/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[ 100 #undef tk macro [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_utils.c | 451 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) argument 453 UINT8 *p = tk; 459 key.p_data = tk;
|
H A D | smp_int.h | 192 BT_OCTET16 tk; member in struct:__anon1450 295 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/external/dropbear/libtomcrypt/src/math/fp/ |
H A D | ltc_ecc_fp_mulmod.c | 784 void *tk, *order; local 807 if ((err = mp_init(&tk)) != CRYPT_OK) { 811 if ((err = mp_mod(k, order, tk)) != CRYPT_OK) { 812 mp_clear(tk); 817 tk = k; 821 tk = k; 833 if (mp_unsigned_bin_size(tk) > (sizeof(kb) - 2)) { 834 if (tk != k) { 835 mp_clear(tk); 842 if ((err = mp_to_unsigned_bin(tk, k [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | md5.c | 35 u8 tk[16]; local 49 md5_vector(1, &key, &key_len, tk); 50 key = tk;
|
H A D | sha256.c | 35 unsigned char tk[32]; local 49 sha256_vector(1, &key, &key_len, tk); 50 key = tk;
|
H A D | crypto_internal.c | 72 u8 tk[20]; local 92 MD5Final(tk, &ctx->u.md5); 93 key = tk; 110 SHA1Final(tk, &ctx->u.sha1); 111 key = tk;
|
H A D | sha1.c | 36 unsigned char tk[20]; local 50 sha1_vector(1, &key, &key_len, tk); 51 key = tk;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 252 u8 *tk; local 259 tk = data->key_data; 260 if (tk == NULL) 262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 267 os_memcpy(data->ipmk, tk, 40); 270 os_memcpy(data->cmk, tk + 40, 20); 287 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 288 peap_prfplus(data->peap_version, tk, 40, "Inner Methods Compound Keys",
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 246 u8 *tk; local 253 tk = data->key_data; 254 if (tk == NULL) 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 261 os_memcpy(data->ipmk, tk, 40); 264 os_memcpy(data->cmk, tk + 40, 20); 281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 282 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_peap.c | 246 u8 *tk; local 253 tk = data->key_data; 254 if (tk == NULL) 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 261 os_memcpy(data->ipmk, tk, 40); 264 os_memcpy(data->cmk, tk + 40, 20); 281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 282 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 246 u8 *tk; local 253 tk = data->key_data; 254 if (tk == NULL) 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 261 os_memcpy(data->ipmk, tk, 40); 264 os_memcpy(data->cmk, tk + 40, 20); 281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 282 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/freetype/src/psaux/ |
H A D | afmparse.c | 586 AFM_TrackKern tk; local 618 tk = fi->TrackKerns + n; 628 tk->degree = shared_vals[0].u.i; 629 tk->min_ptsize = shared_vals[1].u.f; 630 tk->min_kern = shared_vals[2].u.f; 631 tk->max_ptsize = shared_vals[3].u.f; 632 tk->max_kern = shared_vals[4].u.f;
|