/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len 237 u8 res[8], ck[16], ik[16]; local [all...] |
milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
WWWAuthenticateHeaderIms.java | 47 * cipher-key = "ck" EQUAL ck-value 49 * ck-value = LDQUOT *(HEXDIG) RDQUOT 60 public static final String CK = ParameterNamesIms.CK; 67 public void setCK(String ck) throws ParseException;
|
/external/clang/utils/TableGen/ |
NeonEmitter.cpp | 292 ClassKind ck, bool ret) { 322 usgn = usgn | poly | ((ck == ClassI || ck == ClassW) && scal && type != 'f'); 351 if (mod == 'f' || (ck != ClassB && type == 'f')) 353 if (ck != ClassB && type == 's') 355 if (ck != ClassB && type == 'i') 357 if (ck != ClassB && type == 'l') 371 if (mod == 'f' || (ck != ClassB && type == 'f')) 373 if (ck != ClassB && type == 's') 375 if (ck != ClassB && type == 'i' 1270 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local 1413 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local [all...] |
/external/jpeg/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
/external/qemu/distrib/jpeg-6b/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
eap_pax_common.h | 95 u8 *mk, u8 *ck, u8 *ick);
|
eap_sim_common.h | 85 const u8 *ik, const u8 *ck, u8 *mk); 99 const u8 *ik, const u8 *ck, u8 *k_encr, 110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 116 const u8 *ik, const u8 *ck,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 122 * @ck: Buffer for the derived Confirmation Key 127 u8 *mk, u8 *ck, u8 *ick) 133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
eap_pax_common.h | 89 u8 *mk, u8 *ck, u8 *ick);
|
eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck,
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 51 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/external/srec/srec/EventLog/src/ |
riff.c | 885 ChunkInfoStruct ck; local 888 strncpy(ck.ckString, "segs", 4); 889 ck.ckLength = chunk_len; 892 swapInt(&ck.ckLength); 893 memcpy(workbuf, &ck, chunkinfosize); 907 memcpy(workbuf, &ck, chunkinfosize); 958 ChunkInfoStruct ck; local 1064 strncpy(ck.ckString, "LIST", 4); 1065 ck.ckLength = listChunkSize - chunkInfoSize; 1066 if (doSwap) swapInt(&ck.ckLength) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 86 u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 78 u8 *ck, u8 *res, size_t *res_len,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|