/external/pixman/test/ |
H A D | pdf-op-test.c | 54 pixman_image_t *msk = NULL; local 57 msk = pixman_image_create_bits ( 69 pixman_image_composite (op, src, msk, dst, 74 if (msk) 75 pixman_image_unref (msk);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 154 msk, EAP_FAST_KEY_LEN); 156 msk, EAP_FAST_KEY_LEN);
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 319 msk, emsk, sk, sk_len, 326 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_pwd_common.c | 289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 342 os_memcpy(msk, msk_emsk, EAP_MSK_LEN); 286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.c | 254 * @msk: Buffer for 64-byte MSK 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 154 msk, EAP_FAST_KEY_LEN); 156 msk, EAP_FAST_KEY_LEN);
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 319 msk, emsk, sk, sk_len, 326 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_pwd_common.c | 289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 342 os_memcpy(msk, msk_emsk, EAP_MSK_LEN); 286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.c | 254 * @msk: Buffer for 64-byte MSK 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 154 msk, EAP_FAST_KEY_LEN); 156 msk, EAP_FAST_KEY_LEN);
|
/external/chromium_org/third_party/opus/src/celt/ |
H A D | entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/chromium_org/v8/src/compiler/arm/ |
H A D | instruction-selector-arm-unittest.cc | 1726 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local 1728 m.Return(m.Word32Shr(m.Word32And(m.Parameter(0), m.Int32Constant(msk)), 1743 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local 1745 m.Return(m.Word32Shr(m.Word32And(m.Int32Constant(msk), m.Parameter(0)),
|
/external/libopus/celt/ |
H A D | entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 433 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 448 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 412 data->msk, data->emsk, 564 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_server_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 456 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_server_sake.c | 25 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 347 (u8 *) &data->tek, data->msk, data->emsk); 466 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 88 return aes_kdf_128(msk, "IEEE8021 EAP CAK", 99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 433 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 448 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 412 data->msk, data->emsk, 564 os_memcpy(key, data->msk, EAP_MSK_LEN);
|