/external/pixman/test/ |
H A D | pdf-op-test.c | 54 pixman_image_t *msk = NULL; local 57 msk = pixman_image_create_bits ( 69 pixman_image_composite (op, src, msk, dst, 74 if (msk) 75 pixman_image_unref (msk);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, 14 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
|
H A D | ieee802_1x_key.c | 82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 88 return aes_kdf_128(msk, "IEEE8021 EAP CAK", 99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, 14 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
|
H A D | ieee802_1x_key.c | 82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 88 return aes_kdf_128(msk, "IEEE8021 EAP CAK", 99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, 14 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1,
|
H A D | ieee802_1x_key.c | 82 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 88 return aes_kdf_128(msk, "IEEE8021 EAP CAK", 99 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, argument 115 res = aes_kdf_128(msk, "IEEE8021 EAP CKN", context, ctx_len * 8,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 276 u8 *msk, size_t *len) 297 os_memcpy(msk, key, keylen); 311 struct mka_key *msk; local 321 msk = os_zalloc(sizeof(*msk)); 325 if (!msk || !sid || !ckn || !cak) 328 msk->len = DEFAULT_KEY_LEN; 329 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { 343 if (ieee802_1x_cak_128bits_aes_cmac(msk 275 ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr, u8 *msk, size_t *len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 319 msk, emsk, sk, sk_len, 326 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_fast_common.h | 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 319 msk, emsk, sk, sk_len, 326 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_fast_common.h | 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 319 msk, emsk, sk, sk_len, 326 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/chromium_org/third_party/opus/src/celt/ |
H A D | entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/libopus/celt/ |
H A D | entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/compiler/ |
H A D | radeon_program_constants.h | 121 #define GET_BIT(msk, idx) (((msk) >> (idx)) & 0x1)
|
/external/mesa3d/src/gallium/drivers/r300/compiler/ |
H A D | radeon_program_constants.h | 121 #define GET_BIT(msk, idx) (((msk) >> (idx)) & 0x1)
|