/external/v8/test/cctest/ |
test-hydrogen-types.cc | 49 HType tk = kTypes[k]; local 50 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk)); 61 HType tk = kTypes[k]; local 62 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
|
/external/wpa_supplicant_8/src/crypto/ |
sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
md5.c | 30 u8 tk[16]; local 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 91 os_memset(tk, 0, sizeof(tk));
|
sha1.c | 30 unsigned char tk[20]; local 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk;
|
crypto_internal.c | 44 u8 tk[32]; local 79 MD5Final(tk, &ctx->u.md5); 80 key = tk; 98 SHA1Final(tk, &ctx->u.sha1); 99 key = tk; 118 sha256_done(&ctx->u.sha256, tk); 119 key = tk;
|
/external/dhcpcd-6.8.2/crypt/ |
hmac_md5.c | 53 uint8_t tk[MD5_DIGEST_LENGTH]; local 61 MD5Final(tk, &context); 62 key = tk;
|
/external/tcpdump/ |
signature.c | 55 unsigned char tk[16]; local 65 MD5_Final(tk, &tctx); 67 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[0][3] ^= S[tk[KC-1][0]] 100 #undef tk macro [all...] |
/external/opencv3/samples/python2/ |
demo.py | 13 import Tkinter as tk namespace 49 for tag in self.text.tag_names(tk.CURRENT): 60 root = tk.Tk() 63 self.win = win = tk.PanedWindow(root, orient=tk.HORIZONTAL, sashrelief=tk.RAISED, sashwidth=4) 64 self.win.pack(fill=tk.BOTH, expand=1) 66 left = tk.Frame(win) 67 right = tk.Frame(win [all...] |
/external/pdfium/third_party/freetype/src/type1/ |
t1afm.c | 373 AFM_TrackKern tk = fi->TrackKerns + i; local 376 if ( tk->degree != degree ) 379 if ( ptsize < tk->min_ptsize ) 380 *kerning = tk->min_kern; 381 else if ( ptsize > tk->max_ptsize ) 382 *kerning = tk->max_kern; 385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize, 386 tk->max_kern - tk->min_kern, 387 tk->max_ptsize - tk->min_ptsize ) [all...] |
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
Interp.java | 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); local 116 while ( tk.hasMoreTokens() ) { 117 String tokenName = tk.nextToken();
|
/external/javassist/src/main/javassist/compiler/ |
Lex.java | 70 Token tk = lookAheadTokens; local 71 if (tk == null) { 72 lookAheadTokens = tk = currentToken; // reuse an object! 73 tk.next = null; 74 get(tk); 77 for (; i-- > 0; tk = tk.next) 78 if (tk.next == null) { 80 tk.next = tk2 = new Token(); 84 currentToken = tk; [all...] |
/external/toybox/toys/pending/ |
modprobe.c | 233 char *tk = NULL; local 237 for (tk = strtok(linecp, "# \t"), tcount = 0; tk; 238 tk = strtok(NULL, "# \t"), tcount++) { 239 tokens[tcount] = tk; 245 if (!tk) continue;
|
syslogd.c | 101 char *tk; local 103 for (tk = strtok(config, "; \0"); tk; tk = strtok(NULL, "; \0")) { 104 char *fac = tk, *lvl; 109 tk = strchr(fac, '.'); 110 if (!tk) return -1; 111 *tk = '\0'; 112 lvl = tk + 1; 130 for (tk = "!=*"; *tk; tk++, bits <<= 1) 157 char *confline, *tk[2]; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 254 u8 *tk; local 259 * Tunnel key (TK) is the first 60 octets of the key generated by 262 tk = data->key_data; 263 if (tk == NULL) 265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 273 /* Fast-connect: IPMK|CMK = TK */ 274 os_memcpy(data->ipmk, tk, 40); 275 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 277 os_memcpy(data->cmk, tk + 40, 20) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 325 u8 *tk; local 329 * Tunnel key (TK) is the first 60 octets of the key generated by 332 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 334 if (tk == NULL) 336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 339 /* Fast-connect: IPMK|CMK = TK */ 340 os_memcpy(data->ipmk, tk, 40); 341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 343 os_memcpy(data->cmk, tk + 40, 20) [all...] |
/external/freetype/src/psaux/ |
afmparse.c | 589 AFM_TrackKern tk; local 627 tk = fi->TrackKerns + n; 637 tk->degree = shared_vals[0].u.i; 638 tk->min_ptsize = shared_vals[1].u.f; 639 tk->min_kern = shared_vals[2].u.f; 640 tk->max_ptsize = shared_vals[3].u.f; 641 tk->max_kern = shared_vals[4].u.f;
|
/external/pdfium/third_party/freetype/src/psaux/ |
afmparse.c | 589 AFM_TrackKern tk; local 627 tk = fi->TrackKerns + n; 637 tk->degree = shared_vals[0].u.i; 638 tk->min_ptsize = shared_vals[1].u.f; 639 tk->min_kern = shared_vals[2].u.f; 640 tk->max_ptsize = shared_vals[3].u.f; 641 tk->max_kern = shared_vals[4].u.f;
|
/external/valgrind/coregrind/m_demangle/ |
cplus-dem.c | 3550 type_kind_t tk = tk_none; local 3861 type_kind_t tk = tk_integral; local [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 214 u8 tk[WPA_TK_MAX_LEN]; /* Temporal Key (TK) */ member in struct:wpa_ptk
|
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 112 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */ member in struct:wpa_tdls_peer::tpk 180 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " 213 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 438 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK", 439 peer->tpk.tk, sizeof(peer->tpk.tk)); [all...] |
/libcore/luni/src/main/java/java/util/concurrent/ |
ConcurrentSkipListMap.java | 2893 K tk = fromKey; local [all...] |
/system/bt/stack/smp/ |
smp_int.h | 327 BT_OCTET16 tk; member in struct:__anon72882 481 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/toolchain/binutils/binutils-2.25/libiberty/ |
cplus-dem.c | 3546 type_kind_t tk = tk_none; local 3857 type_kind_t tk = tk_integral; local [all...] |
/external/opencv/ml/src/ |
mltree.cpp | 2693 int tj = 0, tk = 0; local [all...] |