HomeSort by relevance Sort by last modified time
    Searched refs:tk (Results 1 - 25 of 45) sorted by null

1 2

  /external/javassist/src/main/javassist/compiler/
Lex.java 70 Token tk = lookAheadTokens; local
71 if (tk == null) {
72 lookAheadTokens = tk = currentToken; // reuse an object!
73 tk.next = null;
74 get(tk);
77 for (; i-- > 0; tk = tk.next)
78 if (tk.next == null) {
80 tk.next = tk2 = new Token();
84 currentToken = tk;
    [all...]
  /external/antlr/antlr-3.4/runtime/Ruby/test/functional/lexer/
nuances.rb 24 tokens = lexer.each { |tk| tk }
44 tks = lexer.map { |tk| tk }
properties.rb 32 tokens = lexer.map { |tk| tk }
  /external/wpa_supplicant_8/src/crypto/
md5-non-fips.c 31 u8 tk[16]; local
45 if (md5_vector_non_fips_allow(1, &key, &key_len, tk))
47 key = tk;
md5.c 30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
crypto_internal.c 36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
sha1.c 30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
sha256.c 29 unsigned char tk[32]; local
43 sha256_vector(1, &key, &key_len, tk);
44 key = tk;
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.c 45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[0][3] ^= S[tk[KC-1][0]]
100 #undef tk macro
    [all...]
  /external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/
Interp.java 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); local
116 while ( tk.hasMoreTokens() ) {
117 String tokenName = tk.nextToken();
  /external/chromium/chrome/browser/ui/webui/options/
advanced_options_utils_gtk.cc 47 CStringTokenizer tk(path, path + strlen(path), ":");
49 while (tk.GetNext()) {
51 bin_path = FilePath(tk.token()).Append(commands[i].argv[0]);
  /external/antlr/antlr-3.4/runtime/Ruby/test/functional/parser/
properties.rb 132 a returns [$tk]
135 $tk = [
164 tk = parser.a
165 tk.should == [
  /external/dropbear/libtomcrypt/src/math/fp/
ltc_ecc_fp_mulmod.c 784 void *tk, *order; local
    [all...]
  /external/freetype/src/psaux/
afmparse.c 586 AFM_TrackKern tk; local
618 tk = fi->TrackKerns + n;
628 tk->degree = shared_vals[0].u.i;
629 tk->min_ptsize = shared_vals[1].u.f;
630 tk->min_kern = shared_vals[2].u.f;
631 tk->max_ptsize = shared_vals[3].u.f;
632 tk->max_kern = shared_vals[4].u.f;
  /external/valgrind/main/coregrind/m_demangle/
cplus-dem.c 3406 type_kind_t tk = tk_none; local
3714 type_kind_t tk = tk_integral; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha256.c 35 unsigned char tk[32]; local
49 sha256_vector(1, &key, &key_len, tk);
50 key = tk;
crypto_internal.c 72 u8 tk[20]; local
92 MD5Final(tk, &ctx->u.md5);
93 key = tk;
110 SHA1Final(tk, &ctx->u.sha1);
111 key = tk;
md5.c 35 u8 tk[16]; local
49 md5_vector(1, &key, &key_len, tk);
50 key = tk;
  /external/antlr/antlr-3.4/runtime/Ruby/test/functional/delegation/
import.rb 256 lexer.map { |tk| lexer.capture( tk.text ) }
281 lexer.map { |tk| lexer.capture( tk.text ) }
  /external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/
streams.rb 926 tk = look( k ) and return( tk.type )
960 tk = @tokens.at( cursor += 1 ) or return( cursor )
961 # ^- if tk is nil (i.e. i is outside array limits)
962 end until tk.channel == @channel
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_peap.c 252 u8 *tk; local
256 * Tunnel key (TK) is the first 60 octets of the key generated by
259 tk = data->key_data;
260 if (tk == NULL)
262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
266 /* Fast-connect: IPMK|CMK = TK */
267 os_memcpy(data->ipmk, tk, 40);
268 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
270 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 246 u8 *tk; local
250 * Tunnel key (TK) is the first 60 octets of the key generated by
253 tk = data->key_data;
254 if (tk == NULL)
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
260 /* Fast-connect: IPMK|CMK = TK */
261 os_memcpy(data->ipmk, tk, 40);
262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
264 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /external/sonivox/jet_tools/JetCreator/
img_Redo.py 27 \xd1\xe3H\xb2(L\x19\x87-\x0c\xd8"\tK&\xc1\xa5\x05.\x19\xb8\xb4`\xf0\t\x0c\
28 \x1b\xddP\x89\x17\xa5\xfa\xa3\xb8\xd0\xf3Gbt\xec\xc6y\tk\xdd\xe1-\x98\xb8g\
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 324 u8 *tk; local
328 * Tunnel key (TK) is the first 60 octets of the key generated by
331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
333 if (tk == NULL)
335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
342 * TempKey = First 40 octets of TK
347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
348 if (peap_prfplus(data->peap_version, tk, 40,
351 os_free(tk);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_peap.c 327 u8 *tk; local
331 * Tunnel key (TK) is the first 60 octets of the key generated by
334 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
336 if (tk == NULL)
338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
345 * TempKey = First 40 octets of TK
350 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
351 peap_prfplus(data->peap_version, tk, 40, "Inner Methods Compound Keys",
356 os_free(tk);
    [all...]

Completed in 613 milliseconds

1 2