/external/llvm/test/MC/AArch64/ |
arm64-nv-cond.s | 5 ccmp x0,x0,#0,nv label 10 // CHECK: ccmp x0, x0, #0, nv // encoding: [0x00,0xf0,0x40,0xfa]
|
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 79 /** Key descriptor version field value for WPA2 (CCMP) */ 113 * This is 16 for CCMP, 32 for TKIP, and 5 or 13 for WEP. 144 * through PN5 for CCMP mode, or TSC0 through TSC5 for TKIP 211 /** Length of a CCMP key */ 246 /** CCMP key */ 247 u8 ccmp[WPA_CCMP_KEY_LEN]; member in union:wpa_tk
|
/external/icu/icu4j/tools/misc/src/com/ibm/icu/dev/tool/layout/ |
CanonGSUBBuilder.java | 486 Feature ccmp = new Feature("ccmp"); local 488 addLookups(ccmp, lookups); 489 // addLookups(ccmp, commonLookups); 490 // addLookups(ccmp, inheritedLookups); 492 featureList.addFeature(ccmp); 496 scriptList.addFeature(scriptTag, "(default)", ccmp);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 190 int wpa2 = 0, ccmp = 0; local 193 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in 195 * TKIP+CCMP). Try to use scan results to figure out whether the AP 218 ccmp = 1; 223 ccmp = 1; 239 if (ccmp && !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) && 242 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " 306 * configured for mixed mode operation (WPA+WPA2 and TKIP+CCMP). [all...] |
/external/vixl/src/aarch64/ |
assembler-aarch64.cc | 719 void Assembler::ccmp(const Register& rn, function in class:vixl::aarch64::Assembler 723 ConditionalCompare(rn, operand, nzcv, cond, CCMP); [all...] |
/external/tcpdump/ |
print-decnet.c | 1118 const struct ccmsg *ccmp = (const struct ccmsg *)nspp; local [all...] |
/external/v8/src/arm64/ |
assembler-arm64.cc | 1412 void Assembler::ccmp(const Register& rn, function in class:v8::internal::Assembler [all...] |