/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 147 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 389 data->rand.e, data->mk, data->ck, 398 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/libjpeg-turbo/ |
rdjpgcom.c | 425 register int ca, ck; local 429 if ((ck = *keyword++) == '\0') 431 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 433 if (ca != ck)
|
wrjpgcom.c | 383 register int ca, ck; local 387 if ((ck = *keyword++) == '\0') 389 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 391 if (ca != ck)
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 81 public static final String CK = ParameterNamesIms.CK; 120 || name.equalsIgnoreCase(ParameterNamesIms.CK) 524 public void setCK(String ck) throws ParseException { 525 if (ck == null) 528 + " AuthenticationHeader, setCk(), The auth-param CK parameter is null"); 529 setParameter(CK, ck); 533 return getParameter(ParameterNamesIms.CK);
|
/external/scapy/scapy/contrib/ |
icmp_extensions.py | 54 ck = checksum(p) 55 p = p[:2]+chr(ck>>8)+chr(ck&0xff)+p[4:]
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 66 addr[2] = ck; 69 /* MK = SHA1(Identity|IK|CK) */ 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 276 const u8 *ik, const u8 *ck, u8 *k_encr, 285 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) 294 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); 424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 436 * (CK', IK') = F(CK, IK, <access network identity> [all...] |
/device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/ |
GNUmakefile | 50 Pccts/antlr/antlr -CC -e3 -ck 3 -k 2 -fl VfrParser.dlg -ft VfrTokens.h -o . VfrSyntax.g
|
/external/boringssl/src/crypto/x509/ |
x509_trs.c | 177 int X509_TRUST_add(int id, int flags, int (*ck) (X509_TRUST *, X509 *, int), 221 trtmp->check_trust = ck;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/text/ |
RuleBasedCollatorTest.java | 38 CollationKey ck = rbc.getCollationKey(source); local 39 assertNull("Assert 1: getCollationKey (null) does not return null", ck);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
PKIXParameters.java | 571 for (PKIXCertPathChecker ck : certPathCheckers) { 572 tmpList.add((PKIXCertPathChecker)ck.clone());
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/util/ |
TelephonyUtilTest.java | 377 * Produce a base64 encoded tag + res length byte + res + ck length byte + ck + ik length byte + 380 private static String create3GSimAuthUmtsAuthResponse(byte[] res, byte[] ck, byte[] ik) { 381 byte[] result = new byte[res.length + ck.length + ik.length + 4]; 388 result[idx++] = (byte) ck.length; 389 for (int i = 0; i < ck.length; ++i) { 390 result[idx++] = ck[i];
|
/external/scapy/scapy/layers/ |
inet.py | 392 ck = checksum(p) 393 p = p[:10]+chb(ck>>8)+chb(ck&0xff)+p[12:] 531 ck = in4_chksum(socket.IPPROTO_TCP, self.underlayer, p) 532 p = p[:16]+struct.pack("!H", ck)+p[18:] 534 ck = scapy.layers.inet6.in6_chksum(socket.IPPROTO_TCP, self.underlayer, p) 535 p = p[:16]+struct.pack("!H", ck)+p[18:] 596 ck = in4_chksum(socket.IPPROTO_UDP, self.underlayer, p) 598 if ck == 0: 599 ck = 0xFFF [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
TelephonyUtil.java | 484 String ck = makeHex(result, resLen + 3, ckLen); local 487 sb.append(":" + ik + ":" + ck + ":" + res); 488 Log.v(TAG, "ik:" + ik + "ck:" + ck + " res:" + res);
|
/external/mesa3d/src/intel/vulkan/ |
genX_state.c | 70 anv_batch_emit(&batch, GENX(3DSTATE_WM_CHROMAKEY), ck);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick, 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 223 if (hexstr2bin(pos, data->ck, EAP_AKA_CK_LEN) < 0) 225 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN); 270 data->ik, data->ck, data->auts); 303 data->ik, data->ck, 317 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 1013 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 1020 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 1047 data->ck, data->k_encr, data->k_aut [all...] |
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/collator/ |
CollationMiscTest.java | 2900 CollationKey ck = new CollationKey("", (byte[]) null); local 2932 CollationKey ck = new CollationKey("", (byte[]) null); local 2946 CollationKey ck = new CollationKey("", (byte[]) null); local 2974 CollationKey ck = new CollationKey("", b); local [all...] |
/external/icu/icu4j/main/tests/collate/src/com/ibm/icu/dev/test/collator/ |
CollationMiscTest.java | 2897 CollationKey ck = new CollationKey("", (byte[]) null); local 2929 CollationKey ck = new CollationKey("", (byte[]) null); local 2943 CollationKey ck = new CollationKey("", (byte[]) null); local 2971 CollationKey ck = new CollationKey("", b); local [all...] |
/frameworks/opt/calendar/tests/src/com/android/calendarcommon2/ |
EventRecurrenceTest.java | 334 for (Check ck : checks) { 335 for (int n : ck.values) { 336 String recur = "FREQ=DAILY;" + ck.key + "=" + n; [all...] |
/libcore/ojluni/src/main/java/java/lang/ |
AbstractStringBuilder.java | 1452 char ck = value[k]; local [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_winreg.py | 294 with CreateKey(HKEY_CURRENT_USER, test_key_name) as ck:
295 self.assertNotEqual(ck.handle, 0)
|
/device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/Pccts/antlr/ |
mrhoist.c | 848 set MR_First(int ck,Junction *j,set *incomplete)
850 set MR_First(ck,j,incomplete)
851 int ck;
865 REACH(p,ck,incomplete,tokensUsed);
[all...] |
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Sample/Tools/Source/UefiVfrCompile/ |
makefile | 55 ANTLR_FLAGS = -CC -e3 -ck 3 -k 2
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Sample/Tools/Source/VfrCompile/ |
makefile | 54 # Add deeper lookahead with -ck 3
56 ANTLR_FLAGS = -CC -e3 -ck 3
|