/external/antlr/antlr-3.4/runtime/C/src/ |
H A D | antlr3commontreeadaptor.c | 261 pANTLR3_BASE_TREE ct; local 265 ct = ((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum->newFromToken(((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum, payload); 269 return ct; 274 pANTLR3_BASE_TREE ct; local 276 ct = create(adaptor, payload); 277 adaptor->debugger->createNode(adaptor->debugger, ct); 279 return ct; 377 pANTLR3_COMMON_TREE ct; local 402 ct = (pANTLR3_COMMON_TREE)(t->super); 404 ct [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | EncryptedPrivateKeyInfoTest.java | 1071 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct()); 1073 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct()); 1110 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct()); 1112 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct()); 1173 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct()); 1175 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct()); 1211 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct()); 1213 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct()); 1300 .ct()); 1302 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct()); 1526 byte[] ct; field in class:EncryptedPrivateKeyInfoTest.TestDataGenerator 1655 public byte[] ct() { method in class:EncryptedPrivateKeyInfoTest.TestDataGenerator [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | anubis.c | 1135 @param ct The output ciphertext (16 bytes) 1139 int anubis_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 1142 LTC_ARGCHK(ct != NULL); 1144 anubis_crypt(pt, ct, skey->anubis.roundKeyEnc, skey->anubis.R); 1150 @param ct The input ciphertext (16 bytes) 1155 int anubis_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 1158 LTC_ARGCHK(ct != NULL); 1160 anubis_crypt(ct, pt, skey->anubis.roundKeyDec, skey->anubis.R); 1175 unsigned char pt[16], ct[16], key[40]; 1503 if (XMEMCMP(buf[0], tests[x].ct, 1 [all...] |
H A D | cast5.c | 535 @param ct The output ciphertext (8 bytes) 539 static int _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 541 int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 547 LTC_ARGCHK(ct != NULL); 570 STORE32H(R,&ct[0]); 571 STORE32H(L,&ct[4]); 577 int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 579 int err =_cast5_ecb_encrypt(pt,ct,skey); 587 @param ct The input ciphertext (8 bytes) 592 static int _cast5_ecb_decrypt(const unsigned char *ct, unsigne argument 630 cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument [all...] |
H A D | des.c | 1588 @param ct The output ciphertext (8 bytes) 1592 int des_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 1596 LTC_ARGCHK(ct != NULL); 1601 STORE32H(work[0],ct+0); 1602 STORE32H(work[1],ct+4); 1608 @param ct The input ciphertext (8 bytes) 1613 int des_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) 1617 LTC_ARGCHK(ct != NULL); 1619 LOAD32H(work[0], ct+0); 1620 LOAD32H(work[1], ct 1635 des3_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 1659 des3_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument [all...] |
/external/jdiff/src/jdiff/ |
H A D | RootDocToXML.java | 470 * @param ct An array of ConstructorDoc objects 472 public void processConstructors(ConstructorDoc[] ct) { argument 473 if (trace) System.out.println("PROCESSING CONSTRUCTORS, number=" + ct.length); 474 for (int i = 0; i < ct.length; i++) { 475 String ctorName = ct[i].name(); 478 if (!shownElement(ct[i], memberVisibilityLevel)) 482 Parameter[] params = ct[i].parameters(); 495 addCommonModifiers(ct[i], 6); 499 processExceptions(ct[i].thrownExceptions()); 501 addDocumentation(ct[ [all...] |
/external/libvpx/vp8/encoder/ |
H A D | encodemv.c | 216 __inline static void calc_prob(vp8_prob *p, const unsigned int ct[2]) argument 218 const unsigned int tot = ct[0] + ct[1]; 222 const vp8_prob x = ((ct[0] * 255) / tot) & -2; 229 const unsigned int ct[2], 236 const int cur_b = vp8_cost_branch(ct, *cur_p); 237 const int new_b = vp8_cost_branch(ct, new_p); 368 vp8_prob p [mvnum_short - 1]; /* actually only need branch ct */ 227 update( vp8_writer *const w, const unsigned int ct[2], vp8_prob *const cur_p, const vp8_prob new_p, const vp8_prob update_p, int *updated ) argument
