Searched defs:ct (Results 76 - 100 of 139) sorted by relevance

123456

/external/antlr/antlr-3.4/runtime/C/src/
H A Dantlr3commontreeadaptor.c261 pANTLR3_BASE_TREE ct; local
265 ct = ((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum->newFromToken(((pANTLR3_COMMON_TREE_ADAPTOR)(adaptor->super))->arboretum, payload);
269 return ct;
274 pANTLR3_BASE_TREE ct; local
276 ct = create(adaptor, payload);
277 adaptor->debugger->createNode(adaptor->debugger, ct);
279 return ct;
377 pANTLR3_COMMON_TREE ct; local
402 ct = (pANTLR3_COMMON_TREE)(t->super);
404 ct
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DEncryptedPrivateKeyInfoTest.java1071 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct());
1073 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct());
1110 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct());
1112 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct());
1173 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct());
1175 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct());
1211 epki = new EncryptedPrivateKeyInfo(algName[i][0], g.ct());
1213 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct());
1300 .ct());
1302 epki = new EncryptedPrivateKeyInfo(g.ap(), g.ct());
1526 byte[] ct; field in class:EncryptedPrivateKeyInfoTest.TestDataGenerator
1655 public byte[] ct() { method in class:EncryptedPrivateKeyInfoTest.TestDataGenerator
[all...]
/external/dropbear/libtomcrypt/src/ciphers/
H A Danubis.c1135 @param ct The output ciphertext (16 bytes)
1139 int anubis_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
1142 LTC_ARGCHK(ct != NULL);
1144 anubis_crypt(pt, ct, skey->anubis.roundKeyEnc, skey->anubis.R);
1150 @param ct The input ciphertext (16 bytes)
1155 int anubis_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
1158 LTC_ARGCHK(ct != NULL);
1160 anubis_crypt(ct, pt, skey->anubis.roundKeyDec, skey->anubis.R);
1175 unsigned char pt[16], ct[16], key[40];
1503 if (XMEMCMP(buf[0], tests[x].ct, 1
[all...]
H A Dcast5.c535 @param ct The output ciphertext (8 bytes)
539 static int _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
541 int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
547 LTC_ARGCHK(ct != NULL);
570 STORE32H(R,&ct[0]);
571 STORE32H(L,&ct[4]);
577 int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
579 int err =_cast5_ecb_encrypt(pt,ct,skey);
587 @param ct The input ciphertext (8 bytes)
592 static int _cast5_ecb_decrypt(const unsigned char *ct, unsigne argument
630 cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
[all...]
H A Ddes.c1588 @param ct The output ciphertext (8 bytes)
1592 int des_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
1596 LTC_ARGCHK(ct != NULL);
1601 STORE32H(work[0],ct+0);
1602 STORE32H(work[1],ct+4);
1608 @param ct The input ciphertext (8 bytes)
1613 int des_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey)
1617 LTC_ARGCHK(ct != NULL);
1619 LOAD32H(work[0], ct+0);
1620 LOAD32H(work[1], ct
1635 des3_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
1659 des3_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
[all...]
/external/jdiff/src/jdiff/
H A DRootDocToXML.java470 * @param ct An array of ConstructorDoc objects
472 public void processConstructors(ConstructorDoc[] ct) { argument
473 if (trace) System.out.println("PROCESSING CONSTRUCTORS, number=" + ct.length);
474 for (int i = 0; i < ct.length; i++) {
475 String ctorName = ct[i].name();
478 if (!shownElement(ct[i], memberVisibilityLevel))
482 Parameter[] params = ct[i].parameters();
495 addCommonModifiers(ct[i], 6);
499 processExceptions(ct[i].thrownExceptions());
501 addDocumentation(ct[
[all...]
/external/libvpx/vp8/encoder/
H A Dencodemv.c216 __inline static void calc_prob(vp8_prob *p, const unsigned int ct[2]) argument
218 const unsigned int tot = ct[0] + ct[1];
222 const vp8_prob x = ((ct[0] * 255) / tot) & -2;
229 const unsigned int ct[2],
236 const int cur_b = vp8_cost_branch(ct, *cur_p);
237 const int new_b = vp8_cost_branch(ct, new_p);
368 vp8_prob p [mvnum_short - 1]; /* actually only need branch ct */
227 update( vp8_writer *const w, const unsigned int ct[2], vp8_prob *const cur_p, const vp8_prob new_p, const vp8_prob update_p, int *updated ) argument
/external/llvm/lib/CodeGen/
H A DMachineTraceMetrics.cpp105 MachineTraceMetrics::Ensemble::Ensemble(MachineTraceMetrics *ct) argument
106 : MTM(*ct) {
/external/openssh/
H A Drijndael.c720 #define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
858 static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 ct[16]) { argument
1015 PUTU32(ct , s0);
1022 PUTU32(ct + 4, s1);
1029 PUTU32(ct + 8, s2);
1036 PUTU32(ct
1039 rijndaelDecrypt(const u32 rk[ ], int Nr, const u8 ct[16], u8 pt[16]) argument
[all...]
