HomeSort by relevance Sort by last modified time
    Searched refs:ak (Results 1 - 25 of 40) sorted by null

1 2

  /external/wpa_supplicant/
eap_psk_common.c 25 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
27 os_memset(ak, 0, aes_block_size);
28 aes_128_encrypt_block(psk, ak, ak);
29 os_memcpy(kdk, ak, aes_block_size);
30 ak[aes_block_size - 1] ^= 0x01;
32 aes_128_encrypt_block(psk, ak, ak);
crypto.c 159 AES_KEY *ak; local
160 ak = os_malloc(sizeof(*ak));
161 if (ak == NULL)
163 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
164 os_free(ak);
167 return ak;
185 AES_KEY *ak; local
186 ak = os_malloc(sizeof(*ak));
    [all...]
eap_pax_common.c 125 * @ak: Authentication Key
132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
eap_psk_common.h 99 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
eap_pax_common.h 98 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
eap_psk.c 31 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
52 eap_psk_key_setup(config->eappsk, data->ak, data->kdk);
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
162 omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p);
225 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
232 omac1_aes_128(data->ak, buf, buflen, mac);
eap_pax.c 45 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
87 os_memcpy(data->ak, config->eappsk, EAP_PAX_AK_LEN);
95 os_memcpy(data->ak, hash, EAP_PAX_AK_LEN);
198 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
27 os_memset(ak, 0, aes_block_size);
28 if (aes_128_encrypt_block(psk, ak, ak))
30 os_memcpy(kdk, ak, aes_block_size);
31 ak[aes_block_size - 1] ^= 0x01;
33 if (aes_128_encrypt_block(psk, ak, ak) ||
eap_pax_common.c 125 * @ak: Authentication Key
132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key",
144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
eap_pax_common.h 94 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
eap_psk_common.h 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
  /libcore/luni/src/main/java/java/util/
DualPivotQuicksort.java 193 int ak = a[k]; local
194 if (ak < pivot1) { // Move a[k] to left part
197 a[less] = ak;
200 } else if (ak > pivot2) { // Move a[k] to right part
209 a[great--] = ak;
212 a[great--] = ak;
238 int ak = a[k]; local
239 if (ak == pivot1) {
242 if (ak < pivot1) { // Move a[k] to left part
245 a[less] = ak;
319 int ak = a[k]; local
471 long ak = a[k]; local
516 long ak = a[k]; local
597 long ak = a[k]; local
766 short ak = a[k]; local
811 short ak = a[k]; local
892 short ak = a[k]; local
1059 char ak = a[k]; local
1104 char ak = a[k]; local
1185 char ak = a[k]; local
1567 float ak = a[k]; local
1727 float ak = a[k]; local
1772 float ak = a[k]; local
1853 float ak = a[k]; local
1940 double ak = a[k]; local
2100 double ak = a[k]; local
2145 double ak = a[k]; local
2226 double ak = a[k]; local
    [all...]
  /external/speex/libspeex/
cb_search.h 53 spx_coef_t ak[], /* LPCs for this subframe */
79 spx_coef_t ak[], /* LPCs for this subframe */
lsp.h 57 void lsp_to_lpc(spx_lsp_t *freq, spx_coef_t *ak, int lpcrdr, char *stack);
filters.h 73 void syn_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack);
74 void residue_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack);
76 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack);
81 spx_coef_t *ak, /*LPC filter coefs*/
ltp.h 61 spx_coef_t ak[], /* LPCs for this subframe */
104 spx_coef_t ak[], /* LPCs for this subframe */
filters_bfin.h 368 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
428 : "a" (awk2), "a" (ak), "d" (ord), "m" (N), "0" (ytmp2), "1" (y)
438 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
458 yi2 = MAC16_16(yi2, ak[j], -y[i-j-1]);
cb_search.c 102 spx_coef_t ak[], /* LPCs for this subframe */
234 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack);
244 spx_coef_t ak[], /* LPCs for this subframe */
297 split_cb_search_shape_sign_N1(target,ak,awk1,awk2,par,p,nsf,exc,r,bits,stack,update_target);
507 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack);
574 spx_coef_t ak[], /* LPCs for this subframe */
591 residue_percep_zero16(target, ak, awk1, awk2, tmp, nsf, p, stack);
lsp.c 50 LSPs are used to encode the LPC filter coefficients {ak} for
53 direct quantisation of {ak}.
55 A(z) is a polynomial of order lpcrdr with {ak} as the coefficients.
76 To convert back to ak we just evaluate (1), "clocking" an impulse
78 {ak}.
403 void lsp_to_lpc(spx_lsp_t *freq,spx_coef_t *ak,int lpcrdr, char *stack)
405 /* float *ak array of LPC coefficients */
510 /* hard limit ak's to +/- 32767 */
514 ak[j-1] = (short)a;
522 void lsp_to_lpc(spx_lsp_t *freq,spx_coef_t *ak,int lpcrdr, char *stack
    [all...]
filters.c 379 void syn_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
386 iir_mem16(xx, ak, y, N, ord, mem, stack);
391 void residue_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
398 filter_mem16(xx, ak, awk1, y, N, ord, mem, stack);
406 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack)
432 mem2[j] = MAC16_16(mem2[j+1], ak[j],ny2i);
435 mem2[ord-1] = MULT16_16(ak[ord-1],ny2i);
656 spx_coef_t *ak, /*LPC filter coefs*/
ltp.c 350 const spx_coef_t ak[], /* LPCs for this subframe */
419 iir_mem16(e, ak, e, nsf, p, mm, stack);
531 spx_coef_t ak[], /* LPCs for this subframe */
621 err=pitch_gain_search_3tap(target, ak, awk1, awk2, exc, gain_cdbk, gain_cdbk_size, pitch, p, nsf,
758 spx_coef_t ak[], /* LPCs for this subframe */
798 syn_percep_zero16(res, ak, awk1, awk2, res, nsf, p, stack);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_openssl.c 162 AES_KEY *ak; local
163 ak = os_malloc(sizeof(*ak));
164 if (ak == NULL)
166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
167 os_free(ak);
170 return ak;
188 AES_KEY *ak; local
189 ak = os_malloc(sizeof(*ak));
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
123 if (ak)
124 os_memcpy(ak, tmp3, 6); /* f5 */
184 u8 mac_a[8], ak[6]; local
191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
197 /* AUTN = (SQN ^ AK) || AMF || MAC */
199 autn[i] = sqn[i] ^ ak[i]
218 u8 ak[6], mac_s[8]; local
281 u8 mac_a[8], ak[6], rx_sqn[6]; local
    [all...]

Completed in 474 milliseconds

1 2