HomeSort by relevance Sort by last modified time
    Searched defs:kc (Results 1 - 19 of 19) sorted by null

  /external/netperf/
netcpu_kstat.c 61 static kstat_ctl_t *kc = NULL; variable
88 if (!kc)
90 kc = kstat_open();
91 if (!kc)
97 kcid = kc->kc_chain_id;
118 nkcid = kstat_chain_update(kc);
132 ks = kstat_lookup(kc, "unix", 0, "system_misc");
133 if (kstat_read(kc, ks, 0) == -1) {
153 for (ks = kc->kc_chain; ks;
158 nkcid = kstat_read(kc, ks, NULL)
    [all...]
netcpu_kstat10.c 41 static kstat_ctl_t *kc = NULL; variable
73 kc = kstat_open();
75 if (kc == NULL) {
89 kstat_close(kc);
129 ksp = kstat_lookup(kc, "cpu", cpu_num, "sys");
132 nkcid = kstat_read(kc, ksp, NULL);
215 ksp = kstat_lookup(kc, "cpu", cpu_num, "intrstat");
220 nkcid = kstat_read(kc, ksp, NULL);
  /external/qemu/distrib/sdl-1.2.12/src/video/gem/
SDL_gemevents.c 52 static void do_keyboard(short kc, short ks);
81 short buffer[8], kc; local
103 &dummy,&dummy,&dummy,&kstate,&kc,&dummy
112 if ((prevkc != kc) || (prevks != kstate)) {
113 do_keyboard(kc,kstate);
273 static void do_keyboard(short kc, short ks)
277 if (kc) {
278 scancode=(kc>>8) & (ATARIBIOS_MAXKEYS-1);
  /external/webkit/Source/WebCore/platform/text/wince/
TextCodecWinCE.cpp 65 static HashMap<String, CharsetInfo> kc; local
66 return kc;
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 238 * @kc: Buffer for Kc = 64-bit Kc
241 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc)
250 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
359 u8 kc[8]; member in struct:gsm_milenage_test_set
1114 u8 sres[4], kc[8]; local
    [all...]
hlr_auc_gw.c 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
40 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
60 u8 kc[8]; member in struct:gsm_triplet
133 /* Parse IMSI:Kc:SRES:RAND */
170 /* Kc */
173 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos);
178 if (strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
179 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos);
419 u8 _rand[16], sres[4], kc[8]; local
423 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
    [all...]
  /external/wpa_supplicant/
eap_sim.c 31 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
113 data->sres[0], data->kc[0]) ||
115 data->sres[1], data->kc[1]) ||
118 data->sres[2], data->kc[2]))) {
124 /* These hardcoded Kc and SRES values are used for testing. RAND to
125 * KC/SREC mapping is very bogus as far as real authentication is
132 os_memcpy(data->kc[i],
138 os_memcpy(data->kc[i],
144 os_memcpy(data->kc[i],
550 (const u8 *) data->kc, data->mk)
    [all...]
eapol_test.c 720 unsigned char kc[8]; local
759 if (scard_gsm_auth(scard, _rand, sres, kc))
763 if (scard_gsm_auth(scard, _rand, sres, kc))
825 unsigned char kc[8]; local
859 if (scard_gsm_auth(scard, _rand, sres, kc))
862 /* IMSI:Kc:SRES:RAND */
867 printf("%02X", kc[j]);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim.c 31 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
473 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
500 data->num_chal, (const u8 *) data->kc, data->mk);
eap_sim_db.c 49 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon13927::__anon13928
116 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ...
118 * (IMSI = ASCII string, Kc/SRES/RAND = hex string)
148 if (hexstr2bin(start, entry->u.sim.kc[num_chal],
527 * @kc: Buffer for Kc values
549 u8 *_rand, u8 *kc, u8 *sres,
604 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN);
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
40 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
61 u8 kc[8]; member in struct:gsm_triplet
134 /* Parse IMSI:Kc:SRES:RAND */
171 /* Kc */
174 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos);
179 if (strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
180 printf("%s:%d - Invalid Kc (%s)\n", fname, line, pos);
420 u8 _rand[16], sres[4], kc[8]; local
424 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 32 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
474 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
501 data->num_chal, (const u8 *) data->kc, data->mk);
eap_sim_db.c 50 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon14147::__anon14148
117 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ...
119 * (IMSI = ASCII string, Kc/SRES/RAND = hex string)
149 if (hexstr2bin(start, entry->u.sim.kc[num_chal],
528 * @kc: Buffer for Kc values
550 u8 *_rand, u8 *kc, u8 *sres,
605 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN);
    [all...]
  /external/qemu/distrib/sdl-1.2.12/src/video/x11/
SDL_x11events.c 58 SDLKey X11_TranslateKeycode(Display *display, KeyCode kc);
1190 KeyCode kc = xmods->modifiermap[i * n + j]; local
1331 KeyCode kc = (i << 3 | j); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 796 unsigned char kc[8]; local
835 if (scard_gsm_auth(scard, _rand, sres, kc))
839 if (scard_gsm_auth(scard, _rand, sres, kc))
901 unsigned char kc[8]; local
935 if (scard_gsm_auth(scard, _rand, sres, kc))
938 /* IMSI:Kc:SRES:RAND */
943 printf("%02X", kc[j]);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 33 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
157 data->sres[0], data->kc[0]) ||
159 data->sres[1], data->kc[1]) ||
162 data->sres[2], data->kc[2]))) {
195 data->sres[i], data->kc[i])) {
205 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
206 data->kc[i], EAP_SIM_KC_LEN);
213 /* These hardcoded Kc and SRES values are used for testing. RAND to
214 * KC/SREC mapping is very bogus as far as real authentication is
220 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 32 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
156 data->sres[0], data->kc[0]) ||
158 data->sres[1], data->kc[1]) ||
161 data->sres[2], data->kc[2]))) {
194 data->sres[i], data->kc[i])) {
204 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
205 data->kc[i], EAP_SIM_KC_LEN);
212 /* These hardcoded Kc and SRES values are used for testing. RAND to
213 * KC/SREC mapping is very bogus as far as real authentication is
219 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 821 unsigned char kc[8]; local
860 if (scard_gsm_auth(scard, _rand, sres, kc))
864 if (scard_gsm_auth(scard, _rand, sres, kc))
926 unsigned char kc[8]; local
960 if (scard_gsm_auth(scard, _rand, sres, kc))
963 /* IMSI:Kc:SRES:RAND */
968 printf("%02X", kc[j]);
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/X11/extensions/
XKBsrv.h 105 CARD8 kc; member in struct:_XkbEventCause
111 #define XkbSetCauseKey(c,k,e) { (c)->kc= (k),(c)->event= (e),\
114 #define XkbSetCauseReq(c,j,n,cl) { (c)->kc= (c)->event= 0,\

Completed in 3821 milliseconds