HomeSort by relevance Sort by last modified time
    Searched refs:msk (Results 1 - 25 of 64) sorted by null

1 2 3

  /device/linaro/bootloader/edk2/QuarkSocPkg/QuarkNorthCluster/MemoryInit/Pei/
meminit_utils.c 51 uint32_t msk; local
61 msk = (byte_lane & BIT0) ? (BIT23 | BIT22 | BIT21 | BIT20) : (BIT11 | BIT10 | BIT9 | BIT8);
63 isbM32m(DDRPHY, reg, tempD, msk);
73 msk = (BIT29 | BIT28 | BIT27 | BIT26 | BIT25 | BIT24);
75 isbM32m(DDRPHY, reg, tempD, msk);
81 msk = 0x00;
84 msk |= (byte_lane & BIT0) ? (BIT5) : (BIT2);
87 tempD |= msk;
90 msk |= (byte_lane & BIT0) ? (BIT11) : (BIT8);
93 tempD |= msk;
161 uint32_t msk; local
227 uint32_t msk; local
338 uint32_t msk; local
446 uint32_t msk; local
562 uint32_t msk; local
673 uint32_t msk; local
1070 uint32_t msk[2]; \/\/ BLx in module local
    [all...]
  /device/linaro/bootloader/edk2/StdLib/LibC/Uefi/
select.c 109 int msk; local
120 for (msk = 0, n = 0; msk < 3; msk++) {
121 if (ibits[msk] == NULL)
124 bits = ibits[ msk ][ i / NFDBITS ];
129 pfd.events = flag[msk];
136 obits[msk][(fd)/NFDBITS] |=
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_key.h 12 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
14 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
ieee802_1x_key.c 82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
88 return aes_kdf_128(msk, "IEEE8021 EAP CAK",
99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
ieee802_1x_kay_i.h 73 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak);
74 int (*ckn_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2,
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 286 u8 *msk, size_t *len)
301 "Failed to get MSK from EAPOL state machines");
307 os_memcpy(msk, key, keylen);
321 struct mka_key *msk; local
331 msk = os_zalloc(sizeof(*msk));
335 if (!msk || !sid || !ckn || !cak)
338 msk->len = DEFAULT_KEY_LEN;
339 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len))
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
eap_sim_common.h 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
119 const u8 *nonce_s, u8 *msk,
eap_gpsk_common.c 112 u8 *msk, u8 *emsk,
168 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
169 os_memcpy(msk, pos, EAP_MSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
204 * MSK = GKDF-160 (MK, inputString)[0..63]
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
240 * MSK = GKDF-160 (MK, inputString)[0..63]
253 msk, emsk, sk, *sk_len,
271 * @msk: Buffer for 64-byte MS
    [all...]
eap_fast_common.h 102 int eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
eap_gpsk_common.h 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 70 u8 *msk, u8 *emsk);
eap_pwd_common.h 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
99 msk, EAP_SIM_KEYING_DATA_LEN);
109 const u8 *nonce_s, const u8 *mk, u8 *msk,
150 if (msk) {
151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
153 msk, EAP_SIM_KEYING_DATA_LEN);
278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk
    [all...]
eap_sake_common.h 86 u8 *tek, u8 *msk, u8 *emsk);
eap_fast_common.c 113 int eap_fast_derive_eap_msk(const u8 *simck, u8 *msk)
117 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64)
122 msk, EAP_FAST_KEY_LEN) < 0)
124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
125 msk, EAP_FAST_KEY_LEN);
eap_sake_common.c 254 * @msk: Buffer for 64-byte MSK
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
294 os_memcpy(msk, key_buf, EAP_MSK_LEN);
296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
eap_eke_common.h 104 u8 *msk, u8 *emsk);
eap_eke_common.c 547 u8 *msk, u8 *emsk)
556 * MSK | EMSK = prf+(SharedSecret, "EAP-EKE Exported Keys" | ID_S |
583 os_memcpy(msk, buf, EAP_MSK_LEN);
587 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: MSK", msk, EAP_MSK_LEN);
588 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: EMSK", msk, EAP_EMSK_LEN);
  /external/libopus/celt/
entenc.c 247 opus_uint32 msk; local
253 msk=(EC_CODE_TOP-1)>>l;
254 end=(_this->val+msk)&~msk;
255 if((end|msk)>=_this->val+_this->rng){
257 msk>>=1;
258 end=(_this->val+msk)&~msk;
  /external/mesa3d/src/gallium/drivers/r300/compiler/
radeon_program_constants.h 121 #define GET_BIT(msk, idx) (((msk) >> (idx)) & 0x1)
  /external/iptables/extensions/
libebt_ip.c 141 static void ebt_parse_ip_address(char *address, uint32_t *addr, uint32_t *msk)
148 if (ip_mask(p + 1, (unsigned char *)msk)) {
154 *msk = 0xFFFFFFFF;
161 *addr = *addr & *msk;
  /packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/
db_feature_detection.h 138 * \param msk row array pointer to mask image
142 const unsigned char * const * msk=NULL, unsigned char fgnd=255) const;
  /external/mesa3d/src/mesa/program/
prog_instruction.h 61 #define GET_BIT(msk, idx) (((msk) >> (idx)) & 0x1)
  /external/wpa_supplicant_8/src/common/
hw_features_common.c 464 le16 msk = host_to_le16(HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET | local
468 htcaps->ht_capabilities_info &= ~msk;
470 htcaps->ht_capabilities_info |= msk;

Completed in 240 milliseconds

1 2 3