/external/pixman/test/ |
pdf-op-test.c | 54 pixman_image_t *msk = NULL; local 57 msk = pixman_image_create_bits ( 69 pixman_image_composite (op, src, msk, dst, 74 if (msk) 75 pixman_image_unref (msk);
|
/external/chromium_org/third_party/opus/src/celt/ |
entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/libopus/celt/ |
entenc.c | 247 opus_uint32 msk; local 253 msk=(EC_CODE_TOP-1)>>l; 254 end=(_this->val+msk)&~msk; 255 if((end|msk)>=_this->val+_this->rng){ 257 msk>>=1; 258 end=(_this->val+msk)&~msk;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 433 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_sake.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 448 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_eke.c | 20 u8 msk[EAP_MSK_LEN]; member in struct:eap_eke_data 606 data->msk, data->emsk) < 0) { 607 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 719 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_gpsk.c | 20 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 372 data->msk, data->emsk, 725 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_pwd.c | 44 u8 msk[EAP_MSK_LEN]; member in struct:eap_pwd_data 186 os_memcpy(key, data->msk, EAP_MSK_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) { 675 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute MSK | "
|
eap_sim.c | 32 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 142 os_memset(data->msk, 0, EAP_SIM_KEYING_DATA_LEN); 773 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 998 data->nonce_s, data->mk, data->msk, [all...] |
eap_aka.c | 30 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 137 os_memset(data->msk, 0, EAP_SIM_KEYING_DATA_LEN); 1007 data->k_re, data->msk, data->emsk); 1012 data->msk, data->emsk); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 412 data->msk, data->emsk, 564 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_psk.c | 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 456 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_sake.c | 25 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 347 (u8 *) &data->tek, data->msk, data->emsk); 466 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_eke.c | 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_eke_data 648 data->msk, data->emsk) < 0) { 649 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 737 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_pwd.c | 46 u8 msk[EAP_MSK_LEN]; member in struct:eap_pwd_data 851 data->my_confirm, &cs, data->msk, data->emsk, 983 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
eap_server_sim.c | 24 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 264 data->msk, data->emsk); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 793 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
eap_server_aka.c | 26 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data 558 data->msk, data->emsk); 561 data->msk, data->emsk); 564 data->mk, data->msk, data->emsk); 838 data->k_re, data->msk, data->emsk); 843 data->msk, data->emsk); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 276 u8 *msk, size_t *len) 291 "Failed to get MSK from EAPOL state machines"); 297 os_memcpy(msk, key, keylen); 311 struct mka_key *msk; local 321 msk = os_zalloc(sizeof(*msk)); 325 if (!msk || !sid || !ckn || !cak) 328 msk->len = DEFAULT_KEY_LEN; 329 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) [all...] |
wpa_supplicant.c | 2848 le16 msk; local 2921 le16 msk = host_to_le16(HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET | local 2943 le16 msk = host_to_le16(HT_CAP_INFO_SHORT_GI20MHZ | local 2965 le16 msk = host_to_le16(HT_CAP_INFO_LDPC_CODING_CAP); local [all...] |
/frameworks/av/media/libstagefright/codecs/avc/enc/src/ |
findhalfpel.cpp | 155 int msk; local 382 msk = 0; 438 // msk |= b; msk|=a; 449 /* if(msk & 0xFF00FF00) // need clipping
|
/frameworks/av/media/libstagefright/codecs/m4v_h263/dec/src/ |
bitstream.cpp | 24 static const uint32 msk[33] = variable 573 if (pattern == msk[n_stuffed-1]) return PV_TRUE; [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 98 const u8 *addr, u8 *msk, size_t *len) 102 return wpa_auth->cb.get_msk(wpa_auth->cb.ctx, addr, msk, len); 1714 u8 msk[2 * PMK_LEN]; local [all...] |
/hardware/samsung_slsi/exynos5/include/ |
fimg2d.h | 254 struct fimg2d_image *msk; member in struct:fimg2d_blit
|
/hardware/samsung_slsi/exynos5/original-kernel-headers/linux/ |
fimg2d.h | 260 (u)->msk, \ 362 * @msk: set when using mask image 373 struct fimg2d_image *msk; member in struct:fimg2d_blit 403 * @dma_all: total dma size of src, msk, dst 404 * @dma: array of dma info for each src, msk, tmp and dst
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/radeon/ |
radeon_context.h | 312 struct radeon_state_atom msk; member in struct:r100_hw_state
|