HomeSort by: relevance | last modified time | path
    Searched defs:tk (Results 1 - 25 of 38) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/src/crypto/
sha384.c 30 unsigned char tk[48]; local
44 if (sha384_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
sha512.c 30 unsigned char tk[64]; local
44 if (sha512_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
md5.c 30 u8 tk[16]; local
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
91 os_memset(tk, 0, sizeof(tk));
sha1.c 30 unsigned char tk[20]; local
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
90 forced_memzero(tk, sizeof(tk));
sha256.c 30 unsigned char tk[32]; local
45 if (sha256_vector(1, &key, &key_len, tk) < 0)
47 key = tk;
94 forced_memzero(tk, sizeof(tk));
crypto_internal.c 44 u8 tk[32]; local
79 MD5Final(tk, &ctx->u.md5);
80 key = tk;
98 SHA1Final(tk, &ctx->u.sha1);
99 key = tk;
118 sha256_done(&ctx->u.sha256, tk);
119 key = tk;
  /src/sys/netinet/
sctp_hashdriver.c 81 unsigned char tk[20]; local
89 MD5Final(tk, &tctx);
90 key = tk;
96 SHA1Final(tk, &tctx);
97 key = tk;
168 unsigned char tk[20]; local
176 MD5Final(tk, &tctx);
177 key = tk;
183 SHA1Final(tk, &tctx);
184 key = tk;
    [all...]
  /src/external/bsd/tcpdump/dist/
signature.c 60 unsigned char tk[16]; local
70 MD5_Final(tk, &tctx);
72 key = tk;
  /src/external/mpl/dhcp/dist/omapip/
auth.c 80 omapi_auth_key_t *tk; local
87 tk = (omapi_auth_key_t *)0;
89 omapi_auth_key_hash_lookup (&tk, auth_key_hash,
91 if (tk == a) {
92 omapi_auth_key_dereference (&tk, MDL);
95 if (tk) {
97 tk -> name, 0, MDL);
98 omapi_auth_key_dereference (&tk, MDL);
  /src/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.c 45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[0][3] ^= S[tk[KC-1][0]]
100 #undef tk macro
    [all...]
  /src/lib/libcrypt/
hmac.c 77 unsigned char tk[HASH_LENGTH]; local
89 HASH_Final(tk, &tctx);
91 key = tk;
  /src/lib/libresolv/
hmac_link.c 218 u_char tk[MD5_LEN]; local
233 MD5Final(tk, &ctx);
235 key = tk;
  /src/external/bsd/libbind/dist/dst/
hmac_link.c 228 u_char tk[MD5_LEN]; local
243 MD5Final(tk, &ctx);
245 key = tk;
  /src/sys/arch/sparc64/sparc64/
clock.c 628 int64_t tk = t; local
635 (long long)t, (long long)clk, (long long)tk, (long long)tick_base);
  /src/external/bsd/openldap/dist/contrib/slapd-modules/ppm/
ppm.c 468 char * tk; local
495 tk = strtok(val, ATTR_TOKENS_DELIMITERS);
497 while (tk != NULL)
499 if (strlen(tk) > 2)
503 tk,
507 reti = regcomp(&regex, tk, REG_ICASE);
509 ppm_log(LOG_ERR, "ppm: Cannot compile regex: %s", tk);
528 tk,
532 tk = strtok(NULL, ATTR_TOKENS_DELIMITERS);
  /src/external/bsd/ppp/dist/pppd/
peap.c 88 u_char tk[PEAP_TLV_TK_LEN]; member in struct:peap_state
193 generate_cmk(psm->ipmk, psm->tk, nonce, out_buf, 0);
304 SSL_export_keying_material(psm->ssl, psm->tk, PEAP_TLV_TK_LEN,
315 generate_cmk(psm->ipmk, psm->tk, psm->nonce, outp, 1);
  /src/external/bsd/wpa/dist/src/common/
common_module_tests.c 637 const u8 tk[] = { local
665 if (ptk.tk_len != sizeof(tk) ||
666 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) {
667 wpa_printf(MSG_ERROR, "PASN: Mismatched TK");
716 const u8 tk[] = { local
750 if (ptk.tk_len != sizeof(tk) ||
751 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0)
    [all...]
  /src/external/bsd/tmux/dist/
tty-keys.c 436 struct tty_key *tk; local
441 if ((tk = tty_keys_find(tty, s, strlen(s), &size)) == NULL) {
446 tk->key = key;
454 struct tty_key *tk; local
457 tk = *tkp;
458 if (tk == NULL) {
459 tk = *tkp = xcalloc(1, sizeof *tk);
460 tk->ch = *s;
461 tk->key = KEYC_UNKNOWN
614 struct tty_key *tk, *tk1; local
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_anchor.c 864 struct ta_key* tk; local
915 for(tk = ta->keylist; tk; tk = tk->next) {
916 if(tk->type != type)
918 pd->rr_len[i] = tk->len;
920 pd->rr_data[i] = tk->data;
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_peap.c 269 u8 *tk; local
274 * Tunnel key (TK) is the first 60 octets of the key generated by
277 tk = data->key_data;
278 if (tk == NULL)
280 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
288 /* Fast-connect: IPMK|CMK = TK */
289 os_memcpy(data->ipmk, tk, 40);
290 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
292 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /src/external/gpl2/groff/dist/src/preproc/eqn/
lex.cpp 1087 int tk = get_token(1); local
1088 switch(tk) {
1146 return tk;
  /src/external/gpl2/xcvs/dist/lib/
mktime.c 558 check_result (time_t tk, struct tm tmk, time_t tl, const struct tm *lt)
560 if (tk != tl || !lt || not_equal_tm (&tmk, lt))
566 printf (") == %ld, should be %ld\n", (long int) tk, (long int) tl);
579 time_t tk, tl, tl1;
619 tk = mktime (&tmk);
620 status |= check_result (tk, tmk, tl, &tml);
639 tk = tl;
640 status |= check_result (tk, tmk, tl, &tml);
578 time_t tk, tl, tl1; local
  /src/games/adventure/
init.c 123 int tk[21], stick, dtotal, attack; variable
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_peap.c 329 u8 *tk; local
347 * Tunnel key (TK) is the first 60 octets of the key generated by
350 tk = eap_server_tls_derive_key(sm, &data->ssl, label,
353 if (tk == NULL)
355 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
358 /* Fast-connect: IPMK|CMK = TK */
359 os_memcpy(data->ipmk, tk, 40);
360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
362 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/d/
typeinfo.cc 160 make_internal_typeinfo (tinfo_kind tk, Identifier *ident, ...)
186 tinfo_types[tk] = type;
1548 tinfo_kind tk = get_typeinfo_kind (t); local
1549 switch (tk)
1560 if (tk == TK_SHARED_TYPE)
1566 else if (tk == TK_CONST_TYPE)
1571 else if (tk == TK_IMMUTABLE_TYPE)
1576 else if (tk == TK_INOUT_TYPE)
1581 else if (tk == TK_POINTER_TYPE)
1586 else if (tk == TK_ARRAY_TYPE
    [all...]

Completed in 45 milliseconds

1 2