/external/javassist/src/main/javassist/compiler/ |
Lex.java | 70 Token tk = lookAheadTokens; local 71 if (tk == null) { 72 lookAheadTokens = tk = currentToken; // reuse an object! 73 tk.next = null; 74 get(tk); 77 for (; i-- > 0; tk = tk.next) 78 if (tk.next == null) { 80 tk.next = tk2 = new Token(); 84 currentToken = tk; [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/lexer/ |
nuances.rb | 24 tokens = lexer.each { |tk| tk } 44 tks = lexer.map { |tk| tk }
|
properties.rb | 32 tokens = lexer.map { |tk| tk }
|
/external/wpa_supplicant_8/src/crypto/ |
md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[0][3] ^= S[tk[KC-1][0]] 100 #undef tk macro [all...] |
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
Interp.java | 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); local 116 while ( tk.hasMoreTokens() ) { 117 String tokenName = tk.nextToken();
|
/external/bluetooth/bluedroid/stack/smp/ |
smp_api.c | 261 smp_convert_string_to_tk(p_cb->tk, passkey); 301 memcpy(p_cb->tk, p_data, len); 304 key.p_data = p_cb->tk;
|
smp_keys.c | 182 UINT8 *tt = p_cb->tk; 196 /* save the TK */ 197 memset(p_cb->tk, 0, BT_OCTET16_LEN); 201 key.p_data = p_cb->tk; 217 ** AES with the TK value as key and a concatenation of the random 245 if (!SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, &output)) 557 /* calculate e(k, r XOR p1), where k = TK */ 558 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) 597 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output)) 698 ** RRand and local BDA, TK information [all...] |
smp_utils.c | 445 ** character string into SMP TK. 451 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) 453 UINT8 *p = tk; 459 key.p_data = tk;
|
smp_int.h | 192 BT_OCTET16 tk; member in struct:__anon3525 298 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
smp_act.c | 487 STREAM_TO_ARRAY (p_cb->tk, p, BT_OCTET16_LEN); /* reuse TK for IRK */ 505 memcpy(pid_key.irk, p_cb->tk, BT_OCTET16_LEN); 807 else if (model == SMP_MODEL_ENC_ONLY) /* TK = 0, go calculate Confirm */ 824 key.p_data = p_cb->tk; 827 memset(p_cb->tk, 0, BT_OCTET16_LEN); 828 /* TK, ready */ [all...] |
/external/chromium/chrome/browser/ui/webui/options/ |
advanced_options_utils_gtk.cc | 47 CStringTokenizer tk(path, path + strlen(path), ":"); 49 while (tk.GetNext()) { 51 bin_path = FilePath(tk.token()).Append(commands[i].argv[0]);
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/parser/ |
properties.rb | 132 a returns [$tk] 135 $tk = [ 164 tk = parser.a 165 tk.should == [
|
/external/dropbear/libtomcrypt/src/math/fp/ |
ltc_ecc_fp_mulmod.c | 784 void *tk, *order; local [all...] |
/external/freetype/src/psaux/ |
afmparse.c | 586 AFM_TrackKern tk; local 618 tk = fi->TrackKerns + n; 628 tk->degree = shared_vals[0].u.i; 629 tk->min_ptsize = shared_vals[1].u.f; 630 tk->min_kern = shared_vals[2].u.f; 631 tk->max_ptsize = shared_vals[3].u.f; 632 tk->max_kern = shared_vals[4].u.f;
|
/external/valgrind/main/coregrind/m_demangle/ |
cplus-dem.c | 3543 type_kind_t tk = tk_none; local 3851 type_kind_t tk = tk_integral; local [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/delegation/ |
import.rb | 256 lexer.map { |tk| lexer.capture( tk.text ) } 281 lexer.map { |tk| lexer.capture( tk.text ) }
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
streams.rb | 926 tk = look( k ) and return( tk.type ) 960 tk = @tokens.at( cursor += 1 ) or return( cursor ) 961 # ^- if tk is nil (i.e. i is outside array limits) 962 end until tk.channel == @channel [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 249 u8 *tk; local 253 * Tunnel key (TK) is the first 60 octets of the key generated by 256 tk = data->key_data; 257 if (tk == NULL) 259 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 263 /* Fast-connect: IPMK|CMK = TK */ 264 os_memcpy(data->ipmk, tk, 40); 265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 267 os_memcpy(data->cmk, tk + 40, 20) [all...] |
/external/sonivox/jet_tools/JetCreator/ |
img_Redo.py | 27 \xd1\xe3H\xb2(L\x19\x87-\x0c\xd8"\tK&\xc1\xa5\x05.\x19\xb8\xb4`\xf0\t\x0c\
28 \x1b\xddP\x89\x17\xa5\xfa\xa3\xb8\xd0\xf3Gbt\xec\xc6y\tk\xdd\xe1-\x98\xb8g\
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 324 u8 *tk; local 328 * Tunnel key (TK) is the first 60 octets of the key generated by 331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 333 if (tk == NULL) 335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 342 * TempKey = First 40 octets of TK 347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 348 if (peap_prfplus(data->peap_version, tk, 40, 351 os_free(tk); [all...] |
/external/chromium/net/proxy/ |
proxy_config_service_linux.cc | 631 StringTokenizer tk(value, ", "); 632 while (tk.GetNext()) { 633 std::string token = tk.token(); [all...] |