/external/boringssl/src/crypto/cipher_extra/ |
H A D | e_rc2.c | 316 uint16_t *ki; local 358 ki = &(key->data[63]); 360 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
|
/external/clang/test/CXX/temp/temp.arg/temp.arg.nontype/ |
H A D | p1.cpp | 52 const int ki = 9; member in namespace:addr_of_obj_or_func 81 X0<ki> x0c; // expected-error {{must have its address taken}} 86 X0<&ki> x0c_addr; // expected-error {{cannot be converted to a value of type 'int *'}} 118 X2<ki> x2c; // expected-error {{ignores qualifiers}} 123 X2k<ki> x2kc; 128 X2k<&ki> x2kc_addr; // expected-error {{address taken}}
|
/external/openssh/ |
H A D | ssh-pkcs11-helper.c | 65 struct pkcs11_keyinfo *ki; local 67 ki = xcalloc(1, sizeof(*ki)); 68 ki->providername = xstrdup(name); 69 ki->key = k; 70 TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); 76 struct pkcs11_keyinfo *ki, *nxt; local 78 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki 93 struct pkcs11_keyinfo *ki; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
/external/gemmlowp/test/ |
H A D | correctness_meta_gemm.cc | 214 void q_suite(int mi, int ni, int ki, int mx, int nx, int kx, int md, int nd, argument 220 for (int k = ki; k < kx; k += kd) { 228 void f_suite(int mi, int ni, int ki, int mx, int nx, int kx, int md, int nd, argument 234 for (int k = ki; k < kx; k += kd) { 242 void i32_suite(int mi, int ni, int ki, int mx, int nx, int kx, int md, int nd, argument 248 for (int k = ki; k < kx; k += kd) {
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 85 u8 ki[16]; member in struct:milenage_parameters 126 " ki CHAR(32) NOT NULL," 173 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 174 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 175 printf("Invalid ki value in database\n"); 439 hexstr2bin(pos, m->ki, 16)) { 539 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16); 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 688 gsm_milenage(m->opc, m->ki, _ran [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 1137 struct ieee802_1x_mka_ki *ki) 1146 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1258 struct ieee802_1x_mka_ki ki; local 1305 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1306 ki.kn = be_to_host32(body->lkn); 1309 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 2717 struct ieee802_1x_mka_ki *ki) 2733 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) 2741 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2716 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 1137 struct ieee802_1x_mka_ki *ki) 1146 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1258 struct ieee802_1x_mka_ki ki; local 1305 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1306 ki.kn = be_to_host32(body->lkn); 1309 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 2717 struct ieee802_1x_mka_ki *ki) 2733 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) 2741 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2716 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 1137 struct ieee802_1x_mka_ki *ki) 1146 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1258 struct ieee802_1x_mka_ki ki; local 1305 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1306 ki.kn = be_to_host32(body->lkn); 1309 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 2717 struct ieee802_1x_mka_ki *ki) 2733 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) 2741 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2716 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
/external/mksh/src/ |
H A D | funcs.c | 1057 const struct kill_info *ki = (const struct kill_info *)arg; local 1061 ki->num_width, i, 1062 ki->name_width, sigtraps[i].name, 1137 struct kill_info ki = { 0, 0 }; local 1141 ki.num_width++; 1146 if (w > ki.name_width) 1147 ki.name_width = w; 1161 kill_fmt_entry, (void *)&ki, 1162 ki.num_width + 1 + ki [all...] |