Searched defs:ck (Results 1 - 25 of 53) sorted by relevance

123

/external/clang/test/CodeGen/
H A Dunsigned-promotion.c10 unsigned char ci, cj, ck; variable
84 // CHECKS: load i8* @ck
92 // CHECKU: [[T3:%.*]] = load i8* @ck
98 ci = cj + ck;
106 // CHECKS: load i8* @ck
114 // CHECKU: [[T3:%.*]] = load i8* @ck
120 ci = cj - ck;
128 // CHECKS: load i8* @ck
136 // CHECKU: [[T3:%.*]] = load i8* @ck
142 ci = cj * ck;
[all...]
/external/nist-sip/java/gov/nist/javax/sip/header/ims/
H A DWWWAuthenticateHeaderIms.java47 * cipher-key = "ck" EQUAL ck-value
49 * ck-value = LDQUOT *(HEXDIG) RDQUOT
67 public void setCK(String ck) throws ParseException; argument
/external/chromium_org/tools/json_schema_compiler/test/
H A Dtest_util.cc62 const std::string& ck, base::Value* cv) {
64 dict->SetWithoutPathExpansion(ck, cv);
59 Dictionary( const std::string& ak, base::Value* av, const std::string& bk, base::Value* bv, const std::string& ck, base::Value* cv) argument
/external/jpeg/
H A Dcdjpeg.c124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
H A Drdjpgcom.c413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
H A Dwrjpgcom.c389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
/external/qemu/distrib/jpeg-6b/
H A Dcdjpeg.c124 register int ca, ck; local
128 if ((ck = *keyword++) == '\0')
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
132 if (ca != ck)
H A Drdjpgcom.c413 register int ca, ck; local
417 if ((ck = *keyword++) == '\0')
419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
421 if (ca != ck)
H A Dwrjpgcom.c389 register int ca, ck; local
393 if ((ck = *keyword++) == '\0')
395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
397 if (ca != ck)
/external/skia/tests/
H A DSk64Test.cpp173 int32_t ck = (int32_t)sqrt((double)wide.getLongLong()); local
174 int diff = denom - ck;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
121 if (ck) {
126 if (aes_128_encrypt_block(k, tmp1, ck))
129 ck[i] ^= opc[i];
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
175 u8 *ck, u8 *res, size_t *res_len)
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, i
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pax_common.c122 * @ck: Buffer for the derived Confirmation Key
127 u8 *mk, u8 *ck, u8 *ick)
133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) ||
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pax.c39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pax.c37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
385 data->rand.e, data->mk, data->ck,
394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pax.c39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pax.c37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
385 data->rand.e, data->mk, data->ck,
394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pax.c39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
181 data->mk, data->ck, data->ick) < 0)
207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN,
278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pax.c37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data
146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
385 data->rand.e, data->mk, data->ck,
394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DAuthenticationHeader.java524 public void setCK(String ck) throws ParseException { argument
525 if (ck == null)
529 setParameter(CK, ck);
/external/clang/lib/Analysis/
H A DAnalysisDeclContext.cpp297 ContextKind ck,
301 ID.AddInteger(ck);
296 ProfileCommon(llvm::FoldingSetNodeID &ID, ContextKind ck, AnalysisDeclContext *ctx, const LocationContext *parent, const void *data) argument
/external/srec/srec/EventLog/src/
H A Driff.c885 ChunkInfoStruct ck; local
888 strncpy(ck.ckString, "segs", 4);
889 ck.ckLength = chunk_len;
892 swapInt(&ck.ckLength);
893 memcpy(workbuf, &ck, chunkinfosize);
907 memcpy(workbuf, &ck, chunkinfosize);
958 ChunkInfoStruct ck; local
1064 strncpy(ck.ckString, "LIST", 4);
1065 ck.ckLength = listChunkSize - chunkInfoSize;
1066 if (doSwap) swapInt(&ck
[all...]

Completed in 449 milliseconds

123