HomeSort by relevance Sort by last modified time
    Searched defs:ck (Results 1 - 25 of 33) sorted by null

1 2

  /external/jpeg/
cdjpeg.c 124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
rdjpgcom.c 413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/qemu/distrib/jpeg-6b/
cdjpeg.c 124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
rdjpgcom.c 413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/wpa_supplicant_8/src/crypto/
milenage.c 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
161 * milenage_generate - Generate AKA AUTN,IK,CK,RES
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len
237 u8 res[8], ck[16], ik[16]; local
    [all...]
  /external/skia/tests/
Sk64Test.cpp 174 int32_t ck = (int32_t)sqrt((double)wide.getLongLong()); local
175 int diff = denom - ck;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
188 data->mk, data->ck, data->ick) < 0)
214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_aka.c 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
155 data->ik, data->ck, data->auts);
188 data->ik, data->ck,
202 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
845 * needed 6-octet SQN ^ AK for CK',IK' derivation */
852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
870 data->ck, data->k_encr, data->k_aut,
873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
390 data->rand.e, data->mk, data->ck,
399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_aka.c 36 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data
695 data->ik, data->ck, data->res,
707 * needed 6-octet SQN ^AK for CK',IK' derivation */
708 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
742 data->ck, data->k_encr, data->k_aut,
746 data->ck, data->mk);
    [all...]
eap_sim_db.c 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon16852::__anon16854
194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN))
1154 * @ck: Buffer for CK value
1176 u8 *ck, u8 *res, size_t *res_len,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
127 if (ck) {
132 if (aes_128_encrypt_block(k, tmp1, ck))
135 ck[i] ^= opc[i];
167 * milenage_generate - Generate AKA AUTN,IK,CK,RES
175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
181 u8 *ck, u8 *res, size_t *res_len
243 u8 res[8], ck[16], ik[16]; local
    [all...]
hlr_auc_gw.c 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
476 u8 ck[EAP_AKA_CK_LEN]; local
492 autn, ik, ck, res, &res_len);
500 memset(ck, '4', EAP_AKA_CK_LEN);
520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_aka.c 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
157 data->ik, data->ck, data->auts);
190 data->ik, data->ck,
204 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
872 * needed 6-octet SQN ^ AK for CK',IK' derivation */
879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
897 data->ck, data->k_encr, data->k_aut,
900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
385 data->rand.e, data->mk, data->ck,
394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_server_aka.c 30 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data
779 data->ck, data->res, &data->res_len, sm);
790 * needed 6-octet SQN ^AK for CK',IK' derivation */
791 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
825 data->ck, data->k_encr, data->k_aut,
829 data->ck, data->mk);
    [all...]
eap_sim_db.c 54 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon17074::__anon17076
487 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
489 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
537 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN))
    [all...]
  /external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/
RuleBasedCollatorTest.java 43 CollationKey ck = rbc.getCollationKey(source); local
44 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
  /packages/apps/Camera/jni/feature_stab/db_vlvm/
db_utilities.h 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local
494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0;
498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck;
499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
  /packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/
db_utilities.h 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local
494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0;
498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck;
499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
  /external/srec/srec/EventLog/src/
riff.c 885 ChunkInfoStruct ck; local
888 strncpy(ck.ckString, "segs", 4);
889 ck.ckLength = chunk_len;
892 swapInt(&ck.ckLength);
893 memcpy(workbuf, &ck, chunkinfosize);
907 memcpy(workbuf, &ck, chunkinfosize);
958 ChunkInfoStruct ck; local
1064 strncpy(ck.ckString, "LIST", 4);
1065 ck.ckLength = listChunkSize - chunkInfoSize;
1066 if (doSwap) swapInt(&ck.ckLength)
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
717 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
722 u8 ck[EAP_AKA_CK_LEN]; local
743 autn, ik, ck, res, &res_len);
751 memset(ck, '4', EAP_AKA_CK_LEN);
778 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);

Completed in 1446 milliseconds

1 2