/external/webkit/SunSpider/tests/sunspider-0.9/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/webkit/SunSpider/tests/sunspider-0.9.1/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
hlr_auc_gw.c | 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 476 u8 ck[EAP_AKA_CK_LEN]; local 492 autn, ik, ck, res, &res_len); 500 memset(ck, '4', EAP_AKA_CK_LEN); 520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
WWWAuthenticateHeaderIms.java | 47 * cipher-key = "ck" EQUAL ck-value 49 * ck-value = LDQUOT *(HEXDIG) RDQUOT 60 public static final String CK = ParameterNamesIms.CK; 67 public void setCK(String ck) throws ParseException;
|
/external/jpeg/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/wpa_supplicant/ |
eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
eap_pax_common.h | 99 u8 *mk, u8 *ck, u8 *ick);
|
eap_pax.c | 47 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 199 data->mk, data->ck, data->ick) < 0) 229 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 303 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_sim_common.h | 78 const u8 *ik, const u8 *ck, u8 *mk);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
eap_pax_common.h | 95 u8 *mk, u8 *ck, u8 *ick);
|
eap_sim_common.h | 85 const u8 *ik, const u8 *ck, u8 *mk); 99 const u8 *ik, const u8 *ck, u8 *k_encr, 110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 116 const u8 *ik, const u8 *ck,
|
eap_sim_common.c | 62 const u8 *ik, const u8 *ck, u8 *mk) 71 addr[2] = ck; 74 /* MK = SHA1(Identity|IK|CK) */ 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 282 const u8 *ik, const u8 *ck, u8 *k_encr, 291 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) 300 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); 431 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 443 * (CK', IK') = F(CK, IK, <access network identity> [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/external/srec/srec/EventLog/src/ |
riff.c | 885 ChunkInfoStruct ck; local 888 strncpy(ck.ckString, "segs", 4); 889 ck.ckLength = chunk_len; 892 swapInt(&ck.ckLength); 893 memcpy(workbuf, &ck, chunkinfosize); 907 memcpy(workbuf, &ck, chunkinfosize); 958 ChunkInfoStruct ck; local 1064 strncpy(ck.ckString, "LIST", 4); 1065 ck.ckLength = listChunkSize - chunkInfoSize; 1066 if (doSwap) swapInt(&ck.ckLength) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 86 u8 *ck, u8 *res, size_t *res_len,
|
eap_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|
/external/openssl/crypto/x509/ |
x509_trs.c | 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), 192 trtmp->check_trust = ck;
|
/packages/providers/CalendarProvider/tests/src/com/android/providers/calendar/ |
EventRecurrenceTest.java | 327 for (Check ck : checks) { 328 for (int n : ck.values) { 329 String recur = "FREQ=DAILY;" + ck.key + "=" + n;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|