/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpas_kay.c | 293 u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() 314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 328 struct mka_key *msk; in ieee802_1x_notify_create_actor() local 338 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor() 342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor() 345 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 346 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor() 360 if (ieee802_1x_cak_aes_cmac(msk in ieee802_1x_notify_create_actor() 292 ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr, u8 *msk, size_t *len) ieee802_1x_auth_get_msk() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpas_kay.c | 293 u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() 314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 328 struct mka_key *msk; in ieee802_1x_notify_create_actor() local 338 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor() 342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor() 345 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 346 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor() 360 if (ieee802_1x_cak_aes_cmac(msk in ieee802_1x_notify_create_actor() 292 ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr, u8 *msk, size_t *len) ieee802_1x_auth_get_msk() argument [all...] |
/third_party/qrcodegen/java-fast/io/nayuki/fastqrcodegen/ |
H A D | QrCode.java | 233 * @param msk the mask pattern to use, which is either −1 for automatic choice or from 0 to 7 for fixed choice 238 public QrCode(int ver, Ecc ecl, byte[] dataCodewords, int msk) { in QrCode() argument 242 if (msk < -1 || msk > 7) in QrCode() 255 mask = handleConstructorMasking(tpl.masks, msk); in QrCode() 285 private void drawFormatBits(int msk) { in drawFormatBits() argument 287 int data = errorCorrectionLevel.formatBits << 3 | msk; // errCorrLvl is uint2, mask is uint3 in drawFormatBits() 380 private void applyMask(int[] msk) { in applyMask() argument 381 if (msk.length != modules.length) in applyMask() 383 for (int i = 0; i < msk in applyMask() 391 handleConstructorMasking(int[][] masks, int msk) handleConstructorMasking() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_kay.c | 382 struct sta_info *sta, u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() 402 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 416 struct mka_key *msk; in ieee802_1x_notify_create_actor_hapd() local 426 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd() 430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 433 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 434 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor_hapd() 451 if (ieee802_1x_cak_aes_cmac(msk in ieee802_1x_notify_create_actor_hapd() 381 ieee802_1x_auth_get_msk(struct hostapd_data *hapd, struct sta_info *sta, u8 *msk, size_t *len) ieee802_1x_auth_get_msk() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_kay.c | 382 struct sta_info *sta, u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() 402 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 416 struct mka_key *msk; in ieee802_1x_notify_create_actor_hapd() local 426 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd() 430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 433 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 434 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor_hapd() 451 if (ieee802_1x_cak_aes_cmac(msk in ieee802_1x_notify_create_actor_hapd() 381 ieee802_1x_auth_get_msk(struct hostapd_data *hapd, struct sta_info *sta, u8 *msk, size_t *len) ieee802_1x_auth_get_msk() argument [all...] |
/third_party/ffmpeg/libavcodec/ |
H A D | dxa.c | 57 uint8_t *code, *data, *mv, *msk, *tmp, *tmp2; in decode_13() local 69 msk = mv + AV_RB32(src + 4); in decode_13() 73 if (data > src_end || mv > src_end || msk > src_end) in decode_13() 104 mask = AV_RB16(msk); in decode_13() 105 msk += 2; in decode_13() 108 mask = ((msk[0] & 0xF0) << shift1[type]) | ((msk[0] & 0xF) << shift2[type]); in decode_13() 109 msk++; in decode_13() 135 mask = *msk++; in decode_13() 174 mask = AV_RB16(msk); in decode_13() [all...] |
H A D | vmnc.c | 158 uint8_t *cd = c->curbits, *msk = c->curmask; in put_cursor() local 161 dst[i] = (dst[i] & cd[i]) ^ msk[i]; in put_cursor() 162 msk += c->cur_w; in put_cursor() 167 uint16_t *cd = (uint16_t*)c->curbits, *msk = (uint16_t*)c->curmask; in put_cursor() local 172 dst2[i] = (dst2[i] & cd[i]) ^ msk[i]; in put_cursor() 173 msk += c->cur_w; in put_cursor() 178 uint32_t *cd = (uint32_t*)c->curbits, *msk = (uint32_t*)c->curmask; in put_cursor() local 183 dst2[i] = (dst2[i] & cd[i]) ^ msk[i]; in put_cursor() 184 msk += c->cur_w; in put_cursor()
|
/third_party/qrcodegen/java/src/main/java/io/nayuki/qrcodegen/ |
H A D | QrCode.java | 243 * @param msk the mask pattern to use, which is either −1 for automatic choice or from 0 to 7 for fixed choice 248 public QrCode(int ver, Ecc ecl, byte[] dataCodewords, int msk) { in QrCode() argument 252 if (msk < -1 || msk > 7) in QrCode() 267 if (msk == -1) { // Automatically choose best mask in QrCode() 274 msk = i; in QrCode() 280 assert 0 <= msk && msk <= 7; in QrCode() 281 mask = msk; in QrCode() 282 applyMask(msk); // Appl in QrCode() 341 drawFormatBits(int msk) drawFormatBits() argument 502 applyMask(int msk) applyMask() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() 169 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 271 * @msk: Buffer for 64-byte MSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, ems in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument [all...] |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 99 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() 150 if (msk) { in eap_sim_derive_keys_reauth() 151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 153 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 315 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_aka_prime_derive_keys() 316 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LE in eap_aka_prime_derive_keys() 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument [all...] |
