/external/wpa_supplicant_8/src/crypto/ |
md5-non-fips.c | 31 u8 tk[16]; local 45 if (md5_vector_non_fips_allow(1, &key, &key_len, tk)) 47 key = tk;
|
md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
sha256.c | 29 unsigned char tk[32]; local 43 sha256_vector(1, &key, &key_len, tk); 44 key = tk;
|
crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[0][3] ^= S[tk[KC-1][0]] 100 #undef tk macro [all...] |
/external/dropbear/libtomcrypt/src/math/fp/ |
ltc_ecc_fp_mulmod.c | 784 void *tk, *order; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
md5.c | 35 u8 tk[16]; local 49 md5_vector(1, &key, &key_len, tk); 50 key = tk;
|
sha256.c | 35 unsigned char tk[32]; local 49 sha256_vector(1, &key, &key_len, tk); 50 key = tk;
|
crypto_internal.c | 72 u8 tk[20]; local 92 MD5Final(tk, &ctx->u.md5); 93 key = tk; 110 SHA1Final(tk, &ctx->u.sha1); 111 key = tk;
|
sha1.c | 36 unsigned char tk[20]; local 50 sha1_vector(1, &key, &key_len, tk); 51 key = tk;
|
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
Interp.java | 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); local 116 while ( tk.hasMoreTokens() ) { 117 String tokenName = tk.nextToken();
|
/external/javassist/src/main/javassist/compiler/ |
Lex.java | 70 Token tk = lookAheadTokens; local 71 if (tk == null) { 72 lookAheadTokens = tk = currentToken; // reuse an object! 73 tk.next = null; 74 get(tk); 77 for (; i-- > 0; tk = tk.next) 78 if (tk.next == null) { 80 tk.next = tk2 = new Token(); 84 currentToken = tk; [all...] |
/external/libvpx/vp8/encoder/ |
mcomp.c | 794 int k = -1, tk; local 843 tk = k; 847 int nr = tr + next_chkpts[tk][i].row, nc = tc + next_chkpts[tk][i].col; 862 bc = nc; //k=(tk+5+i)%6;} 863 k = tk + 5 + i; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 252 u8 *tk; local 256 * Tunnel key (TK) is the first 60 octets of the key generated by 259 tk = data->key_data; 260 if (tk == NULL) 262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 266 /* Fast-connect: IPMK|CMK = TK */ 267 os_memcpy(data->ipmk, tk, 40); 268 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 270 os_memcpy(data->cmk, tk + 40, 20) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 246 u8 *tk; local 250 * Tunnel key (TK) is the first 60 octets of the key generated by 253 tk = data->key_data; 254 if (tk == NULL) 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 260 /* Fast-connect: IPMK|CMK = TK */ 261 os_memcpy(data->ipmk, tk, 40); 262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 264 os_memcpy(data->cmk, tk + 40, 20) [all...] |
/external/freetype/src/psaux/ |
afmparse.c | 586 AFM_TrackKern tk; local 618 tk = fi->TrackKerns + n; 628 tk->degree = shared_vals[0].u.i; 629 tk->min_ptsize = shared_vals[1].u.f; 630 tk->min_kern = shared_vals[2].u.f; 631 tk->max_ptsize = shared_vals[3].u.f; 632 tk->max_kern = shared_vals[4].u.f;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 327 u8 *tk; local 331 * Tunnel key (TK) is the first 60 octets of the key generated by 334 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 336 if (tk == NULL) 338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 345 * TempKey = First 40 octets of TK 350 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 351 peap_prfplus(data->peap_version, tk, 40, "Inner Methods Compound Keys", 356 os_free(tk); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 324 u8 *tk; local 328 * Tunnel key (TK) is the first 60 octets of the key generated by 331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 333 if (tk == NULL) 335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 342 * TempKey = First 40 octets of TK 347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 348 if (peap_prfplus(data->peap_version, tk, 40, 351 os_free(tk); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 103 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */ member in struct:wpa_tdls_peer::tpk 148 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 401 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK", 402 peer->tpk.tk, sizeof(peer->tpk.tk)); [all...] |
/external/valgrind/main/coregrind/m_demangle/ |
cplus-dem.c | 3406 type_kind_t tk = tk_none; local 3714 type_kind_t tk = tk_integral; local [all...] |
/libcore/luni/src/main/java/java/util/concurrent/ |
ConcurrentSkipListMap.java | 2777 K tk = fromKey; local [all...] |
/external/opencv/ml/src/ |
mltree.cpp | 2693 int tj = 0, tk = 0; local [all...] |
/packages/apps/VideoEditor/src/com/android/videoeditor/service/ |
ApiService.java | 1459 int tk = qIntent.getIntExtra(PARAM_TOKEN, 0); local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-nodeps.jar | |