Searched defs:tk (Results 1 - 25 of 39) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/wpa_supplicant_8/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-alg-fst.c45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[
100 #undef tk macro
[all...]
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_utils.c451 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) argument
453 UINT8 *p = tk;
459 key.p_data = tk;
H A Dsmp_int.h192 BT_OCTET16 tk; member in struct:__anon1450
295 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
/external/dropbear/libtomcrypt/src/math/fp/
H A Dltc_ecc_fp_mulmod.c784 void *tk, *order; local
807 if ((err = mp_init(&tk)) != CRYPT_OK) {
811 if ((err = mp_mod(k, order, tk)) != CRYPT_OK) {
812 mp_clear(tk);
817 tk = k;
821 tk = k;
833 if (mp_unsigned_bin_size(tk) > (sizeof(kb) - 2)) {
834 if (tk != k) {
835 mp_clear(tk);
842 if ((err = mp_to_unsigned_bin(tk, k
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dmd5.c35 u8 tk[16]; local
49 md5_vector(1, &key, &key_len, tk);
50 key = tk;
H A Dsha256.c35 unsigned char tk[32]; local
49 sha256_vector(1, &key, &key_len, tk);
50 key = tk;
H A Dcrypto_internal.c72 u8 tk[20]; local
92 MD5Final(tk, &ctx->u.md5);
93 key = tk;
110 SHA1Final(tk, &ctx->u.sha1);
111 key = tk;
H A Dsha1.c36 unsigned char tk[20]; local
50 sha1_vector(1, &key, &key_len, tk);
51 key = tk;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_peap.c252 u8 *tk; local
259 tk = data->key_data;
260 if (tk == NULL)
262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
267 os_memcpy(data->ipmk, tk, 40);
270 os_memcpy(data->cmk, tk + 40, 20);
287 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
288 peap_prfplus(data->peap_version, tk, 40, "Inner Methods Compound Keys",
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_peap.c246 u8 *tk; local
253 tk = data->key_data;
254 if (tk == NULL)
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
261 os_memcpy(data->ipmk, tk, 40);
264 os_memcpy(data->cmk, tk + 40, 20);
281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
282 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_peap.c246 u8 *tk; local
253 tk = data->key_data;
254 if (tk == NULL)
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
261 os_memcpy(data->ipmk, tk, 40);
264 os_memcpy(data->cmk, tk + 40, 20);
281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
282 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_peap.c246 u8 *tk; local
253 tk = data->key_data;
254 if (tk == NULL)
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
261 os_memcpy(data->ipmk, tk, 40);
264 os_memcpy(data->cmk, tk + 40, 20);
281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
282 if (peap_prfplus(data->peap_version, tk, 40,
/external/freetype/src/psaux/
H A Dafmparse.c586 AFM_TrackKern tk; local
618 tk = fi->TrackKerns + n;
628 tk->degree = shared_vals[0].u.i;
629 tk->min_ptsize = shared_vals[1].u.f;
630 tk->min_kern = shared_vals[2].u.f;
631 tk->max_ptsize = shared_vals[3].u.f;
632 tk->max_kern = shared_vals[4].u.f;

Completed in 438 milliseconds

12