 128 ap = (struct in6_addr *)&ak.ai_termid.at_addr[0]; 130 AUDIT_HEADER_EX_SIZE(&ak); 141 hdr = au_to_header32_ex_tm(tot_rec_size, event, 0, tm, &ak);
|
/freebsd-10.1-release/contrib/unbound/iterator/ |
H A D | iter_delegpt.c | 404 struct ub_packed_rrset_key* ak, uint8_t lame) 406 struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data; 418 if(!delegpt_add_target(dp, region, ak->rk.dname, 419 ak->rk.dname_len, (struct sockaddr_storage*)&sa, 428 struct ub_packed_rrset_key* ak, uint8_t lame) 430 struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data; 442 if(!delegpt_add_target(dp, region, ak->rk.dname, 443 ak->rk.dname_len, (struct sockaddr_storage*)&sa, 403 delegpt_add_rrset_A(struct delegpt* dp, struct regional* region, struct ub_packed_rrset_key* ak, uint8_t lame) argument 427 delegpt_add_rrset_AAAA(struct delegpt* dp, struct regional* region, struct ub_packed_rrset_key* ak, uint8_t lame) argument
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 122 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { 287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 291 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
H A D | eap_server_pax.c | 35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
/freebsd-10.1-release/contrib/llvm/include/llvm/ADT/ |
H A D | IntervalMap.h | 2116 KeyType ak = a().start(); 2118 return Traits::startLess(ak, bk) ? bk : ak; 2123 KeyType ak = a().stop(); 2125 return Traits::startLess(ak, bk) ? ak : bk;
|
/freebsd-10.1-release/contrib/sqlite3/ |
H A D | sqlite3.c | 65520 } ak; member in union:vdbeExecUnion [all...] |
/freebsd-10.1-release/crypto/heimdal/lib/sqlite/ |
H A D | sqlite3.c | 63741 } ak; member in union:vdbeExecUnion [all...] |