/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_i.h | 102 int dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len); 108 int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len); 123 const u8 *Nx, size_t Nx_len,
|
H A D | dpp_auth.c | 48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success() 484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok() 488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok() 491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok() 1564 if (dpp_ecdh(auth->own_protocol_key, pr, auth->Nx, &secret_len) < 0) { in dpp_auth_resp_rx() 1573 auth->Nx, auth->secret_len); in dpp_auth_resp_rx() 1576 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_resp_rx()
|
H A D | dpp_pkex.c | 215 const u8 *Nx, const u8 *Ny) in dpp_pkex_build_exchange_resp() 293 wpabuf_put_data(msg, Nx, curve->prime_len); in dpp_pkex_build_exchange_resp() 295 os_memcpy(pkex->Nx, Nx, curve->prime_len); in dpp_pkex_build_exchange_resp() 551 pkex->Nx, curve->prime_len, pkex->code, in dpp_pkex_rx_exchange_req() 213 dpp_pkex_build_exchange_resp(struct dpp_pkex *pkex, enum dpp_status_error status, const u8 *Nx, const u8 *Ny) dpp_pkex_build_exchange_resp() argument
|
H A D | dpp_crypto.c | 395 int dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len) in dpp_derive_k2() argument 405 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 436 "DPP: Mx/Nx not available - cannot derive ke"); in dpp_derive_bk_ke() 446 addr[num_elem] = auth->Nx; in dpp_derive_bk_ke() 1118 int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len) in dpp_derive_pmk() argument 1128 if (dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk) < 0) in dpp_derive_pmk() 1589 const u8 *Nx, size_t Nx_len, in dpp_pkex_derive_z() 1631 os_memcpy(pos, Nx, Nx_len); in dpp_pkex_derive_z() 1586 dpp_pkex_derive_z(const u8 *mac_init, const u8 *mac_resp, u8 ver_init, u8 ver_resp, const u8 *Mx, size_t Mx_len, const u8 *Nx, size_t Nx_len, const char *code, const u8 *Kx, size_t Kx_len, u8 *z, unsigned int hash_len) dpp_pkex_derive_z() argument
|
H A D | dpp.h | 188 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; member 289 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; member
|
H A D | dpp.c | 3653 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; in dpp_peer_intro() local 3737 if (dpp_ecdh(own_key, peer_key, Nx, &Nx_len) < 0) in dpp_peer_intro() 3741 Nx, Nx_len); in dpp_peer_intro() 3744 if (dpp_derive_pmk(Nx, Nx_len, intro->pmk, curve->hash_len) < 0) { in dpp_peer_intro() 3760 os_memset(Nx, 0, sizeof(Nx)); in dpp_peer_intro()
|
/third_party/icu/icu4c/source/common/ |
H A D | ushape.cpp | 1203 int32_t lastPos,Nx, Nw; in shapeUnicode() local 1245 Nx = -2, Nw = 0; in shapeUnicode() 1251 while (Nx < 0) { /* we need to know about next char */ in shapeUnicode() 1254 Nx = 3000; in shapeUnicode() 1258 Nx = Nw; in shapeUnicode() 1344 if (i == Nx) { in shapeUnicode() 1346 Nx = -2; in shapeUnicode()
|
/third_party/node/deps/icu-small/source/common/ |
H A D | ushape.cpp | 1203 int32_t lastPos,Nx, Nw; in shapeUnicode() local 1245 Nx = -2, Nw = 0; in shapeUnicode() 1251 while (Nx < 0) { /* we need to know about next char */ in shapeUnicode() 1254 Nx = 3000; in shapeUnicode() 1258 Nx = Nw; in shapeUnicode() 1344 if (i == Nx) { in shapeUnicode() 1346 Nx = -2; in shapeUnicode()
|
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | ushape.cpp | 1203 int32_t lastPos,Nx, Nw; in shapeUnicode() local 1245 Nx = -2, Nw = 0; in shapeUnicode() 1251 while (Nx < 0) { /* we need to know about next char */ in shapeUnicode() 1254 Nx = 3000; in shapeUnicode() 1258 Nx = Nw; in shapeUnicode() 1344 if (i == Nx) { in shapeUnicode() 1346 Nx = -2; in shapeUnicode()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/Hexagon/ |
H A D | HexagonCommonGEP.cpp | 387 GepNode *Nx = new (*Mem) GepNode; in processGepInst() local 388 Nx->Parent = PN; // Link Nx to the previous node. in processGepInst() 389 Nx->Flags |= GepNode::Internal | InBounds; in processGepInst() 390 Nx->PTy = PtrTy; in processGepInst() 391 Nx->Idx = Op; in processGepInst() 392 Nodes.push_back(Nx); in processGepInst() 393 NodeOrder.insert(Nx); in processGepInst() 394 PN = Nx; in processGepInst()
|
H A D | RDFGraph.cpp | 397 NodeId Nx = Next; in append() local 401 NA.Addr->Next = Nx; in append()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.c | 1547 static int dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, in dpp_derive_k2() argument 1558 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 1590 "DPP: Mx/Nx not available - cannot derive ke"); in dpp_derive_ke() 1603 addr[num_elem] = auth->Nx; in dpp_derive_ke() 2521 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success() 2888 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok() 2892 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok() 2895 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok() 3790 if (dpp_ecdh(auth->own_protocol_key, pr, auth->Nx, in dpp_auth_resp_rx() 6376 dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len) dpp_derive_pmk() argument 6465 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; dpp_peer_intro() local 7079 dpp_pkex_build_exchange_resp(struct dpp_pkex *pkex, enum dpp_status_error status, const BIGNUM *Nx, const BIGNUM *Ny) dpp_pkex_build_exchange_resp() argument 7167 dpp_pkex_derive_z(const u8 *mac_init, const u8 *mac_resp, const u8 *Mx, size_t Mx_len, const u8 *Nx, size_t Nx_len, const char *code, const u8 *Kx, size_t Kx_len, u8 *z, unsigned int hash_len) dpp_pkex_derive_z() argument 7271 BIGNUM *Nx = NULL, *Ny = NULL; dpp_pkex_rx_exchange_req() local 7606 BIGNUM *Nx = NULL, *Ny = NULL; dpp_pkex_rx_exchange_resp() local [all...] |
H A D | dpp.h | 139 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; member 208 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; member
|