Searched refs:ak (Results 1 - 19 of 19) sorted by relevance

/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
21 os_memset(ak, 0, aes_block_size);
22 if (aes_128_encrypt_block(psk, ak, ak))
24 os_memcpy(kdk, ak, aes_block_size);
25 ak[aes_block_size - 1] ^= 0x01;
27 if (aes_128_encrypt_block(psk, ak, ak) ||
H A Deap_pax_common.c121 * @ak: Authentication Key
129 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, argument
133 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
143 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
H A Deap_psk_common.h68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
H A Deap_pax_common.h89 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
/freebsd-current/lib/libc/stdlib/
H A Dradixsort.c128 const u_char **ak, *r; local
147 for (ak = a; ak < an;) {
148 c = tr[(*ak++)[i]];
182 top[0] = ak = a + count[0];
184 ak = a;
195 push(ak, *cp, i+1);
197 top[cp-count] = ak += *cp;
207 * ak = top[r[i]] = location to put the next element.
210 * Once the 1st disordered bin is done, ie. aj >= ak,
227 const u_char **ak, **ai; local
295 const u_char **ak, **ai, *s, *t; local
[all...]
/freebsd-current/contrib/wpa/src/crypto/
H A Dmilenage.c84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
117 if (ak)
118 os_memcpy(ak, tmp3, 6); /* f5 */
178 u8 mac_a[8], ak[6]; local
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
193 autn[i] = sqn[i] ^ ak[i];
212 u8 ak[6], mac_s[8]; local
215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak))
218 sqn[i] = auts[i] ^ ak[
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
275 u8 mac_a[8], ak[6], rx_sqn[6]; local
[all...]
H A Dmilenage.h25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
/freebsd-current/contrib/libfido2/src/
H A Decdh.c171 es256_pk_t *ak = NULL; /* authenticator's public key */ local
185 if ((ak = es256_pk_new()) == NULL ||
186 fido_dev_authkey(dev, ak, ms) != FIDO_OK) {
191 if (do_ecdh(dev, sk, ak, ecdh) < 0) {
200 es256_pk_free(&ak);
/freebsd-current/contrib/unbound/daemon/
H A Dcachedump.c385 struct ub_packed_rrset_key* ak; local
391 ak = alloc_special_obtain(worker->alloc);
392 if(!ak) {
396 ak->entry.data = NULL;
397 ak->rk = k->rk;
398 ak->entry.hash = rrset_key_hash(&k->rk);
399 ak->rk.dname = (uint8_t*)memdup(k->rk.dname, k->rk.dname_len);
400 if(!ak->rk.dname) {
402 ub_packed_rrset_parsedelete(ak, worker->alloc);
412 ub_packed_rrset_parsedelete(ak, worke
[all...]
/freebsd-current/sys/security/audit/
H A Daudit.c231 audit_set_kinfo(struct auditinfo_addr *ak) argument
234 KASSERT(ak->ai_termid.at_type == AU_IPv4 ||
235 ak->ai_termid.at_type == AU_IPv6,
239 audit_kinfo = *ak;
244 audit_get_kinfo(struct auditinfo_addr *ak) argument
252 *ak = audit_kinfo;
H A Daudit_bsm.c123 struct auditinfo_addr ak; local
126 audit_get_kinfo(&ak);
128 switch (ak.ai_termid.at_type) {
130 hdrsize = (ak.ai_termid.at_addr[0] == INADDR_ANY) ?
131 AUDIT_HEADER_SIZE : AUDIT_HEADER_EX_SIZE(&ak);
134 ap = (struct in6_addr *)&ak.ai_termid.at_addr[0];
136 AUDIT_HEADER_EX_SIZE(&ak);
147 hdr = au_to_header32_ex_tm(tot_rec_size, event, 0, tm, &ak);
/freebsd-current/contrib/unbound/iterator/
H A Diter_delegpt.c486 struct ub_packed_rrset_key* ak, uint8_t lame, int* additions)
488 struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
499 if(!delegpt_add_target(dp, region, ak->rk.dname,
500 ak->rk.dname_len, (struct sockaddr_storage*)&sa,
509 struct ub_packed_rrset_key* ak, uint8_t lame, int* additions)
511 struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
522 if(!delegpt_add_target(dp, region, ak->rk.dname,
523 ak->rk.dname_len, (struct sockaddr_storage*)&sa,
485 delegpt_add_rrset_A(struct delegpt* dp, struct regional* region, struct ub_packed_rrset_key* ak, uint8_t lame, int* additions) argument
508 delegpt_add_rrset_AAAA(struct delegpt* dp, struct regional* region, struct ub_packed_rrset_key* ak, uint8_t lame, int* additions) argument
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
159 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
234 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
H A Deap_pax.c37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {
284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
288 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
309 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
H A Deap_server_pax.c35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
406 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
408 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
/freebsd-current/contrib/llvm-project/llvm/include/llvm/ADT/
H A DIntervalMap.h2169 KeyType ak = a().start();
2171 return Traits::startLess(ak, bk) ? bk : ak;
2176 KeyType ak = a().stop();
2178 return Traits::startLess(ak, bk) ? ak : bk;
/freebsd-current/crypto/openssl/test/
H A Devp_extra_test.c1692 const APK_DATA *ak = &keydata[i]; local
1693 const unsigned char *input = ak->kder;
1694 size_t input_len = ak->size;
1695 int expected_id = ak->evptype;
2367 const APK_DATA *ak = &keycheckdata[i]; local
2368 const unsigned char *input = ak->kder;
2369 size_t input_len = ak->size;
2370 int expected_id = ak->evptype;
2371 int expected_check = ak->check;
2372 int expected_pub_check = ak
[all...]
H A Devp_extra_test2.c451 const APK_DATA *ak = &keydata[i]; local
452 const unsigned char *input = ak->kder;
453 size_t input_len = ak->size;
454 int expected_id = ak->evptype;
466 if (ak->evptype == EVP_PKEY_RSA) {
470 } else if (ak->evptype == EVP_PKEY_X25519) {
485 if (ak->evptype == EVP_PKEY_DH) {

Completed in 210 milliseconds