/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 117 u32 *rk = ctx; local [all...] |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 152 u32 *rk = ctx; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 117 u32 *rk = ctx; local [all...] |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 152 u32 *rk = ctx; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-internal.c | 779 int rijndaelKeySetupEnc(u32 rk[], const u8 cipherKey[], int keyBits) argument 784 rk[0] = GETU32(cipherKey ); 785 rk[1] = GETU32(cipherKey + 4); 786 rk[2] = GETU32(cipherKey + 8); 787 rk[3] = GETU32(cipherKey + 12); 791 temp = rk[3]; 792 rk[4] = rk[0] ^ TE421(temp) ^ TE432(temp) ^ 794 rk[5] = rk[ [all...] |
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 34 s0 = GETU32(pt ) ^ rk[0]; 35 s1 = GETU32(pt + 4) ^ rk[1]; 36 s2 = GETU32(pt + 8) ^ rk[2]; 37 s3 = GETU32(pt + 12) ^ rk[3]; 40 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 41 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 42 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 43 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3] 65 rk 100 u32 *rk; local 117 u32 *rk = ctx; local [all...] |
H A D | aes-internal-dec.c | 28 static int rijndaelKeySetupDec(u32 rk[], const u8 cipherKey[], int keyBits) argument 34 Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); 39 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; 40 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[ 61 u32 *rk; local 152 u32 *rk = ctx; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/aes/ |
H A D | aes.c | 561 uint32_t *rk; local 583 rk = aeskey->rd_key; 585 rk[0] = GETU32(key); 586 rk[1] = GETU32(key + 4); 587 rk[2] = GETU32(key + 8); 588 rk[3] = GETU32(key + 12); 591 temp = rk[3]; 592 rk[4] = rk[0] ^ (Te2[(temp >> 16) & 0xff] & 0xff000000) ^ 596 rk[ 656 uint32_t *rk; local 704 const uint32_t *rk; local 892 const uint32_t *rk; local [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) { argument 158 *((word32*)temp[0]) = *((word32*)(a )) ^ *((word32*)rk[0][0]); 159 *((word32*)temp[1]) = *((word32*)(a+ 4)) ^ *((word32*)rk[0][1]); 160 *((word32*)temp[2]) = *((word32*)(a+ 8)) ^ *((word32*)rk[0][2]); 161 *((word32*)temp[3]) = *((word32*)(a+12)) ^ *((word32*)rk[0][3]); 179 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[r][0]); 180 *((word32*)temp[1]) = *((word32*)(b+ 4)) ^ *((word32*)rk[r][1]); 181 *((word32*)temp[2]) = *((word32*)(b+ 8)) ^ *((word32*)rk[r][2]); 182 *((word32*)temp[3]) = *((word32*)(b+12)) ^ *((word32*)rk[r][3]); 202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUND 240 rijndaelEncryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) argument 307 rijndaelDecrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) argument 409 rijndaelDecryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) argument [all...] |
/external/eigen/unsupported/Eigen/src/Splines/ |
H A D | Spline.h | 412 DenseIndex rk,pk,j1,j2; local 413 rk = r-k; pk = p-k; 417 a(s2,0) = a(s1,0)/ndu(pk+1,rk); 418 d = a(s2,0)*ndu(rk,pk); 421 if (rk>=-1) j1 = 1; 422 else j1 = -rk; 429 a(s2,j) = (a(s1,j)-a(s1,j-1))/ndu(pk+1,rk+j); 430 d += a(s2,j)*ndu(rk+j,pk);
