/external/clang/test/CodeGen/ |
H A D | unsigned-promotion.c | 10 unsigned char ci, cj, ck; variable 84 // CHECKS: load i8* @ck 92 // CHECKU: [[T3:%.*]] = load i8* @ck 98 ci = cj + ck; 106 // CHECKS: load i8* @ck 114 // CHECKU: [[T3:%.*]] = load i8* @ck 120 ci = cj - ck; 128 // CHECKS: load i8* @ck 136 // CHECKU: [[T3:%.*]] = load i8* @ck 142 ci = cj * ck; [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | WWWAuthenticateHeaderIms.java | 47 * cipher-key = "ck" EQUAL ck-value 49 * ck-value = LDQUOT *(HEXDIG) RDQUOT 67 public void setCK(String ck) throws ParseException; argument
|
/external/chromium_org/tools/json_schema_compiler/test/ |
H A D | test_util.cc | 62 const std::string& ck, base::Value* cv) { 64 dict->SetWithoutPathExpansion(ck, cv); 59 Dictionary( const std::string& ak, base::Value* av, const std::string& bk, base::Value* bv, const std::string& ck, base::Value* cv) argument
|
/external/jpeg/ |
H A D | cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
H A D | rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
H A D | wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/qemu/distrib/jpeg-6b/ |
H A D | cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
H A D | rdjpgcom.c | 413 register int ca, ck; local 417 if ((ck = *keyword++) == '\0') 419 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 421 if (ca != ck)
|
H A D | wrjpgcom.c | 389 register int ca, ck; local 393 if ((ck = *keyword++) == '\0') 395 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 397 if (ca != ck)
|
/external/skia/tests/ |
H A D | Sk64Test.cpp | 173 int32_t ck = (int32_t)sqrt((double)wide.getLongLong()); local 174 int diff = denom - ck;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len) 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, i 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pax_common.c | 122 * @ck: Buffer for the derived Confirmation Key 127 u8 *mk, u8 *ck, u8 *ick) 133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len) 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, i 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pax_common.c | 122 * @ck: Buffer for the derived Confirmation Key 127 u8 *mk, u8 *ck, u8 *ick) 133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 121 if (ck) { 126 if (aes_128_encrypt_block(k, tmp1, ck)) 129 ck[i] ^= opc[i]; 169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 175 u8 *ck, u8 *res, size_t *res_len) 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, i 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 122 * @ck: Buffer for the derived Confirmation Key 127 u8 *mk, u8 *ck, u8 *ick) 133 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 126 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 385 data->rand.e, data->mk, data->ck, 394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 385 data->rand.e, data->mk, data->ck, 394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 39 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 181 data->mk, data->ck, data->ick) < 0) 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 278 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pax.c | 37 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 146 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 385 data->rand.e, data->mk, data->ck, 394 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | AuthenticationHeader.java | 524 public void setCK(String ck) throws ParseException { argument 525 if (ck == null) 529 setParameter(CK, ck);
|
/external/clang/lib/Analysis/ |
H A D | AnalysisDeclContext.cpp | 297 ContextKind ck, 301 ID.AddInteger(ck); 296 ProfileCommon(llvm::FoldingSetNodeID &ID, ContextKind ck, AnalysisDeclContext *ctx, const LocationContext *parent, const void *data) argument
|
/external/srec/srec/EventLog/src/ |
H A D | riff.c | 885 ChunkInfoStruct ck; local 888 strncpy(ck.ckString, "segs", 4); 889 ck.ckLength = chunk_len; 892 swapInt(&ck.ckLength); 893 memcpy(workbuf, &ck, chunkinfosize); 907 memcpy(workbuf, &ck, chunkinfosize); 958 ChunkInfoStruct ck; local 1064 strncpy(ck.ckString, "LIST", 4); 1065 ck.ckLength = listChunkSize - chunkInfoSize; 1066 if (doSwap) swapInt(&ck [all...] |