HomeSort by relevance Sort by last modified time
    Searched refs:ck (Results 26 - 50 of 65) sorted by null

12 3

  /external/valgrind/main/coregrind/
vgdb.c 1771 ConnectionKind ck; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 62 const u8 *ik, const u8 *ck, u8 *mk)
71 addr[2] = ck;
74 /* MK = SHA1(Identity|IK|CK) */
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
282 const u8 *ik, const u8 *ck, u8 *k_encr,
291 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
300 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN);
431 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
443 * (CK', IK') = F(CK, IK, <access network identity>
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 57 const u8 *ik, const u8 *ck, u8 *mk)
66 addr[2] = ck;
69 /* MK = SHA1(Identity|IK|CK) */
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
295 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
438 * (CK', IK') = F(CK, IK, <access network identity>
    [all...]
  /external/jpeg/
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/qemu/distrib/jpeg-6b/
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/
RuleBasedCollatorTest.java 43 CollationKey ck = rbc.getCollationKey(source); local
44 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
  /external/openssl/crypto/x509/
x509_trs.c 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
192 trtmp->check_trust = ck;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
188 data->mk, data->ck, data->ick) < 0)
214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_aka.c 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
155 data->ik, data->ck, data->auts);
188 data->ik, data->ck,
202 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
845 * needed 6-octet SQN ^ AK for CK',IK' derivation */
852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
870 data->ck, data->k_encr, data->k_aut,
873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
390 data->rand.e, data->mk, data->ck,
399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_sim_db.c 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon15476::__anon15478
194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN))
1154 * @ck: Buffer for CK value
1176 u8 *ck, u8 *res, size_t *res_len,
    [all...]
eap_aka.c 36 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data
695 data->ik, data->ck, data->res,
707 * needed 6-octet SQN ^AK for CK',IK' derivation */
708 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
742 data->ck, data->k_encr, data->k_aut,
746 data->ck, data->mk);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
hlr_auc_gw.c 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
476 u8 ck[EAP_AKA_CK_LEN]; local
492 autn, ik, ck, res, &res_len);
500 memset(ck, '4', EAP_AKA_CK_LEN);
520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
milenage.c 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
127 if (ck) {
132 if (aes_128_encrypt_block(k, tmp1, ck))
135 ck[i] ^= opc[i];
167 * milenage_generate - Generate AKA AUTN,IK,CK,RES
175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
181 u8 *ck, u8 *res, size_t *res_len
243 u8 res[8], ck[16], ik[16]; local
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
466 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
471 u8 ck[EAP_AKA_CK_LEN]; local
487 autn, ik, ck, res, &res_len);
495 memset(ck, '4', EAP_AKA_CK_LEN);
515 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_aka.c 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
147 data->ik, data->ck, data->auts);
180 data->ik, data->ck,
194 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
857 * needed 6-octet SQN ^ AK for CK',IK' derivation */
864 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
882 data->ck, data->k_encr, data->k_aut,
885 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
385 data->rand.e, data->mk, data->ck,
394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_sim_db.c 53 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon15692::__anon15694
189 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
191 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
239 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN))
1149 * @ck: Buffer for CK value
1171 u8 *ck, u8 *res, size_t *res_len,
    [all...]
eap_server_aka.c 30 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data
688 data->ik, data->ck, data->res,
700 * needed 6-octet SQN ^AK for CK',IK' derivation */
701 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
735 data->ck, data->k_encr, data->k_aut,
739 data->ck, data->mk);
    [all...]
  /external/skia/tests/
Sk64Test.cpp 174 int32_t ck = (int32_t)sqrt((double)wide.getLongLong()); local
175 int diff = denom - ck;
  /frameworks/opt/calendar/tests/src/com/android/calendarcommon/
EventRecurrenceTest.java 334 for (Check ck : checks) {
335 for (int n : ck.values) {
336 String recur = "FREQ=DAILY;" + ck.key + "=" + n;
    [all...]
  /external/clang/lib/Analysis/
AnalysisDeclContext.cpp 223 ContextKind ck,
227 ID.AddInteger(ck);
  /external/libvpx/examples/includes/geshi/contrib/
langcheck.php 540 foreach($language_data['COMMENT_SINGLE'] as $ck => $cv) {
541 if(!is_int($ck)) {
542 report_error(TYPE_WARNING, "Language file contains an key '$ck' in \$language_data['COMMENT_SINGLE'] that is not integer!");
545 report_error(TYPE_WARNING, "Language file contains an non-string entry at \$language_data['COMMENT_SINGLE'][$ck]!");
547 if(!isset($language_data['STYLES']['COMMENTS'][$ck])) {
548 report_error(TYPE_WARNING, "Language file contains no \$language_data['STYLES']['COMMENTS'] specification for comment group $ck!");
552 foreach($language_data['COMMENT_REGEXP'] as $ck => $cv) {
553 if(!is_int($ck)) {
554 report_error(TYPE_WARNING, "Language file contains an key '$ck' in \$language_data['COMMENT_REGEXP'] that is not integer!");
557 report_error(TYPE_WARNING, "Language file contains an non-string entry at \$language_data['COMMENT_REGEXP'][$ck]!");
    [all...]
  /external/openssl/crypto/x509v3/
v3_purp.c 173 int (*ck)(const X509_PURPOSE *, const X509 *, int),
212 ptmp->check_purpose = ck;

Completed in 263 milliseconds

12 3