HomeSort by relevance Sort by last modified time
    Searched defs:tk (Results 1 - 25 of 54) sorted by null

1 2 3

  /external/v8/test/cctest/
test-hydrogen-types.cc 49 HType tk = kTypes[k]; local
50 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk));
61 HType tk = kTypes[k]; local
62 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
  /external/wpa_supplicant_8/src/crypto/
sha256.c 30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
md5.c 30 u8 tk[16]; local
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
91 os_memset(tk, 0, sizeof(tk));
sha1.c 30 unsigned char tk[20]; local
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
crypto_internal.c 44 u8 tk[32]; local
79 MD5Final(tk, &ctx->u.md5);
80 key = tk;
98 SHA1Final(tk, &ctx->u.sha1);
99 key = tk;
118 sha256_done(&ctx->u.sha256, tk);
119 key = tk;
  /external/dhcpcd-6.8.2/crypt/
hmac_md5.c 53 uint8_t tk[MD5_DIGEST_LENGTH]; local
61 MD5Final(tk, &context);
62 key = tk;
  /external/tcpdump/
signature.c 55 unsigned char tk[16]; local
65 MD5_Final(tk, &tctx);
67 key = tk;
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.c 45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[0][3] ^= S[tk[KC-1][0]]
100 #undef tk macro
    [all...]
  /external/opencv3/samples/python2/
demo.py 13 import Tkinter as tk namespace
49 for tag in self.text.tag_names(tk.CURRENT):
60 root = tk.Tk()
63 self.win = win = tk.PanedWindow(root, orient=tk.HORIZONTAL, sashrelief=tk.RAISED, sashwidth=4)
64 self.win.pack(fill=tk.BOTH, expand=1)
66 left = tk.Frame(win)
67 right = tk.Frame(win
    [all...]
  /external/pdfium/third_party/freetype/src/type1/
t1afm.c 373 AFM_TrackKern tk = fi->TrackKerns + i; local
376 if ( tk->degree != degree )
379 if ( ptsize < tk->min_ptsize )
380 *kerning = tk->min_kern;
381 else if ( ptsize > tk->max_ptsize )
382 *kerning = tk->max_kern;
385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize,
386 tk->max_kern - tk->min_kern,
387 tk->max_ptsize - tk->min_ptsize )
    [all...]
  /external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/
Interp.java 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); local
116 while ( tk.hasMoreTokens() ) {
117 String tokenName = tk.nextToken();
  /external/javassist/src/main/javassist/compiler/
Lex.java 70 Token tk = lookAheadTokens; local
71 if (tk == null) {
72 lookAheadTokens = tk = currentToken; // reuse an object!
73 tk.next = null;
74 get(tk);
77 for (; i-- > 0; tk = tk.next)
78 if (tk.next == null) {
80 tk.next = tk2 = new Token();
84 currentToken = tk;
    [all...]
  /external/toybox/toys/pending/
modprobe.c 233 char *tk = NULL; local
237 for (tk = strtok(linecp, "# \t"), tcount = 0; tk;
238 tk = strtok(NULL, "# \t"), tcount++) {
239 tokens[tcount] = tk;
245 if (!tk) continue;
syslogd.c 101 char *tk; local
103 for (tk = strtok(config, "; \0"); tk; tk = strtok(NULL, "; \0")) {
104 char *fac = tk, *lvl;
109 tk = strchr(fac, '.');
110 if (!tk) return -1;
111 *tk = '\0';
112 lvl = tk + 1;
130 for (tk = "!=*"; *tk; tk++, bits <<= 1)
157 char *confline, *tk[2]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 254 u8 *tk; local
259 * Tunnel key (TK) is the first 60 octets of the key generated by
262 tk = data->key_data;
263 if (tk == NULL)
265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
273 /* Fast-connect: IPMK|CMK = TK */
274 os_memcpy(data->ipmk, tk, 40);
275 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
277 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 325 u8 *tk; local
329 * Tunnel key (TK) is the first 60 octets of the key generated by
332 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
334 if (tk == NULL)
336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
339 /* Fast-connect: IPMK|CMK = TK */
340 os_memcpy(data->ipmk, tk, 40);
341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
343 os_memcpy(data->cmk, tk + 40, 20)
    [all...]
  /external/freetype/src/psaux/
afmparse.c 589 AFM_TrackKern tk; local
627 tk = fi->TrackKerns + n;
637 tk->degree = shared_vals[0].u.i;
638 tk->min_ptsize = shared_vals[1].u.f;
639 tk->min_kern = shared_vals[2].u.f;
640 tk->max_ptsize = shared_vals[3].u.f;
641 tk->max_kern = shared_vals[4].u.f;
  /external/pdfium/third_party/freetype/src/psaux/
afmparse.c 589 AFM_TrackKern tk; local
627 tk = fi->TrackKerns + n;
637 tk->degree = shared_vals[0].u.i;
638 tk->min_ptsize = shared_vals[1].u.f;
639 tk->min_kern = shared_vals[2].u.f;
640 tk->max_ptsize = shared_vals[3].u.f;
641 tk->max_kern = shared_vals[4].u.f;
  /external/valgrind/coregrind/m_demangle/
cplus-dem.c 3550 type_kind_t tk = tk_none; local
3861 type_kind_t tk = tk_integral; local
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 214 u8 tk[WPA_TK_MAX_LEN]; /* Temporal Key (TK) */ member in struct:wpa_ptk
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 112 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */ member in struct:wpa_tdls_peer::tpk
180 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
213 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
438 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK",
439 peer->tpk.tk, sizeof(peer->tpk.tk));
    [all...]
  /libcore/luni/src/main/java/java/util/concurrent/
ConcurrentSkipListMap.java 2893 K tk = fromKey; local
    [all...]
  /system/bt/stack/smp/
smp_int.h 327 BT_OCTET16 tk; member in struct:__anon72882
481 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
  /toolchain/binutils/binutils-2.25/libiberty/
cplus-dem.c 3546 type_kind_t tk = tk_none; local
3857 type_kind_t tk = tk_integral; local
    [all...]
  /external/opencv/ml/src/
mltree.cpp 2693 int tj = 0, tk = 0; local
    [all...]

Completed in 1336 milliseconds

1 2 3