/external/clang/test/CXX/temp/temp.arg/temp.arg.nontype/ |
p1.cpp | 39 const int ki = 9; // expected-note 5{{here}} member in namespace:addr_of_obj_or_func 50 X0<ki> x0c; // expected-error {{must have its address taken}} expected-warning {{internal linkage is a C++11 extension}} 51 X0<&ki> x0c_addr; // expected-error {{cannot be converted to a value of type 'int *'}} expected-warning {{internal linkage is a C++11 extension}} 65 X2<ki> x2c; // expected-error {{ignores qualifiers}} expected-warning {{internal linkage is a C++11 extension}} 66 X2k<ki> x2kc; // expected-warning {{internal linkage is a C++11 extension}} 67 X2k<&ki> x2kc_addr; // expected-error {{address taken}} expected-warning {{internal linkage is a C++11 extension}}
|
/external/apache-xml/src/main/java/org/apache/xalan/transformer/ |
KeyIterator.java | 103 KeyIterator ki = (KeyIterator) m_lpi; local 104 org.apache.xpath.XPathContext xctxt = ki.getXPathContext(); 105 Vector keys = ki.getKeyDeclarations(); 107 QName name = ki.getName(); 124 // xctxt.setNamespaceContext(ki.getPrefixResolver());
|
KeyTable.java | 101 KeyIterator ki = new KeyIterator(name, keyDeclarations); local 103 m_keyNodes = new XNodeSet(ki); 134 KeyIterator ki = (KeyIterator) (m_keyNodes).getContainedIter(); local 135 XPathContext xctxt = ki.getXPathContext(); 189 KeyIterator ki = (KeyIterator) (m_keyNodes).getContainedIter(); local 190 XPathContext xctxt = ki.getXPathContext(); 207 ki.getPrefixResolver());
|
/external/chromium_org/third_party/openssl/openssl/crypto/md5/asm/ |
md5-586.pl | 45 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 48 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 52 &comment("R0 $ki"); 66 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 73 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 75 &comment("R1 $ki"); 82 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 96 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 101 &comment("R2 $ki"); 114 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) [all...] |
/external/openssl/crypto/md5/asm/ |
md5-586.pl | 45 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 48 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 52 &comment("R0 $ki"); 66 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 73 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 75 &comment("R1 $ki"); 82 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 96 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 101 &comment("R2 $ki"); 114 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) [all...] |
/external/oprofile/daemon/ |
opd_sfile.c | 42 sfile_hash(struct transient const * trans, struct kernel_image * ki) 51 if (separate_kernel || ((trans->anon || separate_lib) && !ki)) 59 val ^= ki->start >> 14; 60 val ^= ki->end >> 7; 83 struct kernel_image const * ki, struct anon_mapping const * anon, 90 if (sf->kernel != ki) 103 if (separate_kernel || ((anon || separate_lib) && !ki)) { 111 if (ki) 123 struct kernel_image const * ki) 125 return do_match(sfile, trans->cookie, trans->app_cookie, ki, 224 struct kernel_image * ki = NULL; local [all...] |
/external/bluetooth/bluedroid/btif/src/ |
btif_config.c | 269 short ki; member in struct:__anon5671 294 short ki = find_inode(section_node, key); local 295 if(ki >= 0) 297 const cfg_node* key_node = §ion_node->child[ki]; 310 int si, ki, vi; local 317 for(ki = 0; ki < GET_CHILD_COUNT(section_node); ki++) 319 key_node = §ion_node->child[ki]; 455 int si = -1, ki = -1, vi = -1 local 491 int si = -1, ki = -1, vi = -1; local 568 short si = -1, ki = -1, vi = -1; local [all...] |
/external/chromium_org/ui/base/win/ |
foreground_helper.cc | 44 hotkey.ki.wVk = VK_F22;
|
/external/chromium_org/remoting/host/ |
input_injector_win.cc | 31 input.ki.time = 0; 32 input.ki.dwFlags = flags; 33 input.ki.wScan = scancode; 41 input.ki.wScan &= 0xFF; 43 input.ki.dwFlags |= KEYEVENTF_EXTENDEDKEY;
