/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 123 if (ak) 124 os_memcpy(ak, tmp3, 6); /* f5 */ 184 u8 mac_a[8], ak[6]; local 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 197 /* AUTN = (SQN ^ AK) || AMF || MAC */ 199 autn[i] = sqn[i] ^ ak[i] 218 u8 ak[6], mac_s[8]; local 281 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
crypto_openssl.c | 212 AES_KEY *ak; local 213 ak = os_malloc(sizeof(*ak)); 214 if (ak == NULL) 216 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 217 os_free(ak); 220 return ak; 238 AES_KEY *ak; local 239 ak = os_malloc(sizeof(*ak)); [all...] |
/external/wpa_supplicant/ |
crypto.c | 159 AES_KEY *ak; local 160 ak = os_malloc(sizeof(*ak)); 161 if (ak == NULL) 163 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 164 os_free(ak); 167 return ak; 185 AES_KEY *ak; local 186 ak = os_malloc(sizeof(*ak)); [all...] |
eap_pax.c | 45 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 87 os_memcpy(data->ak, config->eappsk, EAP_PAX_AK_LEN); 95 os_memcpy(data->ak, hash, EAP_PAX_AK_LEN); 198 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
eap_psk.c | 31 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 52 eap_psk_key_setup(config->eappsk, data->ak, data->kdk); 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 162 omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p); 225 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 232 omac1_aes_128(data->ak, buf, buflen, mac);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_openssl.c | 162 AES_KEY *ak; local 163 ak = os_malloc(sizeof(*ak)); 164 if (ak == NULL) 166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 167 os_free(ak); 170 return ak; 188 AES_KEY *ak; local 189 ak = os_malloc(sizeof(*ak)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 44 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
eap_psk.c | 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 53 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 40 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 389 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
eap_psk.c | 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) 290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.c | 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 123 if (ak) 124 os_memcpy(ak, tmp3, 6); /* f5 */ 184 u8 mac_a[8], ak[6]; local 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 197 /* AUTN = (SQN ^ AK) || AMF || MAC */ 199 autn[i] = sqn[i] ^ ak[i] 218 u8 ak[6], mac_s[8]; local 281 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 43 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 85 os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 186 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
|
eap_psk.c | 30 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 54 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 164 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 232 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 239 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 41 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data 388 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 390 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
|
eap_server_psk.c | 33 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 120 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 128 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) 291 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 295 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 302 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 316 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/libcore/luni/src/main/java/java/util/ |
DualPivotQuicksort.java | 193 int ak = a[k]; local 194 if (ak < pivot1) { // Move a[k] to left part 197 a[less] = ak; 200 } else if (ak > pivot2) { // Move a[k] to right part 209 a[great--] = ak; 212 a[great--] = ak; 238 int ak = a[k]; local 239 if (ak == pivot1) { 242 if (ak < pivot1) { // Move a[k] to left part 245 a[less] = ak; 319 int ak = a[k]; local 471 long ak = a[k]; local 516 long ak = a[k]; local 597 long ak = a[k]; local 766 short ak = a[k]; local 811 short ak = a[k]; local 892 short ak = a[k]; local 1059 char ak = a[k]; local 1104 char ak = a[k]; local 1185 char ak = a[k]; local 1567 float ak = a[k]; local 1727 float ak = a[k]; local 1772 float ak = a[k]; local 1853 float ak = a[k]; local 1940 double ak = a[k]; local 2100 double ak = a[k]; local 2145 double ak = a[k]; local 2226 double ak = a[k]; local [all...] |
/external/svox/pico/lib/ |
picofftsg.c | 534 PICOFFTSG_FFTTYPE *aj, *ak, *amj, *amk; local 555 aj = a + 1; ak = a + k; amj = aj + m; amk = ak + m; 556 for (j = 1; j < mh; j++, aj++, ak--, amj++, amk--) { 560 yi = *ak; 564 *ak = xr + xi; [all...] |