/external/jpeg/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/qemu/distrib/jpeg-6b/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len 237 u8 res[8], ck[16], ik[16]; local [all...] |
/external/skia/tests/ |
Sk64Test.cpp | 174 int32_t ck = (int32_t)sqrt((double)wide.getLongLong()); local 175 int diff = denom - ck;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 188 data->ik, data->ck, 202 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 845 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 870 data->ck, data->k_encr, data->k_aut, 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_aka.c | 36 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data 695 data->ik, data->ck, data->res, 707 * needed 6-octet SQN ^AK for CK',IK' derivation */ 708 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 742 data->ck, data->k_encr, data->k_aut, 746 data->ck, data->mk); [all...] |
eap_sim_db.c | 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon15476::__anon15478 194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) 1154 * @ck: Buffer for CK value 1176 u8 *ck, u8 *res, size_t *res_len, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 167 * milenage_generate - Generate AKA AUTN,IK,CK,RES 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len 243 u8 res[8], ck[16], ik[16]; local [all...] |
hlr_auc_gw.c | 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 476 u8 ck[EAP_AKA_CK_LEN]; local 492 autn, ik, ck, res, &res_len); 500 memset(ck, '4', EAP_AKA_CK_LEN); 520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 147 data->ik, data->ck, data->auts); 180 data->ik, data->ck, 194 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 857 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 864 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 882 data->ck, data->k_encr, data->k_aut, 885 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 385 data->rand.e, data->mk, data->ck, 394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_server_aka.c | 30 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data 688 data->ik, data->ck, data->res, 700 * needed 6-octet SQN ^AK for CK',IK' derivation */ 701 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 735 data->ck, data->k_encr, data->k_aut, 739 data->ck, data->mk); [all...] |
/external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/ |
RuleBasedCollatorTest.java | 43 CollationKey ck = rbc.getCollationKey(source); local 44 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 466 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 471 u8 ck[EAP_AKA_CK_LEN]; local 487 autn, ik, ck, res, &res_len); 495 memset(ck, '4', EAP_AKA_CK_LEN); 515 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/external/clang/utils/TableGen/ |
NeonEmitter.cpp | 292 ClassKind ck, bool ret) { 322 usgn = usgn | poly | ((ck == ClassI || ck == ClassW) && scal && type != 'f'); 351 if (mod == 'f' || (ck != ClassB && type == 'f')) 353 if (ck != ClassB && type == 's') 355 if (ck != ClassB && type == 'i') 357 if (ck != ClassB && type == 'l') 371 if (mod == 'f' || (ck != ClassB && type == 'f')) 373 if (ck != ClassB && type == 's') 375 if (ck != ClassB && type == 'i' 1270 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local 1413 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local [all...] |
/external/srec/srec/EventLog/src/ |
riff.c | 885 ChunkInfoStruct ck; local 888 strncpy(ck.ckString, "segs", 4); 889 ck.ckLength = chunk_len; 892 swapInt(&ck.ckLength); 893 memcpy(workbuf, &ck, chunkinfosize); 907 memcpy(workbuf, &ck, chunkinfosize); 958 ChunkInfoStruct ck; local 1064 strncpy(ck.ckString, "LIST", 4); 1065 ck.ckLength = listChunkSize - chunkInfoSize; 1066 if (doSwap) swapInt(&ck.ckLength) [all...] |