|
/external/chromium_org/third_party/openssl/openssl/crypto/rc2/ |
rc2_skey.c | 109 RC2_INT *ki; local 146 ki= &(key->data[63]); 148 *(ki--)=((k[i]<<8)|k[i-1])&0xffff;
|
/external/openssl/crypto/rc2/ |
rc2_skey.c | 109 RC2_INT *ki; local 146 ki= &(key->data[63]); 148 *(ki--)=((k[i]<<8)|k[i-1])&0xffff;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
eap_eke_common.c | 464 * Ke | Ki = prf+(SharedSecret, "EAP-EKE Keys" | ID_S | ID_P) 466 * Ki = integrity protection key 498 os_memcpy(sess->ki, buf + ke_len, ki_len); 499 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); 659 if (eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) 692 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 766 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 44 * EAP-SIM, respectively, if Ki is known. 85 u8 ki[16]; member in struct:milenage_parameters 124 " ki CHAR(32) NOT NULL," 170 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 171 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 172 printf("Invalid ki value in database\n"); 209 "SELECT ki,opc,amf,sqn FROM milenage WHERE imsi=%llu;", 427 /* Parse IMSI Ki OPc AMF SQN */ 464 /* Ki */ [all...] |
/external/chromium_org/win8/metro_driver/ |
chrome_app_view.cc | 95 keys[key_count].ki.wVk = VK_SHIFT; 96 keys[key_count].ki.wScan = MapVirtualKey(VK_SHIFT, 0); 102 keys[key_count].ki.wVk = VK_CONTROL; 103 keys[key_count].ki.wScan = MapVirtualKey(VK_CONTROL, 0); 109 keys[key_count].ki.wVk = VK_MENU; 110 keys[key_count].ki.wScan = MapVirtualKey(VK_MENU, 0); 115 keys[key_count].ki.wVk = mnemonic_char; 116 keys[key_count].ki.wScan = MapVirtualKey(mnemonic_char, 0); 119 keys[key_count].ki.dwFlags |= KEYEVENTF_EXTENDEDKEY; 121 keys[key_count].ki.dwFlags |= KEYEVENTF_UNICODE [all...] |
chrome_app_view_ash.cc | 100 keys[key_count].ki.wVk = VK_SHIFT; 101 keys[key_count].ki.wScan = MapVirtualKey(VK_SHIFT, 0); 107 keys[key_count].ki.wVk = VK_CONTROL; 108 keys[key_count].ki.wScan = MapVirtualKey(VK_CONTROL, 0); 114 keys[key_count].ki.wVk = VK_MENU; 115 keys[key_count].ki.wScan = MapVirtualKey(VK_MENU, 0); 120 keys[key_count].ki.wVk = mnemonic_char; 121 keys[key_count].ki.wScan = MapVirtualKey(mnemonic_char, 0); 129 keys[i].ki.dwFlags |= KEYEVENTF_KEYUP; [all...] |
/external/chromium_org/ui/base/test/ |
ui_controls_internal_win.cc | 144 input->ki.wVk = ui::WindowsKeyCodeForKeyboardCode(key); 145 input->ki.dwFlags = key_up ? KEYEVENTF_EXTENDEDKEY | KEYEVENTF_KEYUP :
|
/external/qemu/android/skin/ |
file.c | 210 KeyInfo *ki = _keyinfo_table; local 211 while(ki->name) { 212 if(!strcmp(name, ki->name)) 213 return ki->code; 214 ki++;
|
/external/mksh/src/ |
funcs.c | 1287 const struct kill_info *ki = (const struct kill_info *)arg; local 1291 ki->num_width, i, 1292 ki->name_width, sigtraps[i].name, 1358 struct kill_info ki; local 1360 for (j = NSIG, ki.num_width = 1; j >= 10; j /= 10) 1361 ki.num_width++; 1362 ki.name_width = mess_cols = mess_octs = 0; 1365 if (w > ki.name_width) 1366 ki.name_width = w; 1376 kill_fmt_entry, (void *)&ki, [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay.c | 1108 struct ieee802_1x_mka_ki *ki) 1117 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1241 struct ieee802_1x_mka_ki ki; local 1287 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1288 ki.kn = ntohl(body->lkn); 1291 if (is_ki_equal(&sa_key->key_identifier, &ki)) { [all...] |
ieee802_1x_kay.h | 185 struct ieee802_1x_mka_ki *ki);
|
ieee802_1x_kay_i.h | 59 struct ieee802_1x_mka_ki ki; member in struct:key_conf
|
/external/chromium_org/third_party/icu/source/data/lang/ |
resfiles.mk | 61 kea.txt khq.txt ki.txt kk.txt kk_Cyrl.txt\
|
/external/chromium_org/third_party/icu/source/data/region/ |
resfiles.mk | 61 ki.txt kk.txt kk_Cyrl.txt kk_Cyrl_KZ.txt kl.txt\
|
/external/chromium_org/third_party/icu/source/data/zone/ |
resfiles.mk | 61 kam.txt kde.txt kea.txt khq.txt ki.txt\
|