/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/usb/wusbcore/ |
H A D | dev-sysfs.c | 81 struct wusb_ckhdid ck; local 88 &ck.data[0] , &ck.data[1], 89 &ck.data[2] , &ck.data[3], 90 &ck.data[4] , &ck.data[5], 91 &ck.data[6] , &ck.data[7], 92 &ck [all...] |
H A D | cbaf.c | 118 struct wusb_ckhdid ck; member in struct:cbaf 524 ccd->CK = cbaf->ck; 557 &cbaf->ck.data[0] , &cbaf->ck.data[1], 558 &cbaf->ck.data[2] , &cbaf->ck.data[3], 559 &cbaf->ck.data[4] , &cbaf->ck.data[5], 560 &cbaf->ck.data[6] , &cbaf->ck [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/usb/wusbcore/ |
H A D | dev-sysfs.c | 81 struct wusb_ckhdid ck; local 88 &ck.data[0] , &ck.data[1], 89 &ck.data[2] , &ck.data[3], 90 &ck.data[4] , &ck.data[5], 91 &ck.data[6] , &ck.data[7], 92 &ck [all...] |
H A D | cbaf.c | 118 struct wusb_ckhdid ck; member in struct:cbaf 524 ccd->CK = cbaf->ck; 557 &cbaf->ck.data[0] , &cbaf->ck.data[1], 558 &cbaf->ck.data[2] , &cbaf->ck.data[3], 559 &cbaf->ck.data[4] , &cbaf->ck.data[5], 560 &cbaf->ck.data[6] , &cbaf->ck [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/arm/plat-omap/include/plat/ |
H A D | clkdev_omap.h | 18 #define CLK(dev, con, ck, cp) \ 24 .clk = ck, \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/arm/plat-omap/include/plat/ |
H A D | clkdev_omap.h | 18 #define CLK(dev, con, ck, cp) \ 24 .clk = ck, \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 31 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 31 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 31 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/jpeg/ |
H A D | cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/jpeg/ |
H A D | cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/jpeg/ |
H A D | cdjpeg.c | 124 register int ca, ck; local 128 if ((ck = *keyword++) == '\0') 130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ 132 if (ca != ck)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_pax_common.c | 128 * @ck: Buffer for the derived Confirmation Key 133 u8 *mk, u8 *ck, u8 *ick) 139 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_CK_LEN, ck) || 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/arm/mach-davinci/ |
H A D | clock.c | 226 struct clk *ck; local 229 list_for_each_entry(ck, &clocks, node) { 230 if (ck->usecount > 0) 232 if (!(ck->flags & CLK_PSC)) 236 if (!davinci_psc_is_clk_active(ck->gpsc, ck->lpsc)) 239 pr_info("Clocks: disable unused %s\n", ck->name); 241 davinci_psc_config(psc_domain(ck), ck->gpsc, ck [all...] |