HomeSort by relevance Sort by last modified time
    Searched defs:ak (Results 1 - 17 of 17) sorted by null

  /external/wpa_supplicant_8/src/crypto/
milenage.c 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
123 if (ak)
124 os_memcpy(ak, tmp3, 6); /* f5 */
184 u8 mac_a[8], ak[6]; local
191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
197 /* AUTN = (SQN ^ AK) || AMF || MAC */
199 autn[i] = sqn[i] ^ ak[i]
218 u8 ak[6], mac_s[8]; local
281 u8 mac_a[8], ak[6], rx_sqn[6]; local
    [all...]
crypto_openssl.c 212 AES_KEY *ak; local
213 ak = os_malloc(sizeof(*ak));
214 if (ak == NULL)
216 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
217 os_free(ak);
220 return ak;
238 AES_KEY *ak; local
239 ak = os_malloc(sizeof(*ak));
    [all...]
  /external/wpa_supplicant/
crypto.c 159 AES_KEY *ak; local
160 ak = os_malloc(sizeof(*ak));
161 if (ak == NULL)
163 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
164 os_free(ak);
167 return ak;
185 AES_KEY *ak; local
186 ak = os_malloc(sizeof(*ak));
    [all...]
eap_pax.c 45 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
87 os_memcpy(data->ak, config->eappsk, EAP_PAX_AK_LEN);
95 os_memcpy(data->ak, hash, EAP_PAX_AK_LEN);
198 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
eap_psk.c 31 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
52 eap_psk_key_setup(config->eappsk, data->ak, data->kdk);
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
162 omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p);
225 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
232 omac1_aes_128(data->ak, buf, buflen, mac);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_openssl.c 162 AES_KEY *ak; local
163 ak = os_malloc(sizeof(*ak));
164 if (ak == NULL)
166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
167 os_free(ak);
170 return ak;
188 AES_KEY *ak; local
189 ak = os_malloc(sizeof(*ak));
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 44 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 40 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
389 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
123 if (ak)
124 os_memcpy(ak, tmp3, 6); /* f5 */
184 u8 mac_a[8], ak[6]; local
191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
197 /* AUTN = (SQN ^ AK) || AMF || MAC */
199 autn[i] = sqn[i] ^ ak[i]
218 u8 ak[6], mac_s[8]; local
281 u8 mac_a[8], ak[6], rx_sqn[6]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 43 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
85 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
186 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
eap_psk.c 30 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
54 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
164 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
232 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
239 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 41 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
388 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
390 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
eap_server_psk.c 33 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
120 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
128 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
291 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
295 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
302 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
316 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /libcore/luni/src/main/java/java/util/
DualPivotQuicksort.java 193 int ak = a[k]; local
194 if (ak < pivot1) { // Move a[k] to left part
197 a[less] = ak;
200 } else if (ak > pivot2) { // Move a[k] to right part
209 a[great--] = ak;
212 a[great--] = ak;
238 int ak = a[k]; local
239 if (ak == pivot1) {
242 if (ak < pivot1) { // Move a[k] to left part
245 a[less] = ak;
319 int ak = a[k]; local
471 long ak = a[k]; local
516 long ak = a[k]; local
597 long ak = a[k]; local
766 short ak = a[k]; local
811 short ak = a[k]; local
892 short ak = a[k]; local
1059 char ak = a[k]; local
1104 char ak = a[k]; local
1185 char ak = a[k]; local
1567 float ak = a[k]; local
1727 float ak = a[k]; local
1772 float ak = a[k]; local
1853 float ak = a[k]; local
1940 double ak = a[k]; local
2100 double ak = a[k]; local
2145 double ak = a[k]; local
2226 double ak = a[k]; local
    [all...]
  /external/svox/pico/lib/
picofftsg.c 534 PICOFFTSG_FFTTYPE *aj, *ak, *amj, *amk; local
555 aj = a + 1; ak = a + k; amj = aj + m; amk = ak + m;
556 for (j = 1; j < mh; j++, aj++, ak--, amj++, amk--) {
560 yi = *ak;
564 *ak = xr + xi;
    [all...]

Completed in 101 milliseconds