HomeSort by relevance Sort by last modified time
    Searched refs:ck (Results 26 - 50 of 79) sorted by null

12 3 4

  /external/jpeg/
rdjpgcom.c 413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 81 public static final String CK = ParameterNamesIms.CK;
120 || name.equalsIgnoreCase(ParameterNamesIms.CK)
524 public void setCK(String ck) throws ParseException {
525 if (ck == null)
528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null");
529 setParameter(CK, ck);
533 return getParameter(ParameterNamesIms.CK);
  /external/qemu/distrib/jpeg-6b/
rdjpgcom.c 413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 57 const u8 *ik, const u8 *ck, u8 *mk)
66 addr[2] = ck;
69 /* MK = SHA1(Identity|IK|CK) */
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
295 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
438 * (CK', IK') = F(CK, IK, <access network identity>
    [all...]
  /external/chromium_org/third_party/libjpeg_turbo/
wrjpgcom.c 389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
x509_trs.c 166 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
199 trtmp->check_trust = ck;
  /external/openssl/crypto/x509/
x509_trs.c 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
192 trtmp->check_trust = ck;
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
215 if (hexstr2bin(pos, data->ck, EAP_AKA_CK_LEN) < 0)
217 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN);
262 data->ik, data->ck, data->auts);
295 data->ik, data->ck,
309 os_memset(data->ck, '4', EAP_AKA_CK_LEN);
981 * needed 6-octet SQN ^ AK for CK',IK' derivation */
988 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
1006 data->ck, data->k_encr, data->k_aut
    [all...]
eap_pax.c 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/irc/
ircbot.py 281 ck = irc_lower(key)
282 del self.data[self.canon_keys[ck]]
283 del self.canon_keys[ck]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
390 data->rand.e, data->mk, data->ck,
399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
eap_server_aka.c 30 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data
791 data->ck, data->res, &data->res_len, sm);
802 * needed 6-octet SQN ^AK for CK',IK' derivation */
803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
837 data->ck, data->k_encr, data->k_aut,
841 data->ck, data->mk);
    [all...]
eap_sim_db.c 53 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon17373::__anon17375
486 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
488 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
536 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN))
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/text/
RuleBasedCollatorTest.java 38 CollationKey ck = rbc.getCollationKey(source); local
39 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
  /frameworks/opt/calendar/tests/src/com/android/calendarcommon2/
EventRecurrenceTest.java 334 for (Check ck : checks) {
335 for (int n : ck.values) {
336 String recur = "FREQ=DAILY;" + ck.key + "=" + n;
    [all...]
  /packages/apps/Launcher3/src/com/android/launcher3/
IconCache.java 401 for (CacheKey ck : mCache.keySet()) {
402 final CacheEntry e = mCache.get(ck);
403 set.put(ck.componentName, e.icon);
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
772 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
777 u8 ck[EAP_AKA_CK_LEN]; local
800 autn, ik, ck, res, &res_len);
808 memset(ck, '4', EAP_AKA_CK_LEN);
835 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
  /external/chromium_org/third_party/boringssl/src/crypto/x509v3/
v3_purp.c 175 int (*ck)(const X509_PURPOSE *, const X509 *, int),
214 ptmp->check_purpose = ck;
  /external/clang/lib/Analysis/
AnalysisDeclContext.cpp 307 ContextKind ck,
311 ID.AddInteger(ck);
  /external/openssl/crypto/x509v3/
v3_purp.c 173 int (*ck)(const X509_PURPOSE *, const X509 *, int),
212 ptmp->check_purpose = ck;
  /external/clang/include/clang/Analysis/
AnalysisContext.h 259 ContextKind ck,
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c     [all...]
  /external/chromium_org/v8/tools/profviz/
gnuplot-4.6.3-emscripten.js     [all...]

Completed in 1156 milliseconds

12 3 4