/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
eap_pax_common.c | 121 * @ak: Authentication Key 129 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 133 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 143 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
eap_pax_common.h | 89 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 191 /* AUTN = (SQN ^ AK) || AMF || MAC */ 193 autn[i] = sqn[i] ^ ak[i] 212 u8 ak[6], mac_s[8]; local 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
milenage.h | 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/fonttools/Lib/fontTools/ttLib/tables/ |
grUtils.py | 39 ak = 0 43 if len(vals) and (k != ak + 1 or (sameval and v != lastv)) : 44 yield (ak - len(vals) + 1, len(vals), vals) 46 ak = k 49 yield (ak - len(vals) + 1, len(vals), vals)
|
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/main/source/ |
fft.c | 280 REAL c1, c2, c3, cd, aa, aj, ak, ajm, ajp, akm, akp; local 441 ak = Re [k2]; 443 Re [k2] = Re [kk] - ak; 445 Re [kk] += ak; 460 ak = Re [kk] - Re [k2]; 464 Re [k2] = c1 * ak - s1 * bk; 465 Im [k2] = s1 * ak + c1 * bk; 472 ak = c1 - (cd * c1 + sd * s1); 474 c1 = 2.0 - (ak * ak + s1 * s1) [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/optimization/general/ |
GaussNewtonOptimizer.java | 96 double[] ak = a[k]; local 99 ak[l] += wgk * grad[l];
|
/external/clang/test/CodeGenCXX/ |
dynamic-cast-hint.cpp | 40 volatile K *ak = dynamic_cast<K *>(a); local
|
/external/v4l2_codec2/vda/ |
vp9_compressed_header_parser.cc | 137 for (auto& ak : aj) { 138 int max_l = (ak == aj[0]) ? 3 : 6; 140 DiffUpdateProbArray(ak[l]);
|
vp9_parser.cc | 181 for (auto& ak : aj) { 182 int max_l = (ak == aj[0]) ? 3 : 6; 184 for (auto& x : ak[l]) {
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/dfp/ |
DfpField.java | 607 Dfp ak = two.multiply(three.subtract(two.multiply(sqrt2))); local 627 ak = ak.multiply(p2.multiply(p2)).subtract(two2kp3.multiply(yk).multiply(one.add(yk).add(yk.multiply(yk)))); 634 return one.divide(ak);
|
/external/mesa3d/src/gallium/tools/trace/ |
diff_state.py | 150 ak = a.keys() 152 ak.sort() 154 if ak != bk and not self.ignore_added: 156 for k in ak:
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 145 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 159 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 227 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 234 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
eap_pax.c | 37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 112 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { 284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 288 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 295 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 309 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
eap_server_pax.c | 35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 386 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 388 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
/external/v8/tools/profviz/ |
gnuplot-4.6.3-emscripten.js | [all...] |
/external/guava/guava/src/com/google/common/collect/ |
Collections2.java | 527 E ak = nextPermutation.get(j); local 529 if (comparator.compare(ak, nextPermutation.get(l)) < 0) {
|
/external/mesa3d/src/mesa/main/ |
mipmap.c | 87 #define FILTER_SUM_3D(Aj, Ak, Bj, Bk, Cj, Ck, Dj, Dk) \ 88 ((unsigned) Aj + (unsigned) Ak \ 102 #define FILTER_SUM_3D_SIGNED(Aj, Ak, Bj, Bk, Cj, Ck, Dj, Dk) \ 103 (Aj + Ak \ 128 const GLfloat ak = _mesa_half_to_float(rowA[k][e]); \ 135 dst[i][e] = _mesa_float_to_half((aj + ak + bj + bk + cj + ck + dj + dk) \ 416 GLfloat aj, ak, bj, bk; local 418 ak = _mesa_half_to_float(rowA[k][comp]); 421 dst[i][comp] = _mesa_float_to_half((aj + ak + bj + bk) * 0.25F); 433 GLfloat aj, ak, bj, bk local 450 GLfloat aj, ak, bj, bk; local 466 GLfloat aj, ak, bj, bk; local [all...] |
/external/llvm/include/llvm/ADT/ |
IntervalMap.h | [all...] |
/external/swiftshader/third_party/LLVM/include/llvm/ADT/ |
IntervalMap.h | [all...] |
/external/swiftshader/third_party/llvm-7.0/llvm/include/llvm/ADT/ |
IntervalMap.h | [all...] |
/external/u-boot/lib/ |
bch.c | 1155 unsigned int sum, x, y, remaining, ak = 0, xi[m]; local 1163 ak = bch->a_pow_tab[i]; 1182 y ^= ak; [all...] |