/external/jpeg/ |
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|
/external/qemu/distrib/jpeg-6b/ |
rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 66 addr[2] = ck; 69 /* MK = SHA1(Identity|IK|CK) */ 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) 295 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 438 * (CK', IK') = F(CK, IK, <access network identity> [all...] |
/external/chromium_org/third_party/libjpeg_turbo/ |
wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509_trs.c | 166 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), 199 trtmp->check_trust = ck;
|
/external/openssl/crypto/x509/ |
x509_trs.c | 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), 192 trtmp->check_trust = ck;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 215 if (hexstr2bin(pos, data->ck, EAP_AKA_CK_LEN) < 0) 217 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN); 262 data->ik, data->ck, data->auts); 295 data->ik, data->ck, 309 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 981 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 988 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 1006 data->ck, data->k_encr, data->k_aut [all...] |
eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/irc/ |
ircbot.py | 281 ck = irc_lower(key) 282 del self.data[self.canon_keys[ck]] 283 del self.canon_keys[ck]
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_server_aka.c | 30 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 802 * needed 6-octet SQN ^AK for CK',IK' derivation */ 803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 837 data->ck, data->k_encr, data->k_aut, 841 data->ck, data->mk); [all...] |
eap_sim_db.c | 53 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon17373::__anon17375 486 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 488 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 536 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/text/ |
RuleBasedCollatorTest.java | 38 CollationKey ck = rbc.getCollationKey(source); local 39 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
|
/frameworks/opt/calendar/tests/src/com/android/calendarcommon2/ |
EventRecurrenceTest.java | 334 for (Check ck : checks) { 335 for (int n : ck.values) { 336 String recur = "FREQ=DAILY;" + ck.key + "=" + n; [all...] |
/packages/apps/Launcher3/src/com/android/launcher3/ |
IconCache.java | 401 for (CacheKey ck : mCache.keySet()) { 402 final CacheEntry e = mCache.get(ck); 403 set.put(ck.componentName, e.icon);
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 772 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 777 u8 ck[EAP_AKA_CK_LEN]; local 800 autn, ik, ck, res, &res_len); 808 memset(ck, '4', EAP_AKA_CK_LEN); 835 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
v3_purp.c | 175 int (*ck)(const X509_PURPOSE *, const X509 *, int), 214 ptmp->check_purpose = ck;
|
/external/clang/lib/Analysis/ |
AnalysisDeclContext.cpp | 307 ContextKind ck, 311 ID.AddInteger(ck);
|
/external/openssl/crypto/x509v3/ |
v3_purp.c | 173 int (*ck)(const X509_PURPOSE *, const X509 *, int), 212 ptmp->check_purpose = ck;
|
/external/clang/include/clang/Analysis/ |
AnalysisContext.h | 259 ContextKind ck,
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | [all...] |
/external/chromium_org/v8/tools/profviz/ |
gnuplot-4.6.3-emscripten.js | [all...] |