HomeSort by relevance Sort by last modified time
    Searched defs:ak (Results 1 - 18 of 18) sorted by null

  /external/wpa_supplicant_8/src/crypto/
milenage.c 84 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
85 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
117 if (ak)
118 os_memcpy(ak, tmp3, 6); /* f5 */
178 u8 mac_a[8], ak[6]; local
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
191 /* AUTN = (SQN ^ AK) || AMF || MAC */
193 autn[i] = sqn[i] ^ ak[i]
212 u8 ak[6], mac_s[8]; local
275 u8 mac_a[8], ak[6], rx_sqn[6]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_openssl.c 162 AES_KEY *ak; local
163 ak = os_malloc(sizeof(*ak));
164 if (ak == NULL)
166 if (AES_set_encrypt_key(key, 8 * len, ak) < 0) {
167 os_free(ak);
170 return ak;
188 AES_KEY *ak; local
189 ak = os_malloc(sizeof(*ak));
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 44 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 40 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
389 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 90 * @ak: Buffer for AK = 48-bit anonymity key (f5), or %NULL
91 * @akstar: Buffer for AK = 48-bit anonymity key (f5*), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
123 if (ak)
124 os_memcpy(ak, tmp3, 6); /* f5 */
184 u8 mac_a[8], ak[6]; local
191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
197 /* AUTN = (SQN ^ AK) || AMF || MAC */
199 autn[i] = sqn[i] ^ ak[i]
218 u8 ak[6], mac_s[8]; local
281 u8 mac_a[8], ak[6], rx_sqn[6]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 37 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
eap_psk.c 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
52 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
144 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
158 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
226 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
233 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 35 u8 ak[EAP_PAX_AK_LEN]; member in struct:eap_pax_data
382 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
384 if (eap_pax_initial_key_derivation(data->mac_id, data->ak,
eap_server_psk.c 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
114 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
122 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {
287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
291 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
298 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
  /libcore/luni/src/main/java/java/util/
DualPivotQuicksort.java 193 int ak = a[k]; local
194 if (ak < pivot1) { // Move a[k] to left part
197 a[less] = ak;
200 } else if (ak > pivot2) { // Move a[k] to right part
209 a[great--] = ak;
212 a[great--] = ak;
238 int ak = a[k]; local
239 if (ak == pivot1) {
242 if (ak < pivot1) { // Move a[k] to left part
245 a[less] = ak;
319 int ak = a[k]; local
471 long ak = a[k]; local
516 long ak = a[k]; local
597 long ak = a[k]; local
766 short ak = a[k]; local
811 short ak = a[k]; local
892 short ak = a[k]; local
1059 char ak = a[k]; local
1104 char ak = a[k]; local
1185 char ak = a[k]; local
1567 float ak = a[k]; local
1727 float ak = a[k]; local
1772 float ak = a[k]; local
1853 float ak = a[k]; local
1940 double ak = a[k]; local
2100 double ak = a[k]; local
2145 double ak = a[k]; local
2226 double ak = a[k]; local
    [all...]
  /external/svox/pico/lib/
picofftsg.c 534 PICOFFTSG_FFTTYPE *aj, *ak, *amj, *amk; local
555 aj = a + 1; ak = a + k; amj = aj + m; amk = ak + m;
556 for (j = 1; j < mh; j++, aj++, ak--, amj++, amk--) {
560 yi = *ak;
564 *ak = xr + xi;
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.equinox.p2.artifact.repository_1.1.1.R36x_v20100901.jar 
org.eclipse.equinox.p2.metadata_2.0.0.v20100601.jar 
  /external/sqlite/dist/orig/
sqlite3.c 65062 } ak; member in union:vdbeExecUnion
    [all...]
  /external/sqlite/dist/
sqlite3.c 65075 } ak; member in union:vdbeExecUnion
    [all...]
  /prebuilts/tools/common/guava-tools/
guava-13.0.1.jar 

Completed in 501 milliseconds