HomeSort by relevance Sort by last modified time
    Searched refs:ck (Results 1 - 25 of 47) sorted by null

1 2

  /external/webkit/SunSpider/tests/sunspider-0.9/
math-partial-sums.js 9 var k2 = k3 = sk = ck = 0.0;
15 ck = Math.cos(k);
22 a5 += 1.0/(k3 * ck*ck);
  /external/webkit/SunSpider/tests/sunspider-0.9.1/
math-partial-sums.js 9 var k2 = k3 = sk = ck = 0.0;
15 ck = Math.cos(k);
22 a5 += 1.0/(k3 * ck*ck);
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.h 20 u8 *ck, u8 *res, size_t *res_len);
26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
hlr_auc_gw.c 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
476 u8 ck[EAP_AKA_CK_LEN]; local
492 autn, ik, ck, res, &res_len);
500 memset(ck, '4', EAP_AKA_CK_LEN);
520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
  /external/nist-sip/java/gov/nist/javax/sip/header/ims/
WWWAuthenticateHeaderIms.java 47 * cipher-key = "ck" EQUAL ck-value
49 * ck-value = LDQUOT *(HEXDIG) RDQUOT
60 public static final String CK = ParameterNamesIms.CK;
67 public void setCK(String ck) throws ParseException;
  /external/jpeg/
cdjpeg.c 124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
rdjpgcom.c 413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/wpa_supplicant/
eap_pax_common.c 128 * @ck: Buffer for the derived Confirmation Key
133 u8 *mk, u8 *ck, u8 *ick)
139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
pcsc_funcs.h 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
eap_pax_common.h 99 u8 *mk, u8 *ck, u8 *ick);
eap_pax.c 47 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
199 data->mk, data->ck, data->ick) < 0)
229 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
303 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_sim_common.h 78 const u8 *ik, const u8 *ck, u8 *mk);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_pax_common.c 128 * @ck: Buffer for the derived Confirmation Key
133 u8 *mk, u8 *ck, u8 *ick)
139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
eap_pax_common.h 95 u8 *mk, u8 *ck, u8 *ick);
eap_sim_common.h 85 const u8 *ik, const u8 *ck, u8 *mk);
99 const u8 *ik, const u8 *ck, u8 *k_encr,
110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
116 const u8 *ik, const u8 *ck,
eap_sim_common.c 62 const u8 *ik, const u8 *ck, u8 *mk)
71 addr[2] = ck;
74 /* MK = SHA1(Identity|IK|CK) */
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
282 const u8 *ik, const u8 *ck, u8 *k_encr,
291 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
300 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN);
431 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
443 * (CK', IK') = F(CK, IK, <access network identity>
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.h 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
  /external/srec/srec/EventLog/src/
riff.c 885 ChunkInfoStruct ck; local
888 strncpy(ck.ckString, "segs", 4);
889 ck.ckLength = chunk_len;
892 swapInt(&ck.ckLength);
893 memcpy(workbuf, &ck, chunkinfosize);
907 memcpy(workbuf, &ck, chunkinfosize);
958 ChunkInfoStruct ck; local
1064 strncpy(ck.ckString, "LIST", 4);
1065 ck.ckLength = listChunkSize - chunkInfoSize;
1066 if (doSwap) swapInt(&ck.ckLength)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 86 u8 *ck, u8 *res, size_t *res_len,
eap_pax.c 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
390 data->rand.e, data->mk, data->ck,
399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 81 public static final String CK = ParameterNamesIms.CK;
120 || name.equalsIgnoreCase(ParameterNamesIms.CK)
524 public void setCK(String ck) throws ParseException {
525 if (ck == null)
528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null");
529 setParameter(CK, ck);
533 return getParameter(ParameterNamesIms.CK);
  /external/openssl/crypto/x509/
x509_trs.c 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
192 trtmp->check_trust = ck;
  /packages/providers/CalendarProvider/tests/src/com/android/providers/calendar/
EventRecurrenceTest.java 327 for (Check ck : checks) {
328 for (int n : ck.values) {
329 String recur = "FREQ=DAILY;" + ck.key + "=" + n;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
188 data->mk, data->ck, data->ick) < 0)
214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,

Completed in 484 milliseconds

1 2