|
/external/llvm/lib/CodeGen/ |
H A D | MachineTraceMetrics.cpp | 105 MachineTraceMetrics::Ensemble::Ensemble(MachineTraceMetrics *ct) argument 106 : MTM(*ct) {
|
/external/openssh/ |
H A D | rijndael.c | 720 #define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); } 858 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 ct[16]) { argument 1015 PUTU32(ct , s0); 1022 PUTU32(ct + 4, s1); 1029 PUTU32(ct + 8, s2); 1036 PUTU32(ct 1039 rijndaelDecrypt(const u32 rk[ ], int Nr, const u8 ct[16], u8 pt[16]) argument [all...] |
/external/srtp/crypto/test/ |
H A D | cipher_driver.c | 60 cipher_driver_self_test(cipher_type_t *ct); 64 * cipher_driver_test_buffering(ct) tests the cipher's output 77 cipher_driver_test_array_throughput(cipher_type_t *ct, 239 cipher_driver_self_test(cipher_type_t *ct) { argument 242 printf("running cipher self-test for %s...", ct->description); 243 status = cipher_type_self_test(ct); 254 * cipher_driver_test_buffering(ct) tests the cipher's output 474 cipher_driver_test_array_throughput(cipher_type_t *ct, argument 479 status = cipher_array_alloc_init(&ca, num_cipher, ct, klen);
|
/external/stlport/src/ |
H A D | time_facets.cpp | 148 void __subformat(_STLP_BASIC_IOSTRING(_Ch) &buf, const ctype<_Ch>& ct, variable 159 __write_formatted_timeT(buf, ct, *cp++, mod, table, t); 171 static void __append(__iostring &buf, char *first, char *last, const ctype<char>& /* ct */) 174 static void __append(__iowstring &buf, char *first, char *last, const ctype<wchar_t>& ct) { argument 176 ct.widen(first, last, _wbuf); 214 const ctype<_Ch>& ct, variable 238 __subformat(buf, ct, (modifier != '#') ? table._M_date_time_format 244 __append(buf, _buf, ((long)t->tm_mday < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); 249 __append(buf, _buf, _buf + 2, ct); 254 __append(buf, _buf, ((long)t->tm_hour < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); 454 __write_formatted_time(__iostring &buf, const ctype<char>& ct, char format, char modifier, const _Time_Info& table, const tm* t) argument 459 __write_formatted_time(__iowstring &buf, const ctype<wchar_t>& ct, char format, char modifier, const _WTime_Info& table, const tm* t) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_server.c | 116 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 140 ct = pos[0]; 149 if (tlsv1_server_process_handshake(conn, ct, in_pos,
|
H A D | tlsv1_server_read.c | 28 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 31 u8 ct, const u8 *in_data, 35 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 45 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 47 "received content type 0x%x", ct); 267 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 276 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 278 "received content type 0x%x", ct); 318 return tls_process_client_key_exchange(conn, ct, in_data, 674 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1085 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server.c | 112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 145 ct = pos[0]; 154 if (tlsv1_server_process_handshake(conn, ct, in_pos, 239 u8 alert, *out_end, *out_pos, ct; local 248 ct = pos[0]; 266 if (ct == TLS_CONTENT_TYPE_ALERT) { 287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 26 u8 ct, const u8 *in_data, 30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 42 "received content type 0x%x", ct); 277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 288 "received content type 0x%x", ct); 328 return tls_process_client_key_exchange(conn, ct, in_data, 688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server.c | 112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 145 ct = pos[0]; 154 if (tlsv1_server_process_handshake(conn, ct, in_pos, 239 u8 alert, *out_end, *out_pos, ct; local 248 ct = pos[0]; 266 if (ct == TLS_CONTENT_TYPE_ALERT) { 287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 26 u8 ct, const u8 *in_data, 30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 42 "received content type 0x%x", ct); 277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 288 "received content type 0x%x", ct); 328 return tls_process_client_key_exchange(conn, ct, in_data, 688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server.c | 112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 145 ct = pos[0]; 154 if (tlsv1_server_process_handshake(conn, ct, in_pos, 239 u8 alert, *out_end, *out_pos, ct; local 248 ct = pos[0]; 266 if (ct == TLS_CONTENT_TYPE_ALERT) { 287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 26 u8 ct, const u8 *in_data, 30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 42 "received content type 0x%x", ct); 277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 288 "received content type 0x%x", ct); 328 return tls_process_client_key_exchange(conn, ct, in_data, 688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/lang/ |
H A D | ThreadTest.java | 121 Thread st, ct, spinner; field in class:ThreadTest 128 ct = new Thread(new SimpleThread(10)); 129 ct.start(); 486 ct = new ChildThread1(Thread.currentThread(), "Interrupt Test1", 489 ct.start(); 499 ct = new ChildThread1(Thread.currentThread(), "Interrupt Test2", 502 ct.start(); 861 ct = new Thread(t, "Interrupt Test4"); 862 ct.start(); 865 assertTrue("Thread is not running1", ct [all...] |
/external/clang/test/FixIt/ |
H A D | fixit.cpp | 23 CT<10 >> 2> ct; // expected-warning{{require parentheses}} variable
|
/external/javassist/src/main/javassist/ |
H A D | ClassPool.java | 1028 public Class toClass(CtClass ct, ClassLoader loader) argument 1031 return toClass(ct, loader, null); 1064 public Class toClass(CtClass ct, ClassLoader loader, ProtectionDomain domain) argument 1068 byte[] b = ct.toBytecode(); 1073 args = new Object[] { ct.getName(), b, new Integer(0), 1078 args = new Object[] { ct.getName(), b, new Integer(0),
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
H A D | ip_conntrack.h | 202 ip_conntrack_put(struct ip_conntrack *ct) argument 204 IP_NF_ASSERT(ct); 205 nf_conntrack_put(&ct->ct_general); 211 extern void __ip_ct_refresh_acct(struct ip_conntrack *ct, 218 static inline void ip_ct_refresh_acct(struct ip_conntrack *ct, argument 223 __ip_ct_refresh_acct(ct, ctinfo, skb, extra_jiffies, 1); 227 static inline void ip_ct_refresh(struct ip_conntrack *ct, argument 231 __ip_ct_refresh_acct(ct, 0, skb, extra_jiffies, 0); 267 extern void ip_ct_remove_expectations(struct ip_conntrack *ct); 272 extern void ip_conntrack_free(struct ip_conntrack *ct); 289 is_confirmed(struct ip_conntrack *ct) argument 294 is_dying(struct ip_conntrack *ct) argument 309 struct ip_conntrack *ct; member in struct:ip_conntrack_ecache 349 struct ip_conntrack *ct = (struct ip_conntrack *)skb->nfct; local 360 ip_conntrack_event(enum ip_conntrack_events event, struct ip_conntrack *ct) argument 376 ip_conntrack_event(enum ip_conntrack_events event, struct ip_conntrack *ct) argument 378 ip_ct_deliver_cached_events(const struct ip_conntrack *ct) argument [all...] |
/external/skia/tests/ |
H A D | BitmapCopyTest.cpp | 72 static void init_src(const SkBitmap& bitmap, const SkColorTable* ct) { argument 75 if (ct) { 263 SkColorTable* ct = NULL; local 268 ct = init_ctable(); 270 src.allocPixels(ct); 271 SkSafeUnref(ct); 273 init_src(src, ct); 436 SkColorTable* ct = NULL; local 443 ct = init_ctable(); 446 src.allocPixels(ct); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | aes.c | 861 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } 865 #define PUTU32(ct, st) { \ 866 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \ 867 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); } 931 void rijndaelEncrypt(const u32 rk[/*44*/], const u8 pt[16], u8 ct[16]) argument 989 PUTU32(ct , s0); 991 PUTU32(ct 999 rijndaelDecrypt(const u32 rk[ ], const u8 ct[16], u8 pt[16]) argument [all...] |