Searched defs:msk (Results 1 - 25 of 87) sorted by relevance

1234

/external/pixman/test/
H A Dpdf-op-test.c54 pixman_image_t *msk = NULL; local
57 msk = pixman_image_create_bits (
69 pixman_image_composite (op, src, msk, dst,
74 if (msk)
75 pixman_image_unref (msk);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
H A Deap_fast_common.c145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument
154 msk, EAP_FAST_KEY_LEN);
156 msk, EAP_FAST_KEY_LEN);
H A Deap_gpsk_common.c111 u8 *msk, u8 *emsk,
168 os_memcpy(msk, pos, EAP_MSK_LEN);
190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
218 msk, emsk, sk, *sk_len,
226 u8 *msk, u8 *emsk,
252 msk, emsk, sk, *sk_len,
270 * @msk: Buffer for 64-byte MSK
283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
319 msk, emsk, sk, sk_len,
326 msk, ems
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_pwd_common.c289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
342 os_memcpy(msk, msk_emsk, EAP_MSK_LEN);
286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.c254 * @msk: Buffer for 64-byte MSK
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
294 os_memcpy(msk, key_buf, EAP_MSK_LEN);
296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
H A Deap_fast_common.c145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument
154 msk, EAP_FAST_KEY_LEN);
156 msk, EAP_FAST_KEY_LEN);
H A Deap_gpsk_common.c111 u8 *msk, u8 *emsk,
168 os_memcpy(msk, pos, EAP_MSK_LEN);
190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
218 msk, emsk, sk, *sk_len,
226 u8 *msk, u8 *emsk,
252 msk, emsk, sk, *sk_len,
270 * @msk: Buffer for 64-byte MSK
283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
319 msk, emsk, sk, sk_len,
326 msk, ems
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_pwd_common.c289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
342 os_memcpy(msk, msk_emsk, EAP_MSK_LEN);
286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.c254 * @msk: Buffer for 64-byte MSK
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
294 os_memcpy(msk, key_buf, EAP_MSK_LEN);
296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
H A Deap_fast_common.c145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument
154 msk, EAP_FAST_KEY_LEN);
156 msk, EAP_FAST_KEY_LEN);
/external/chromium_org/third_party/opus/src/celt/
H A Dentenc.c247 opus_uint32 msk; local
253 msk=(EC_CODE_TOP-1)>>l;
254 end=(_this->val+msk)&~msk;
255 if((end|msk)>=_this->val+_this->rng){
257 msk>>=1;
258 end=(_this->val+msk)&~msk;
/external/chromium_org/v8/src/compiler/arm/
H A Dinstruction-selector-arm-unittest.cc1726 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local
1728 m.Return(m.Word32Shr(m.Word32And(m.Parameter(0), m.Int32Constant(msk)),
1743 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local
1745 m.Return(m.Word32Shr(m.Word32And(m.Int32Constant(msk), m.Parameter(0)),
/external/libopus/celt/
H A Dentenc.c247 opus_uint32 msk; local
253 msk=(EC_CODE_TOP-1)>>l;
254 end=(_this->val+msk)&~msk;
255 if((end|msk)>=_this->val+_this->rng){
257 msk>>=1;
258 end=(_this->val+msk)&~msk;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
433 os_memcpy(key, data->msk, EAP_MSK_LEN);
H A Deap_sake.c26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
448 os_memcpy(key, data->msk, EAP_MSK_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gpsk.c21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data
412 data->msk, data->emsk,
564 os_memcpy(key, data->msk, EAP_MSK_LEN);
H A Deap_server_psk.c28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
456 os_memcpy(key, data->msk, EAP_MSK_LEN);
H A Deap_server_sake.c25 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
347 (u8 *) &data->tek, data->msk, data->emsk);
466 os_memcpy(key, data->msk, EAP_MSK_LEN);
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.c82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument
88 return aes_kdf_128(msk, "IEEE8021 EAP CAK",
99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument
115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
433 os_memcpy(key, data->msk, EAP_MSK_LEN);
H A Deap_sake.c26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
448 os_memcpy(key, data->msk, EAP_MSK_LEN);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gpsk.c21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data
412 data->msk, data->emsk,
564 os_memcpy(key, data->msk, EAP_MSK_LEN);

Completed in 379 milliseconds

1234