/external/webkit/SunSpider/tests/ |
D | math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/srec/srec/EventLog/src/ |
D | riff.c | 885 ChunkInfoStruct ck; in writeSwiAudioChunk() local 888 strncpy(ck.ckString, "segs", 4); in writeSwiAudioChunk() 889 ck.ckLength = chunk_len; in writeSwiAudioChunk() 892 swapInt(&ck.ckLength); in writeSwiAudioChunk() 893 memcpy(workbuf, &ck, chunkinfosize); in writeSwiAudioChunk() 907 memcpy(workbuf, &ck, chunkinfosize); in writeSwiAudioChunk() 958 ChunkInfoStruct ck; in convertBuf2Riff() local 1064 strncpy(ck.ckString, "LIST", 4); in convertBuf2Riff() 1065 ck.ckLength = listChunkSize - chunkInfoSize; in convertBuf2Riff() 1066 if (doSwap) swapInt(&ck.ckLength); in convertBuf2Riff() [all …]
|
/external/wpa_supplicant/ |
D | eap_pax_common.c | 133 u8 *mk, u8 *ck, u8 *ick) in eap_pax_initial_key_derivation() argument 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || in eap_pax_initial_key_derivation() 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); in eap_pax_initial_key_derivation()
|
D | eap_pax.c | 47 u8 ck[EAP_PAX_CK_LEN]; member 199 data->mk, data->ck, data->ick) < 0) in eap_pax_process_std_1() 229 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_1() 303 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_3()
|
D | pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
D | eap_pax_common.h | 99 u8 *mk, u8 *ck, u8 *ick);
|
D | eap_aka.c | 25 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 80 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 87 os_memset(data->ck, '4', EAP_AKA_CK_LEN); in eap_aka_umts_auth() 471 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
D | eap_sim_common.c | 60 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 69 addr[2] = ck; in eap_aka_derive_mk() 75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
|
D | eap_sim_common.h | 78 const u8 *ik, const u8 *ck, u8 *mk);
|
D | pcsc_funcs.c | 1142 unsigned char *ik, unsigned char *ck, unsigned char *auts) in scard_umts_auth() argument 1219 os_memcpy(ck, pos, CK_LEN); in scard_umts_auth() 1221 wpa_hexdump(MSG_DEBUG, "SCARD: CK", ck, CK_LEN); in scard_umts_auth()
|
/external/jpeg/ |
D | cdjpeg.c | 124 register int ca, ck; in keymatch() local 128 if ((ck = *keyword++) == '\0') in keymatch() 132 if (ca != ck) in keymatch()
|
D | rdjpgcom.c | 413 register int ca, ck; in keymatch() local 417 if ((ck = *keyword++) == '\0') in keymatch() 421 if (ca != ck) in keymatch()
|
D | wrjpgcom.c | 389 register int ca, ck; in keymatch() local 393 if ((ck = *keyword++) == '\0') in keymatch() 397 if (ca != ck) in keymatch()
|
D | testimg.ppm | 4 …VX�^b�Za�S[�Q[�FQ�HS�OY�\f�mv�nt�Y_�>D�.5�-4�2<�2>�+9�'4�6E�KW�IS�PW�W_�^f�ck�`i�RY�BI�97�71�75�<8…
|
/external/openssl/crypto/x509/ |
D | x509_trs.c | 158 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), in X509_TRUST_add() 191 trtmp->check_trust = ck; in X509_TRUST_add()
|
D | x509.h | 1265 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
|
/external/webkit/JavaScriptCore/ |
D | THANKS | 8 Christian Kirsch <ck@held.mind.de> - for his contribution to the Date object
|
/external/openssl/crypto/x509v3/ |
D | v3_purp.c | 171 int (*ck)(const X509_PURPOSE *, const X509 *, int), in X509_PURPOSE_add() 210 ptmp->check_purpose = ck; in X509_PURPOSE_add()
|
D | x509v3.h | 609 int (*ck)(const X509_PURPOSE *, const X509 *, int),
|
/external/openssl/include/openssl/ |
D | x509v3.h | 609 int (*ck)(const X509_PURPOSE *, const X509 *, int),
|
D | x509.h | 1265 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int),
|
/external/icu4c/data/locales/ |
D | cs.txt | 700 "Dinár irácký",
|
/external/srec/config/en.us/dictionary/ |
D | large.ok | 17764 mamaroneck m@mar~ck
|