/external/dropbear/libtomcrypt/src/ciphers/ |
kseed.c | 205 ulong32 tmp, k1, k2, k3, k4; local 218 LOAD32H(k3, key+8); 222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); 225 tmp = k3; 226 k3 = ((k3 << 8) | (k4 >> 24)) & 0xFFFFFFFF;
|
/external/webkit/WebCore/platform/graphics/filters/ |
FEComposite.cpp | 36 const float& k1, const float& k2, const float& k3, const float& k4) 43 , m_k3(k3) 49 const float& k1, const float& k2, const float& k3, const float& k4) 51 return adoptRef(new FEComposite(in, in2, type, k1, k2, k3, k4)); 84 float FEComposite::k3() const function in class:WebCore::FEComposite 89 void FEComposite::setK3(float k3) 91 m_k3 = k3; 105 float k1, float k2, float k3, float k4) 114 double result = scaledK1 * i1 * i2 + k2 * i1 + k3 * i2 + scaledK4;
|
/frameworks/base/media/libstagefright/codecs/m4v_h263/enc/src/ |
dct.cpp | 41 Int k0, k1, k2, k3, k4, k5, k6, k7; local 68 k3 = mask & (tmp >> 15); 69 k2 = k3 - (k2 << 1); 70 k3 = (tmp2 >> 24) & 0xFF; 72 k3 = k4 - (k3 << 1); 97 k3 = k3 + k4; 98 k4 = k3 - (k4 << 1); 100 k0 = k0 + k3; 270 register Int k0, k1, k2, k3, k4, k5, k6, k7; local 476 register Int k0, k1, k2, k3, k4, k5, k6, k7; local 655 Int k0, k1, k2, k3, k4, k5, k6, k7; local 866 register Int k0, k1, k2, k3, k4, k5, k6, k7; local 1053 register Int k0, k1, k2, k3, k4, k5, k6, k7; local [all...] |
dct_inline.h | 82 __inline int32 sum_abs(int32 k0, int32 k1, int32 k2, int32 k3, 93 carry = k3 >> 31; 94 abs_sum += (k3 ^ carry) - carry; 241 __inline int32 sum_abs(int32 k0, int32 k1, int32 k2, int32 k3, 252 eors carry, k3, k3, asr #31 ; local 347 __inline int32 sum_abs(int32 k0, int32 k1, int32 k2, int32 k3, 355 register int32 dd = (int32)k3;
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
TwofishEngine.java | 391 int k3 = sBoxKeys[3]; local 406 b0 = (P[P_04][b0] & 0xff) ^ b0(k3); 407 b1 = (P[P_14][b1] & 0xff) ^ b1(k3); 408 b2 = (P[P_24][b2] & 0xff) ^ b2(k3); 409 b3 = (P[P_34][b3] & 0xff) ^ b3(k3); 529 int k3 = k32[3]; local 541 b0 = (P[P_04][b0] & 0xff) ^ b0(k3); 542 b1 = (P[P_14][b1] & 0xff) ^ b1(k3); 543 b2 = (P[P_24][b2] & 0xff) ^ b2(k3); 544 b3 = (P[P_34][b3] & 0xff) ^ b3(k3); [all...] |
/external/openssl/crypto/ec/ |
ec_asn1.c | 106 unsigned int *k2, unsigned int *k3) 122 if (k3) 123 *k3 = group->poly[1]; 134 long k3; member in struct:x9_62_pentanomial_st 202 ASN1_SIMPLE(X9_62_PENTANOMIAL, k3, LONG) 394 unsigned int k1, k2, k3; local 396 if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3)) 409 char_two->p.ppBasis->k3 = (long)k3; 838 if (!(char_two->m > penta->k3 && penta->k3 > penta->k2 && penta->k2 > penta->k1 && penta->k1 > 0) [all...] |
/external/srec/srec/cfront/ |
sp_fft.c | 427 unsigned k1, k2, k3; local 434 k3 = k2 + quarterLength; 439 r3 = data[k3]; 443 i3 = data[k3+1]; 470 data[k3] = r3; 471 data[k3+1] = i3; 476 complex_multiplier(cc3, -ss3, r3, i3, data + k3, data + k3 + 1);
|
/external/tcpdump/ |
print-eigrp.c | 113 u_int8_t k3; member in struct:eigrp_tlv_general_parm_t 305 printf("\n\t holdtime: %us, k1 %u, k2 %u, k3 %u, k4 %u, k5 %u", 309 tlv_ptr.eigrp_tlv_general_parm->k3,
|
/frameworks/base/services/camera/libcameraservice/ |
FakeCamera.cpp | 55 * R = ( Y + k3*Cr ) 63 static const double k3 = 1.596; member in namespace:android 68 * G + k1/k3*R + k2/k4*B = Y*( 1 + k1/k3 + k2/k4 ) 70 * Y = ( G + k1/k3*R + k2/k4*B ) / (1 + k1/k3 + k2/k4) 71 * Y0 = ( G0 + k1/k3*R0 + k2/k4*B0 ) / ((1 + k1/k3 + k2/k4)*k0) + 16 74 * kYr = k1/k3 83 static const double kYr = k1/k3; [all...] |
/external/chromium/net/http/ |
http_auth_handler_ntlm_portable.cc | 320 uint8 keybytes[21], k1[8], k2[8], k3[8]; local 327 DESMakeKey(keybytes + 14, k3); 331 DESEncrypt(k3, challenge, response + 16);
|