Searched refs:ck (Results 1 - 25 of 88) sorted by relevance

1234

/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/
H A Dmath-partial-sums.js9 var k2 = k3 = sk = ck = 0.0;
15 ck = Math.cos(k);
22 a5 += 1.0/(k3 * ck*ck);
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/
H A Dmath-partial-sums.js9 var k2 = k3 = sk = ck = 0.0;
15 ck = Math.cos(k);
22 a5 += 1.0/(k3 * ck*ck);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
H A Dmilenage.h20 u8 *ck, u8 *res, size_t *res_len);
26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
/external/nist-sip/java/gov/nist/javax/sip/header/ims/
H A DWWWAuthenticateHeaderIms.java47 * cipher-key = "ck" EQUAL ck-value
49 * ck-value = LDQUOT *(HEXDIG) RDQUOT
67 public void setCK(String ck) throws ParseException; argument
/external/clang/utils/TableGen/
H A DNeonEmitter.cpp482 ClassKind ck, bool ret) {
512 usgn = usgn | poly | ((ck == ClassI || ck == ClassW) && scal && type != 'f');
541 if (mod == 'f' || (ck != ClassB && type == 'f'))
543 if (ck != ClassB && type == 's')
545 if (ck != ClassB && type == 'i')
547 if (ck != ClassB && type == 'l')
561 if (mod == 'f' || (ck != ClassB && type == 'f'))
563 if (ck != ClassB && type == 's')
565 if (ck !
481 BuiltinTypeString(const char mod, StringRef typestr, ClassKind ck, bool ret) argument
576 MangleName(const std::string &name, StringRef typestr, ClassKind ck) argument
1059 GenBuiltin(const std::string &name, const std::string &proto, StringRef typestr, ClassKind ck) argument
1175 GenBuiltinDef(const std::string &name, const std::string &proto, StringRef typestr, ClassKind ck) argument
1462 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local
1605 ClassKind ck = ClassMap[R->getSuperClasses()[1]]; local
[all...]
/external/jpeg/
H A Dcdjpeg.c124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
/external/qemu/distrib/jpeg-6b/
H A Dcdjpeg.c124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_pax_common.c128 * @ck: Buffer for the derived Confirmation Key
133 u8 *mk, u8 *ck, u8 *ick)
139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_pax_common.h95 u8 *mk, u8 *ck, u8 *ick);
H A Deap_sim_common.h85 const u8 *ik, const u8 *ck, u8 *mk);
99 const u8 *ik, const u8 *ck, u8 *k_encr,
110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
116 const u8 *ik, const u8 *ck,
114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_pax_common.h89 u8 *mk, u8 *ck, u8 *ick);
H A Deap_sim_common.h79 const u8 *ik, const u8 *ck, u8 *mk);
93 const u8 *ik, const u8 *ck, u8 *k_encr,
104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
110 const u8 *ik, const u8 *ck,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_pax_common.h89 u8 *mk, u8 *ck, u8 *ick);
H A Deap_sim_common.h79 const u8 *ik, const u8 *ck, u8 *mk);
93 const u8 *ik, const u8 *ck, u8 *k_encr,
104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
110 const u8 *ik, const u8 *ck,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
H A Dpcsc_funcs.h55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.h31 unsigned char *ik, unsigned char *ck, unsigned char *auts);

Completed in 437 milliseconds

1234