|
/external/openssl/crypto/aes/ |
H A D | aes_core.c | 631 u32 *rk; local 640 rk = key->rd_key; 649 rk[0] = GETU32(userKey ); 650 rk[1] = GETU32(userKey + 4); 651 rk[2] = GETU32(userKey + 8); 652 rk[3] = GETU32(userKey + 12); 655 temp = rk[3]; 656 rk[4] = rk[0] ^ 662 rk[ 732 u32 *rk; local 784 const u32 *rk; local 975 const u32 *rk; local 1206 u32 *rk; local 1307 u32 *rk; local [all...] |
H A D | aes_x86core.c | 473 u32 *rk; local 482 rk = key->rd_key; 491 rk[0] = GETU32(userKey ); 492 rk[1] = GETU32(userKey + 4); 493 rk[2] = GETU32(userKey + 8); 494 rk[3] = GETU32(userKey + 12); 497 temp = rk[3]; 498 rk[4] = rk[0] ^ 504 rk[ 574 u32 *rk; local 655 const u32 *rk; local 867 const u32 *rk; local [all...] |
/external/qemu/util/ |
H A D | aes.c | 729 u32 *rk; local 738 rk = key->rd_key; 747 rk[0] = GETU32(userKey ); 748 rk[1] = GETU32(userKey + 4); 749 rk[2] = GETU32(userKey + 8); 750 rk[3] = GETU32(userKey + 12); 753 temp = rk[3]; 754 rk[4] = rk[0] ^ 760 rk[ 830 u32 *rk; local 883 const u32 *rk; local 1074 const u32 *rk; local [all...] |
/external/eigen/Eigen/src/SPQRSupport/ |
H A D | SuiteSparseQRSupport.h | 153 Index rk = this->rank(); local 154 y.topRows(rk) = this->matrixR().topLeftCorner(rk, rk).template triangularView<Upper>().solve(y.topRows(rk)); 155 y.bottomRows(cols()-rk).setZero();
|
/external/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 129 unsigned char *rk = NULL; local 131 rklen = i2d_RSAPrivateKey(pkey->pkey.rsa, &rk); 140 V_ASN1_NULL, NULL, rk, rklen))
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | p_rsa_asn1.c | 112 uint8_t *rk = NULL; local 115 rklen = i2d_RSAPrivateKey(pkey->pkey.rsa, &rk); 124 V_ASN1_NULL, NULL, rk, rklen)) {
|
/external/pdfium/core/src/fxcodec/lcms2/lcms2-2.6/src/ |
H A D | cmsintrp.c | 263 cmsS15Fixed16Number k0, k1, rk, K0, K1; local 272 rk = (cmsUInt16Number) FIXED_REST_TO_INT(fk); 281 Output[OutChan] = LinearInterp(rk, LutTable[K0+OutChan], LutTable[K1+OutChan]); 833 cmsS15Fixed16Number k0, rk; local 855 rk = FIXED_REST_TO_INT(fk); 1002 Output[i] = LinearInterp(rk, Tmp1[i], Tmp2[i]); 1063 cmsS15Fixed16Number k0, rk; local 1073 rk = FIXED_REST_TO_INT(fk); 1093 Output[i] = LinearInterp(rk, Tmp1[i], Tmp2[i]); 1151 cmsS15Fixed16Number k0, rk; local 1237 cmsS15Fixed16Number k0, rk; local 1323 cmsS15Fixed16Number k0, rk; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 1395 SECItem * rk = NULL; local 1433 rk = isClient ? &readKey : &writeKey; 1442 PRINT_BUF(7, (ss, "Session read-key: ", rk->data, rk->len)); 1450 rv = ssl2_CreateMAC(&ss->sec, rk, wk, cipherType); 1471 CKA_DECRYPT, rk, param, 1513 if (rk) { 1514 SECITEM_ZfreeItem(rk, PR_FALSE);
|
/external/qemu/target-i386/ |
H A D | ops_sse.h | 2220 Reg rk = *s; local 2223 d->L(i) = rk.L(i) ^ bswap32(AES_Td0[st.B(aes_ishifts[4*i+0])] ^ 2234 Reg rk = *s; local 2237 d->B(i) = rk.B(i) ^ (AES_Td4[st.B(aes_ishifts[i])] & 0xff); 2245 Reg rk = *s; local 2248 d->L(i) = rk.L(i) ^ bswap32(AES_Te0[st.B(aes_shifts[4*i+0])] ^ 2259 Reg rk = *s; local 2262 d->B(i) = rk.B(i) ^ (AES_Te4[st.B(aes_shifts[i])] & 0xff);
|