/external/libvpx/examples/includes/geshi/contrib/ |
D | langcheck.php | 540 foreach($language_data['COMMENT_SINGLE'] as $ck => $cv) { 541 if(!is_int($ck)) { 542 …report_error(TYPE_WARNING, "Language file contains an key '$ck' in \$language_data['COMMENT_SINGLE… 545 …_WARNING, "Language file contains an non-string entry at \$language_data['COMMENT_SINGLE'][$ck]!"); 547 if(!isset($language_data['STYLES']['COMMENTS'][$ck])) { 548 …uage file contains no \$language_data['STYLES']['COMMENTS'] specification for comment group $ck!"); 552 foreach($language_data['COMMENT_REGEXP'] as $ck => $cv) { 553 if(!is_int($ck)) { 554 …report_error(TYPE_WARNING, "Language file contains an key '$ck' in \$language_data['COMMENT_REGEXP… 557 …_WARNING, "Language file contains an non-string entry at \$language_data['COMMENT_REGEXP'][$ck]!"); [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
D | milenage.c | 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() argument 127 if (ck) { in milenage_f2345() 132 if (aes_128_encrypt_block(k, tmp1, ck)) in milenage_f2345() 135 ck[i] ^= opc[i]; in milenage_f2345() 181 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 243 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 246 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage() 250 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage() 277 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument [all …]
|
D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
D | hlr_auc_gw.c | 476 u8 ck[EAP_AKA_CK_LEN]; in aka_req_auth() local 492 autn, ik, ck, res, &res_len); in aka_req_auth() 500 memset(ck, '4', EAP_AKA_CK_LEN); in aka_req_auth() 520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN); in aka_req_auth()
|
/external/webkit/SunSpider/tests/sunspider-0.9/ |
D | math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/webkit/SunSpider/tests/sunspider-0.9.1/ |
D | math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 15 ck = Math.cos(k); 22 a5 += 1.0/(k3 * ck*ck);
|
/external/srec/srec/EventLog/src/ |
D | riff.c | 885 ChunkInfoStruct ck; in writeSwiAudioChunk() local 888 strncpy(ck.ckString, "segs", 4); in writeSwiAudioChunk() 889 ck.ckLength = chunk_len; in writeSwiAudioChunk() 892 swapInt(&ck.ckLength); in writeSwiAudioChunk() 893 memcpy(workbuf, &ck, chunkinfosize); in writeSwiAudioChunk() 907 memcpy(workbuf, &ck, chunkinfosize); in writeSwiAudioChunk() 958 ChunkInfoStruct ck; in convertBuf2Riff() local 1064 strncpy(ck.ckString, "LIST", 4); in convertBuf2Riff() 1065 ck.ckLength = listChunkSize - chunkInfoSize; in convertBuf2Riff() 1066 if (doSwap) swapInt(&ck.ckLength); in convertBuf2Riff() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_pax_common.c | 133 u8 *mk, u8 *ck, u8 *ick) in eap_pax_initial_key_derivation() argument 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || in eap_pax_initial_key_derivation() 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); in eap_pax_initial_key_derivation()
|
D | eap_sim_common.h | 85 const u8 *ik, const u8 *ck, u8 *mk); 99 const u8 *ik, const u8 *ck, u8 *k_encr, 110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 116 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() argument
|
D | eap_sim_common.c | 62 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 71 addr[2] = ck; in eap_aka_derive_mk() 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 282 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 300 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_keys() 431 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 465 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime() 472 os_memcpy(key, ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime() 494 os_memcpy(ck, hash, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime() 496 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
|
D | eap_pax_common.h | 95 u8 *mk, u8 *ck, u8 *ick);
|
/external/wpa_supplicant/ |
D | eap_pax_common.c | 133 u8 *mk, u8 *ck, u8 *ick) in eap_pax_initial_key_derivation() argument 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || in eap_pax_initial_key_derivation() 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); in eap_pax_initial_key_derivation()
|
D | eap_pax.c | 47 u8 ck[EAP_PAX_CK_LEN]; member 199 data->mk, data->ck, data->ick) < 0) in eap_pax_process_std_1() 229 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_1() 303 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_3()
|
D | pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/external/jpeg/ |
D | cdjpeg.c | 124 register int ca, ck; in keymatch() local 128 if ((ck = *keyword++) == '\0') in keymatch() 132 if (ca != ck) in keymatch()
|
D | rdjpgcom.c | 413 register int ca, ck; in keymatch() local 417 if ((ck = *keyword++) == '\0') in keymatch() 421 if (ca != ck) in keymatch()
|
D | wrjpgcom.c | 389 register int ca, ck; in keymatch() local 393 if ((ck = *keyword++) == '\0') in keymatch() 397 if (ca != ck) in keymatch()
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | AuthenticationHeader.java | 524 public void setCK(String ck) throws ParseException { in setCK() argument 525 if (ck == null) in setCK() 529 setParameter(CK, ck); in setCK()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_pax.c | 46 u8 ck[EAP_PAX_CK_LEN]; member 188 data->mk, data->ck, data->ick) < 0) in eap_pax_process_std_1() 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_1() 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_3()
|
D | eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 155 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 188 data->ik, data->ck, in eap_aka_umts_auth() 202 os_memset(data->ck, '4', EAP_AKA_CK_LEN); in eap_aka_umts_auth() 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 870 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge() 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_build_std_3() 390 data->rand.e, data->mk, data->ck, in eap_pax_process_std_2() 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_2()
|
/external/openssl/crypto/x509/ |
D | x509_trs.c | 159 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), in X509_TRUST_add() 192 trtmp->check_trust = ck; in X509_TRUST_add()
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
D | WWWAuthenticateHeaderIms.java | 67 public void setCK(String ck) throws ParseException; in setCK() argument
|
/external/webkit/JavaScriptCore/ |
D | THANKS | 8 Christian Kirsch <ck@held.mind.de> - for his contribution to the Date object
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|