/external/clang/test/CodeGen/ |
unsigned-promotion.c | 10 unsigned char ci, cj, ck; variable 84 // CHECKS: load i8, i8* @ck 92 // CHECKU: [[T3:%.*]] = load i8, i8* @ck 98 ci = cj + ck; 106 // CHECKS: load i8, i8* @ck 114 // CHECKU: [[T3:%.*]] = load i8, i8* @ck 120 ci = cj - ck; 128 // CHECKS: load i8, i8* @ck 136 // CHECKU: [[T3:%.*]] = load i8, i8* @ck 142 ci = cj * ck; [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/analysis/polynomials/ |
PolynomialsUtils.java | 244 BigFraction ck = coefficients.get(startK); 248 coefficients.add(ck.multiply(ai[0]).subtract(ckm1.multiply(ai[2]))); 252 final BigFraction ckPrev = ck; 253 ck = coefficients.get(startK + i); 255 coefficients.add(ck.multiply(ai[0]).add(ckPrev.multiply(ai[1])).subtract(ckm1.multiply(ai[2]))); 259 final BigFraction ckPrev = ck; 260 ck = coefficients.get(startK + k); 261 coefficients.add(ck.multiply(ai[0]).add(ckPrev.multiply(ai[1]))); 264 coefficients.add(ck.multiply(ai[1]));
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len 237 u8 res[8], ck[16], ik[16]; local [all...] |
milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
WWWAuthenticateHeaderIms.java | 47 * cipher-key = "ck" EQUAL ck-value 49 * ck-value = LDQUOT *(HEXDIG) RDQUOT 60 public static final String CK = ParameterNamesIms.CK; 67 public void setCK(String ck) throws ParseException;
|
/external/libjpeg-turbo/ |
cdjpeg.c | 86 register int ca, ck; local 90 if ((ck = *keyword++) == '\0') 92 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 94 if (ca != ck)
|
rdjpgcom.c | 424 register int ca, ck; local 428 if ((ck = *keyword++) == '\0') 430 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 432 if (ca != ck)
|
wrjpgcom.c | 382 register int ca, ck; local 386 if ((ck = *keyword++) == '\0') 388 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 390 if (ca != ck)
|
/libcore/ojluni/src/main/java/java/net/ |
InMemoryCookieStore.java | 164 public boolean remove(URI uri, HttpCookie ck) { 166 if (ck == null) { 178 return cookies.remove(ck); 317 HttpCookie ck = it.next(); local 319 if (!ck.hasExpired()) { 321 if (!cookies.contains(ck)) 322 cookies.add(ck);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 124 * @ck: Buffer for the derived Confirmation Key 130 u8 *mk, u8 *ck, u8 *ick, u8 *mid) 136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
|
eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck,
|
eap_pax_common.h | 90 u8 *mk, u8 *ck, u8 *ick, u8 *mid);
|
eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 66 addr[2] = ck; 69 /* MK = SHA1(Identity|IK|CK) */ 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) 295 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 438 * (CK', IK') = F(CK, IK, <access network identity> [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_winreg.py | 303 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 304 self.assertNotEqual(ck.handle, 0) 326 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 327 self.assertNotEqual(ck.handle, 0) 328 SetValueEx(ck, "test_name", None, REG_DWORD, 0x80000000) 338 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck: 339 self.assertNotEqual(ck.handle, 0) 341 SetValueEx(ck, "test_name", None, REG_DWORD, test_val) 342 ret_val, ret_type = QueryValueEx(ck, "test_name")
|
/external/valgrind/coregrind/ |
vgdb.c | 844 ConnectionKind ck; local 879 for (ck = 0; ck < NumConnectionKind; ck ++) { 880 if (pollfds[ck].revents & POLLIN) { 881 switch (ck) { 891 ppConnectionKind(ck)); 897 for (ck = 0; ck < NumConnectionKind; ck ++) [all...] |
/development/perftests/panorama/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/packages/apps/LegacyCamera/jni/feature_stab/db_vlvm/ |
db_utilities.h | 484 double sp,so,sk,om_sp2,om_so2,om_sk2,cp,co,ck,sp_so,cp_so; local 494 ck=(om_sk2>=0.0)?sqrt(om_sk2):1.0; 498 R[0]=sp_so*sk+cp*ck; R[1]=co*sk; R[2]=cp_so*sk-sp*ck; 499 R[3]=sp_so*ck-cp*sk; R[4]=co*ck; R[5]=cp_so*ck+sp*sk;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|
/external/boringssl/src/crypto/x509/ |
x509_trs.c | 166 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), 206 trtmp->check_trust = ck;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/text/ |
RuleBasedCollatorTest.java | 38 CollationKey ck = rbc.getCollationKey(source); local 39 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
|