/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_eap_sim_common.c | 21 u8 xkey[] = { local 36 eap_sim_prf(xkey, buf, sizeof(buf));
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_eap_sim_common.c | 15 u8 xkey[] = { local 30 eap_sim_prf(xkey, buf, sizeof(buf));
|
/external/qemu/distrib/sdl-1.2.15/src/video/dga/ |
H A D | SDL_dgaevents.c | 82 XKeyEvent xkey; local 84 SDL_NAME(XDGAKeyEventToXKeyEvent)(&xevent.xkey, &xkey); 85 keycode = xkey.keycode; 87 printf("KeyPress (X11 keycode = 0x%X)\n", xkey.keycode); 100 if ( XLookupString(&xkey, keybuf, sizeof(keybuf), NULL, &state) ) { 118 XKeyEvent xkey; local 120 SDL_NAME(XDGAKeyEventToXKeyEvent)(&xevent.xkey, &xkey); 121 keycode = xkey [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | fips_prf_internal.c | 19 u8 xkey[64]; local 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len); 47 SHA1Transform(_t, xkey); 58 carry += xkey[k] + xpos[k]; 59 xkey[k] = carry & 0xff;
|
H A D | fips_prf_openssl.c | 28 u8 xkey[64]; local 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len); 56 sha1_transform((u8 *) _t, xkey); 67 carry += xkey[k] + xpos[k]; 68 xkey[k] = carry & 0xff;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | fips_prf_internal.c | 19 u8 xkey[64]; local 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len); 47 SHA1Transform(_t, xkey); 58 carry += xkey[k] + xpos[k]; 59 xkey[k] = carry & 0xff;
|
H A D | fips_prf_openssl.c | 28 u8 xkey[64]; local 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len); 56 sha1_transform((u8 *) _t, xkey); 67 carry += xkey[k] + xpos[k]; 68 xkey[k] = carry & 0xff;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | fips_prf_internal.c | 19 u8 xkey[64]; local 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len); 47 SHA1Transform(_t, xkey); 58 carry += xkey[k] + xpos[k]; 59 xkey[k] = carry & 0xff;
|
H A D | fips_prf_openssl.c | 28 u8 xkey[64]; local 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len); 56 sha1_transform((u8 *) _t, xkey); 67 carry += xkey[k] + xpos[k]; 68 xkey[k] = carry & 0xff;
|
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | rc2.c | 72 unsigned *xkey = skey->rc2.xkey; local 108 /* Phase 3 - copy to xkey in little-endian order */ 110 xkey[i] = (unsigned)tmp[2*i] + ((unsigned)tmp[2*i+1] << 8); 140 unsigned *xkey; local 147 xkey = skey->rc2.xkey; 155 x10 = (x10 + (x32 & ~x76) + (x54 & x76) + xkey[4*i+0]) & 0xFFFF; 158 x32 = (x32 + (x54 & ~x10) + (x76 & x10) + xkey[4*i+1]) & 0xFFFF; 161 x54 = (x54 + (x76 & ~x32) + (x10 & x32) + xkey[ 219 unsigned *xkey; local [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/Xext/extensions/ |
H A D | xf86dga.h | 136 SDL_NAME(XDGAKeyEvent) xkey; member in union:__anon10624
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 107 u8 xkey[64]; local 113 if (seed_len > sizeof(xkey)) 114 seed_len = sizeof(xkey); 118 os_memcpy(xkey, seed, seed_len); 119 os_memset(xkey + seed_len, 0, 64 - seed_len); 134 sha1_transform((u8 *) _t, xkey); 145 carry += xkey[k] + xpos[k]; 146 xkey[k] = carry & 0xff;
|
H A D | sha1.c | 419 u8 xkey[64]; local 425 if (seed_len > sizeof(xkey)) 426 seed_len = sizeof(xkey); 430 os_memcpy(xkey, seed, seed_len); 431 os_memset(xkey + seed_len, 0, 64 - seed_len); 446 SHA1Transform(_t, xkey); 457 carry += xkey[k] + xpos[k]; 458 xkey[k] = carry & 0xff;
|
/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
H A D | SDL_x11events.c | 317 (peekevent.xkey.keycode == event->xkey.keycode) && 318 ((peekevent.xkey.time-event->xkey.time) < 2) ) { 561 KeyCode keycode = xevent.xkey.keycode; 564 printf("KeyPress (X11 keycode = 0x%X)\n", xevent.xkey.keycode); 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 734 if ( XLookupString(&xevent.xkey, 754 KeyCode keycode = xevent.xkey 1255 XKeyEvent xkey; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 117 u8 xkey[SHA1_MAC_LEN]; local 148 sha1_vector(4, addr, len, xkey); 149 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 151 if (eap_sim_prf(xkey, buf, sizeof(buf)) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; local 143 sha1_vector(4, addr, len, xkey); 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 146 if (eap_sim_prf(xkey, buf, sizeof(buf)) < 0) {
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; local 143 sha1_vector(4, addr, len, xkey); 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 146 if (eap_sim_prf(xkey, buf, sizeof(buf)) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; local 143 sha1_vector(4, addr, len, xkey); 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 146 if (eap_sim_prf(xkey, buf, sizeof(buf)) < 0) {
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_cipher.h | 87 struct rc2_key { unsigned xkey[64]; }; member in struct:rc2_key
|