/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sound/ |
ak4xxx-adda.h | 33 void (*lock)(struct snd_akm4xxx *ak, int chip); 34 void (*unlock)(struct snd_akm4xxx *ak, int chip); 35 void (*write)(struct snd_akm4xxx *ak, int chip, unsigned char reg, 37 void (*set_rate_val)(struct snd_akm4xxx *ak, unsigned int rate); 81 void snd_akm4xxx_write(struct snd_akm4xxx *ak, int chip, unsigned char reg, 83 void snd_akm4xxx_reset(struct snd_akm4xxx *ak, int state); 84 void snd_akm4xxx_init(struct snd_akm4xxx *ak); 85 int snd_akm4xxx_build_controls(struct snd_akm4xxx *ak); 87 #define snd_akm4xxx_get(ak,chip,reg) \ 88 (ak)->images[(chip) * 16 + (reg) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 27 os_memset(ak, 0, aes_block_size); 28 if (aes_128_encrypt_block(psk, ak, ak)) 30 os_memcpy(kdk, ak, aes_block_size); 31 ak[aes_block_size - 1] ^= 0x01; 33 if (aes_128_encrypt_block(psk, ak, ak) ||
|
eap_pax_common.c | 125 * @ak: Authentication Key 132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
eap_pax_common.h | 94 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
eap_psk_common.h | 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 21 os_memset(ak, 0, aes_block_size); 22 if (aes_128_encrypt_block(psk, ak, ak)) 24 os_memcpy(kdk, ak, aes_block_size); 25 ak[aes_block_size - 1] ^= 0x01; 27 if (aes_128_encrypt_block(psk, ak, ak) ||
|
eap_pax_common.c | 119 * @ak: Authentication Key 126 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 130 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
eap_pax_common.h | 88 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/libcore/luni/src/main/java/java/util/ |
DualPivotQuicksort.java | 193 int ak = a[k]; local 194 if (ak < pivot1) { // Move a[k] to left part 197 a[less] = ak; 200 } else if (ak > pivot2) { // Move a[k] to right part 209 a[great--] = ak; 212 a[great--] = ak; 238 int ak = a[k]; local 239 if (ak == pivot1) { 242 if (ak < pivot1) { // Move a[k] to left part 245 a[less] = ak; 319 int ak = a[k]; local 471 long ak = a[k]; local 516 long ak = a[k]; local 597 long ak = a[k]; local 766 short ak = a[k]; local 811 short ak = a[k]; local 892 short ak = a[k]; local 1059 char ak = a[k]; local 1104 char ak = a[k]; local 1185 char ak = a[k]; local 1567 float ak = a[k]; local 1727 float ak = a[k]; local 1772 float ak = a[k]; local 1853 float ak = a[k]; local 1940 double ak = a[k]; local 2100 double ak = a[k]; local 2145 double ak = a[k]; local 2226 double ak = a[k]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL 85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 117 if (ak) 118 os_memcpy(ak, tmp3, 6); /* f5 */ 178 u8 mac_a[8], ak[6]; local 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 191 /* AUTN = (SQN ^ AK) || AMF || MAC */ 193 autn[i] = sqn[i] ^ ak[i] 212 u8 ak[6], mac_s[8]; local 275 u8 mac_a[8], ak[6], rx_sqn[6]; local [all...] |
crypto_openssl.c | 206 AES_KEY *ak; local 207 ak = os_malloc(sizeof(*ak)); 208 if (ak == NULL) 210 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 211 os_free(ak); 214 return ak; 232 AES_KEY *ak; local 233 ak = os_malloc(sizeof(*ak)); [all...] |
milenage.h | 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/speex/libspeex/ |
cb_search.h | 53 spx_coef_t ak[], /* LPCs for this subframe */ 79 spx_coef_t ak[], /* LPCs for this subframe */
|
lsp.h | 57 void lsp_to_lpc(spx_lsp_t *freq, spx_coef_t *ak, int lpcrdr, char *stack);
|
filters.h | 73 void syn_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 74 void residue_percep_zero16(const spx_word16_t *xx, const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 76 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack); 81 spx_coef_t *ak, /*LPC filter coefs*/
|
ltp.h | 61 spx_coef_t ak[], /* LPCs for this subframe */ 104 spx_coef_t ak[], /* LPCs for this subframe */
|
filters_bfin.h | 368 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) 428 : "a" (awk2), "a" (ak), "d" (ord), "m" (N), "0" (ytmp2), "1" (y) 438 void compute_impulse_response(const spx_coef_t *ak, const spx_coef_t *awk1, const spx_coef_t *awk2, spx_word16_t *y, int N, int ord, char *stack) 458 yi2 = MAC16_16(yi2, ak[j], -y[i-j-1]);
|
cb_search.c | 102 spx_coef_t ak[], /* LPCs for this subframe */ 234 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack); 244 spx_coef_t ak[], /* LPCs for this subframe */ 297 split_cb_search_shape_sign_N1(target,ak,awk1,awk2,par,p,nsf,exc,r,bits,stack,update_target); 507 syn_percep_zero16(r2, ak, awk1, awk2, r2, nsf,p, stack); 574 spx_coef_t ak[], /* LPCs for this subframe */ 591 residue_percep_zero16(target, ak, awk1, awk2, tmp, nsf, p, stack);
|
lsp.c | 50 LSPs are used to encode the LPC filter coefficients {ak} for 53 direct quantisation of {ak}. 55 A(z) is a polynomial of order lpcrdr with {ak} as the coefficients. 76 To convert back to ak we just evaluate (1), "clocking" an impulse 78 {ak}. 403 void lsp_to_lpc(spx_lsp_t *freq,spx_coef_t *ak,int lpcrdr, char *stack) 405 /* float *ak array of LPC coefficients */ 510 /* hard limit ak's to +/- 32767 */ 514 ak[j-1] = (short)a; 522 void lsp_to_lpc(spx_lsp_t *freq,spx_coef_t *ak,int lpcrdr, char *stack [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_openssl.c | 162 AES_KEY *ak; local 163 ak = os_malloc(sizeof(*ak)); 164 if (ak == NULL) 166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) { 167 os_free(ak); 170 return ak; 188 AES_KEY *ak; local 189 ak = os_malloc(sizeof(*ak)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 53 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 48 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 144 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 226 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) 290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 114 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 122 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { 287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 291 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 298 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
|