/external/netperf/ |
netcpu_kstat.c | 61 static kstat_ctl_t *kc = NULL; variable 88 if (!kc) 90 kc = kstat_open(); 91 if (!kc) 97 kcid = kc->kc_chain_id; 118 nkcid = kstat_chain_update(kc); 132 ks = kstat_lookup(kc, "unix", 0, "system_misc"); 133 if (kstat_read(kc, ks, 0) == -1) { 153 for (ks = kc->kc_chain; ks; 158 nkcid = kstat_read(kc, ks, NULL) [all...] |
netcpu_kstat10.c | 41 static kstat_ctl_t *kc = NULL; variable 73 kc = kstat_open(); 75 if (kc == NULL) { 89 kstat_close(kc); 129 ksp = kstat_lookup(kc, "cpu", cpu_num, "sys"); 132 nkcid = kstat_read(kc, ksp, NULL); 215 ksp = kstat_lookup(kc, "cpu", cpu_num, "intrstat"); 220 nkcid = kstat_read(kc, ksp, NULL);
|
/external/qemu/distrib/sdl-1.2.12/src/video/gem/ |
SDL_gemevents.c | 52 static void do_keyboard(short kc, short ks); 81 short buffer[8], kc; local 103 &dummy,&dummy,&dummy,&kstate,&kc,&dummy 112 if ((prevkc != kc) || (prevks != kstate)) { 113 do_keyboard(kc,kstate); 273 static void do_keyboard(short kc, short ks) 277 if (kc) { 278 scancode=(kc>>8) & (ATARIBIOS_MAXKEYS-1);
|
/external/webkit/Source/WebCore/platform/text/wince/ |
TextCodecWinCE.cpp | 65 static HashMap<String, CharsetInfo> kc; local 66 return kc;
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.c | 238 * @kc: Buffer for Kc = 64-bit Kc 241 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) 250 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; 359 u8 kc[8]; member in struct:gsm_milenage_test_set 1114 u8 sres[4], kc[8]; local [all...] |
hlr_auc_gw.c | 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 40 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex 60 u8 kc[8]; member in struct:gsm_triplet 133 /* Parse IMSI:Kc:SRES:RAND */ 170 /* Kc */ 173 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos); 178 if (strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { 179 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos); 419 u8 _rand[16], sres[4], kc[8]; local 423 gsm_milenage(m->opc, m->ki, _rand, sres, kc); [all...] |
/external/wpa_supplicant/ |
eap_sim.c | 31 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 113 data->sres[0], data->kc[0]) || 115 data->sres[1], data->kc[1]) || 118 data->sres[2], data->kc[2]))) { 124 /* These hardcoded Kc and SRES values are used for testing. RAND to 125 * KC/SREC mapping is very bogus as far as real authentication is 132 os_memcpy(data->kc[i], 138 os_memcpy(data->kc[i], 144 os_memcpy(data->kc[i], 550 (const u8 *) data->kc, data->mk) [all...] |
eapol_test.c | 720 unsigned char kc[8]; local 759 if (scard_gsm_auth(scard, _rand, sres, kc)) 763 if (scard_gsm_auth(scard, _rand, sres, kc)) 825 unsigned char kc[8]; local 859 if (scard_gsm_auth(scard, _rand, sres, kc)) 862 /* IMSI:Kc:SRES:RAND */ 867 printf("%02X", kc[j]);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim.c | 31 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 473 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); 500 data->num_chal, (const u8 *) data->kc, data->mk);
|
eap_sim_db.c | 49 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon13927::__anon13928 116 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ... 118 * (IMSI = ASCII string, Kc/SRES/RAND = hex string) 148 if (hexstr2bin(start, entry->u.sim.kc[num_chal], 527 * @kc: Buffer for Kc values 549 u8 *_rand, u8 *kc, u8 *sres, 604 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN); [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 40 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex 61 u8 kc[8]; member in struct:gsm_triplet 134 /* Parse IMSI:Kc:SRES:RAND */ 171 /* Kc */ 174 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos); 179 if (strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { 180 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos); 420 u8 _rand[16], sres[4], kc[8]; local 424 gsm_milenage(m->opc, m->ki, _rand, sres, kc); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 32 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 474 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); 501 data->num_chal, (const u8 *) data->kc, data->mk);
|
eap_sim_db.c | 50 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon14147::__anon14148 117 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ... 119 * (IMSI = ASCII string, Kc/SRES/RAND = hex string) 149 if (hexstr2bin(start, entry->u.sim.kc[num_chal], 528 * @kc: Buffer for Kc values 550 u8 *_rand, u8 *kc, u8 *sres, 605 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN); [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/x11/ |
SDL_x11events.c | 58 SDLKey X11_TranslateKeycode(Display *display, KeyCode kc); 1190 KeyCode kc = xmods->modifiermap[i * n + j]; local 1331 KeyCode kc = (i << 3 | j); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 796 unsigned char kc[8]; local 835 if (scard_gsm_auth(scard, _rand, sres, kc)) 839 if (scard_gsm_auth(scard, _rand, sres, kc)) 901 unsigned char kc[8]; local 935 if (scard_gsm_auth(scard, _rand, sres, kc)) 938 /* IMSI:Kc:SRES:RAND */ 943 printf("%02X", kc[j]);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 33 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 157 data->sres[0], data->kc[0]) || 159 data->sres[1], data->kc[1]) || 162 data->sres[2], data->kc[2]))) { 195 data->sres[i], data->kc[i])) { 205 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc", 206 data->kc[i], EAP_SIM_KC_LEN); 213 /* These hardcoded Kc and SRES values are used for testing. RAND to 214 * KC/SREC mapping is very bogus as far as real authentication is 220 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 32 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 156 data->sres[0], data->kc[0]) || 158 data->sres[1], data->kc[1]) || 161 data->sres[2], data->kc[2]))) { 194 data->sres[i], data->kc[i])) { 204 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc", 205 data->kc[i], EAP_SIM_KC_LEN); 212 /* These hardcoded Kc and SRES values are used for testing. RAND to 213 * KC/SREC mapping is very bogus as far as real authentication is 219 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 821 unsigned char kc[8]; local 860 if (scard_gsm_auth(scard, _rand, sres, kc)) 864 if (scard_gsm_auth(scard, _rand, sres, kc)) 926 unsigned char kc[8]; local 960 if (scard_gsm_auth(scard, _rand, sres, kc)) 963 /* IMSI:Kc:SRES:RAND */ 968 printf("%02X", kc[j]);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/X11/extensions/ |
XKBsrv.h | 105 CARD8 kc; member in struct:_XkbEventCause 111 #define XkbSetCauseKey(c,k,e) { (c)->kc= (k),(c)->event= (e),\ 114 #define XkbSetCauseReq(c,j,n,cl) { (c)->kc= (c)->event= 0,\
|