H A D | eap_teap_common.c | 80 int eap_teap_derive_eap_msk(const u8 *simck, u8 *msk) in eap_teap_derive_eap_msk() argument 89 msk, EAP_TEAP_KEY_LEN) < 0) in eap_teap_derive_eap_msk() 92 msk, EAP_TEAP_KEY_LEN); in eap_teap_derive_eap_msk() 140 const u8 *msk, size_t msk_len, in eap_teap_derive_imck() 164 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK[j]", msk, msk_len); in eap_teap_derive_imck() 197 if (msk && msk_len > 0) { in eap_teap_derive_imck() 203 os_memcpy(imsk, msk, copy_len); in eap_teap_derive_imck() 139 eap_teap_derive_imck(const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) eap_teap_derive_imck() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.h | 84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 88 const u8 *nonce_s, const u8 *mk, u8 *msk, 98 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 101 const u8 *nonce_s, u8 *msk, u8 *emsk); 116 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 123 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() 112 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 120 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() 169 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 271 * @msk: Buffer for 64-byte MSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, ems in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument [all...] |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
|
H A D | eap_sim_common.c | 81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 94 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 103 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 113 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() 154 if (msk) { in eap_sim_derive_keys_reauth() 155 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 157 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 281 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 319 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LE in eap_aka_prime_derive_keys() 111 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 279 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 328 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument [all...] |
H A D | eap_teap_common.c | 86 int eap_teap_derive_eap_msk(u16 tls_cs, const u8 *simck, u8 *msk) in eap_teap_derive_eap_msk() argument 95 msk, EAP_TEAP_KEY_LEN) < 0) in eap_teap_derive_eap_msk() 98 msk, EAP_TEAP_KEY_LEN); in eap_teap_derive_eap_msk() 147 const u8 *msk, size_t msk_len, in eap_teap_derive_imck() 171 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK[j]", msk, msk_len); in eap_teap_derive_imck() 206 if (msk && msk_len > 0) { in eap_teap_derive_imck() 212 os_memcpy(imsk, msk, copy_len); in eap_teap_derive_imck() 145 eap_teap_derive_imck(u16 tls_cs, const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) eap_teap_derive_imck() argument
|
/third_party/qrcodegen/cpp/ |
H A D | qrcodegen.cpp | 320 QrCode::QrCode(int ver, Ecc ecl, const vector<uint8_t> &dataCodewords, int msk) : in QrCode() argument 326 if (msk < -1 || msk > 7) in QrCode() 339 if (msk == -1) { // Automatically choose best mask in QrCode() 346 msk = i; in QrCode() 352 assert(0 <= msk && msk <= 7); in QrCode() 353 mask = msk; in QrCode() 354 applyMask(msk); // Apply the final choice of mask in QrCode() 355 drawFormatBits(msk); // Overwrit in QrCode() 416 drawFormatBits(int msk) drawFormatBits() argument 563 applyMask(int msk) applyMask() argument [all...] |
H A D | qrcodegen.hpp | 334 public: QrCode(int ver, Ecc ecl, const std::vector<std::uint8_t> &dataCodewords, int msk); 381 private: void drawFormatBits(int msk); 425 private: void applyMask(int msk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_key.c | 91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_cak_aes_cmac() argument 97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK", in ieee802_1x_cak_aes_cmac() 108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_ckn_aes_cmac() argument 124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN", in ieee802_1x_ckn_aes_cmac()
|
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, 14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_key.c | 91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_cak_aes_cmac() argument 97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK", in ieee802_1x_cak_aes_cmac() 108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_ckn_aes_cmac() argument 124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN", in ieee802_1x_ckn_aes_cmac()
|
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, 14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
|
/third_party/backends/backend/ |
H A D | plustek-usbhw.c | 1012 * @param msk - pointer to a var to receive the mask value 1016 usb_GetLampRegAndMask( u_long flag, SANE_Byte *reg, SANE_Byte *msk ) in usb_GetLampRegAndMask() 1020 *msk = 0x80; in usb_GetLampRegAndMask() 1024 *msk = 0x08; in usb_GetLampRegAndMask() 1028 *msk = 0x80; in usb_GetLampRegAndMask() 1032 *msk = 0x08; in usb_GetLampRegAndMask() 1036 *msk = 0x80; in usb_GetLampRegAndMask() 1040 *msk = 0x08; in usb_GetLampRegAndMask() 1044 *msk = 0; in usb_GetLampRegAndMask() 1064 SANE_Byte reg, msk, va in usb_GetLampStatus() local 1143 SANE_Byte reg, msk; usb_switchLampX() local [all...] |