/external/clang/test/CodeGen/ |
unsigned-promotion.c | 10 unsigned char ci, cj, ck; variable 84 // CHECKS: load i8* @ck 92 // CHECKU: [[T3:%.*]] = load i8* @ck 98 ci = cj + ck; 106 // CHECKS: load i8* @ck 114 // CHECKU: [[T3:%.*]] = load i8* @ck 120 ci = cj - ck; 128 // CHECKS: load i8* @ck 136 // CHECKU: [[T3:%.*]] = load i8* @ck 142 ci = cj * ck; [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/sunspider-1.0/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len 237 u8 res[8], ck[16], ik[16]; local [all...] |
milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
WWWAuthenticateHeaderIms.java | 47 * cipher-key = "ck" EQUAL ck-value 49 * ck-value = LDQUOT *(HEXDIG) RDQUOT 60 public static final String CK = ParameterNamesIms.CK; 67 public void setCK(String ck) throws ParseException;
|
/external/clang/utils/TableGen/ |
NeonEmitter.cpp | 524 ClassKind ck, bool ret) { 554 usgn = usgn | poly | ((ck == ClassI || ck == ClassW) && scal && type != 'f'); 583 if (mod == 'f' || (ck != ClassB && type == 'f')) 585 if (ck != ClassB && type == 's') 587 if (ck != ClassB && type == 'i') 589 if (ck != ClassB && type == 'l') 603 if (mod == 'f' || (ck != ClassB && type == 'f')) 605 if (ck != ClassB && type == 's') 607 if (ck != ClassB && type == 'i' 2077 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local 2213 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local 2331 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local 2519 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local [all...] |
/external/jpeg/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
/external/qemu/distrib/jpeg-6b/ |
cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 122 * @ck: Buffer for the derived Confirmation Key 127 u8 *mk, u8 *ck, u8 *ick) 133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
eap_pax_common.h | 89 u8 *mk, u8 *ck, u8 *ick);
|
eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck,
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/external/chromium_org/tools/json_schema_compiler/test/ |
test_util.cc | 62 const std::string& ck, base::Value* cv) { 64 dict->SetWithoutPathExpansion(ck, cv);
|
test_util.h | 50 const std::string& ck, base::Value* cv);
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 31 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/packages/apps/Camera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/packages/apps/Camera2/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/external/srec/srec/EventLog/src/ |
riff.c | 885 ChunkInfoStruct ck; local 888 strncpy(ck.ckString, "segs", 4); 889 ck.ckLength = chunk_len; 892 swapInt(&ck.ckLength); 893 memcpy(workbuf, &ck, chunkinfosize); 907 memcpy(workbuf, &ck, chunkinfosize); 958 ChunkInfoStruct ck; local 1064 strncpy(ck.ckString, "LIST", 4); 1065 ck.ckLength = listChunkSize - chunkInfoSize; 1066 if (doSwap) swapInt(&ck.ckLength) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|