HomeSort by relevance Sort by last modified time
    Searched defs:msk (Results 1 - 25 of 30) sorted by null

1 2

  /external/pixman/test/
pdf-op-test.c 54 pixman_image_t *msk = NULL; local
57 msk = pixman_image_create_bits (
69 pixman_image_composite (op, src, msk, dst,
74 if (msk)
75 pixman_image_unref (msk);
  /external/chromium_org/third_party/opus/src/celt/
entenc.c 247 opus_uint32 msk; local
253 msk=(EC_CODE_TOP-1)>>l;
254 end=(_this->val+msk)&~msk;
255 if((end|msk)>=_this->val+_this->rng){
257 msk>>=1;
258 end=(_this->val+msk)&~msk;
  /external/libopus/celt/
entenc.c 247 opus_uint32 msk; local
253 msk=(EC_CODE_TOP-1)>>l;
254 end=(_this->val+msk)&~msk;
255 if((end|msk)>=_this->val+_this->rng){
257 msk>>=1;
258 end=(_this->val+msk)&~msk;
  /external/chromium_org/v8/src/compiler/arm/
instruction-selector-arm-unittest.cc 1726 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local
1743 uint32_t msk = ((0xffffffffu >> (32 - width)) << lsb) | jnk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
433 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_sake.c 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
448 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_eke.c 20 u8 msk[EAP_MSK_LEN]; member in struct:eap_eke_data
606 data->msk, data->emsk) < 0) {
607 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
719 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_gpsk.c 20 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data
372 data->msk, data->emsk,
725 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_pwd.c 44 u8 msk[EAP_MSK_LEN]; member in struct:eap_pwd_data
186 os_memcpy(key, data->msk, EAP_MSK_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
675 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute MSK | "
eap_sim.c 32 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data
142 os_memset(data->msk, 0, EAP_SIM_KEYING_DATA_LEN);
773 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
998 data->nonce_s, data->mk, data->msk,
    [all...]
eap_aka.c 30 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data
137 os_memset(data->msk, 0, EAP_SIM_KEYING_DATA_LEN);
1007 data->k_re, data->msk, data->emsk);
1012 data->msk, data->emsk);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data
412 data->msk, data->emsk,
564 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_server_psk.c 28 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
456 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_server_sake.c 25 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
347 (u8 *) &data->tek, data->msk, data->emsk);
466 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_server_eke.c 21 u8 msk[EAP_MSK_LEN]; member in struct:eap_eke_data
648 data->msk, data->emsk) < 0) {
649 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
737 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_server_pwd.c 46 u8 msk[EAP_MSK_LEN]; member in struct:eap_pwd_data
851 data->my_confirm, &cs, data->msk, data->emsk,
983 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_server_sim.c 24 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_sim_data
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
264 data->msk, data->emsk);
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
793 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
eap_server_aka.c 26 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data
558 data->msk, data->emsk);
561 data->msk, data->emsk);
564 data->mk, data->msk, data->emsk);
838 data->k_re, data->msk, data->emsk);
843 data->msk, data->emsk);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 276 u8 *msk, size_t *len)
291 "Failed to get MSK from EAPOL state machines");
297 os_memcpy(msk, key, keylen);
311 struct mka_key *msk; local
321 msk = os_zalloc(sizeof(*msk));
325 if (!msk || !sid || !ckn || !cak)
328 msk->len = DEFAULT_KEY_LEN;
329 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len))
    [all...]
wpa_supplicant.c 2956 le16 msk; local
3029 le16 msk = host_to_le16(HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET | local
3051 le16 msk = host_to_le16(HT_CAP_INFO_SHORT_GI20MHZ | local
3073 le16 msk = host_to_le16(HT_CAP_INFO_LDPC_CODING_CAP); local
    [all...]
  /frameworks/av/media/libstagefright/codecs/avc/enc/src/
findhalfpel.cpp 155 int msk; local
382 msk = 0;
438 // msk |= b; msk|=a;
449 /* if(msk & 0xFF00FF00) // need clipping
  /frameworks/av/media/libstagefright/codecs/m4v_h263/dec/src/
bitstream.cpp 24 static const uint32 msk[33] = variable
573 if (pattern == msk[n_stuffed-1]) return PV_TRUE;
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 98 const u8 *addr, u8 *msk, size_t *len)
102 return wpa_auth->cb.get_msk(wpa_auth->cb.ctx, addr, msk, len);
1715 u8 msk[2 * PMK_LEN]; local
    [all...]
  /hardware/samsung_slsi/exynos5/include/
fimg2d.h 254 struct fimg2d_image *msk; member in struct:fimg2d_blit
  /hardware/samsung_slsi/exynos5/original-kernel-headers/linux/
fimg2d.h 260 (u)->msk, \
362 * @msk: set when using mask image
373 struct fimg2d_image *msk; member in struct:fimg2d_blit
403 * @dma_all: total dma size of src, msk, dst
404 * @dma: array of dma info for each src, msk, tmp and dst

Completed in 891 milliseconds

1 2