/external/srtp/crypto/test/
H A Dcipher_driver.c60 cipher_driver_self_test(cipher_type_t *ct);
64 * cipher_driver_test_buffering(ct) tests the cipher's output
77 cipher_driver_test_array_throughput(cipher_type_t *ct,
239 cipher_driver_self_test(cipher_type_t *ct) { argument
242 printf("running cipher self-test for %s...", ct->description);
243 status = cipher_type_self_test(ct);
254 * cipher_driver_test_buffering(ct) tests the cipher's output
474 cipher_driver_test_array_throughput(cipher_type_t *ct, argument
479 status = cipher_array_alloc_init(&ca, num_cipher, ct, klen);
/external/stlport/src/
H A Dtime_facets.cpp148 void __subformat(_STLP_BASIC_IOSTRING(_Ch) &buf, const ctype<_Ch>& ct, variable
159 __write_formatted_timeT(buf, ct, *cp++, mod, table, t);
171 static void __append(__iostring &buf, char *first, char *last, const ctype<char>& /* ct */)
174 static void __append(__iowstring &buf, char *first, char *last, const ctype<wchar_t>& ct) { argument
176 ct.widen(first, last, _wbuf);
214 const ctype<_Ch>& ct, variable
238 __subformat(buf, ct, (modifier != '#') ? table._M_date_time_format
244 __append(buf, _buf, ((long)t->tm_mday < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct);
249 __append(buf, _buf, _buf + 2, ct);
254 __append(buf, _buf, ((long)t->tm_hour < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct);
454 __write_formatted_time(__iostring &buf, const ctype<char>& ct, char format, char modifier, const _Time_Info& table, const tm* t) argument
459 __write_formatted_time(__iowstring &buf, const ctype<wchar_t>& ct, char format, char modifier, const _WTime_Info& table, const tm* t) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_server.c116 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
140 ct = pos[0];
149 if (tlsv1_server_process_handshake(conn, ct, in_pos,
H A Dtlsv1_server_read.c28 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
31 u8 ct, const u8 *in_data,
35 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
45 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
47 "received content type 0x%x", ct);
267 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
276 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
278 "received content type 0x%x", ct);
318 return tls_process_client_key_exchange(conn, ct, in_data,
674 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1085 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_server.c112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
145 ct = pos[0];
154 if (tlsv1_server_process_handshake(conn, ct, in_pos,
239 u8 alert, *out_end, *out_pos, ct; local
248 ct = pos[0];
266 if (ct == TLS_CONTENT_TYPE_ALERT) {
287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
26 u8 ct, const u8 *in_data,
30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
42 "received content type 0x%x", ct);
277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
288 "received content type 0x%x", ct);
328 return tls_process_client_key_exchange(conn, ct, in_data,
688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_server.c112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
145 ct = pos[0];
154 if (tlsv1_server_process_handshake(conn, ct, in_pos,
239 u8 alert, *out_end, *out_pos, ct; local
248 ct = pos[0];
266 if (ct == TLS_CONTENT_TYPE_ALERT) {
287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
26 u8 ct, const u8 *in_data,
30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
42 "received content type 0x%x", ct);
277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
288 "received content type 0x%x", ct);
328 return tls_process_client_key_exchange(conn, ct, in_data,
688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_server.c112 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
145 ct = pos[0];
154 if (tlsv1_server_process_handshake(conn, ct, in_pos,
239 u8 alert, *out_end, *out_pos, ct; local
248 ct = pos[0];
266 if (ct == TLS_CONTENT_TYPE_ALERT) {
287 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
26 u8 ct, const u8 *in_data,
30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
40 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
42 "received content type 0x%x", ct);
277 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
286 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
288 "received content type 0x%x", ct);
328 return tls_process_client_key_exchange(conn, ct, in_data,
688 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/lang/
H A DThreadTest.java121 Thread st, ct, spinner; field in class:ThreadTest
128 ct = new Thread(new SimpleThread(10));
129 ct.start();
486 ct = new ChildThread1(Thread.currentThread(), "Interrupt Test1",
489 ct.start();
499 ct = new ChildThread1(Thread.currentThread(), "Interrupt Test2",
502 ct.start();
861 ct = new Thread(t, "Interrupt Test4");
862 ct.start();
865 assertTrue("Thread is not running1", ct
[all...]
/external/clang/test/FixIt/
H A Dfixit.cpp23 CT<10 >> 2> ct; // expected-warning{{require parentheses}} variable
/external/javassist/src/main/javassist/
H A DClassPool.java1028 public Class toClass(CtClass ct, ClassLoader loader) argument
1031 return toClass(ct, loader, null);
1064 public Class toClass(CtClass ct, ClassLoader loader, ProtectionDomain domain) argument
1068 byte[] b = ct.toBytecode();
1073 args = new Object[] { ct.getName(), b, new Integer(0),
1078 args = new Object[] { ct.getName(), b, new Integer(0),
/external/kernel-headers/original/linux/netfilter_ipv4/
H A Dip_conntrack.h202 ip_conntrack_put(struct ip_conntrack *ct) argument
204 IP_NF_ASSERT(ct);
205 nf_conntrack_put(&ct->ct_general);
211 extern void __ip_ct_refresh_acct(struct ip_conntrack *ct,
218 static inline void ip_ct_refresh_acct(struct ip_conntrack *ct, argument
223 __ip_ct_refresh_acct(ct, ctinfo, skb, extra_jiffies, 1);
227 static inline void ip_ct_refresh(struct ip_conntrack *ct, argument
231 __ip_ct_refresh_acct(ct, 0, skb, extra_jiffies, 0);
267 extern void ip_ct_remove_expectations(struct ip_conntrack *ct);
272 extern void ip_conntrack_free(struct ip_conntrack *ct);
289 is_confirmed(struct ip_conntrack *ct) argument
294 is_dying(struct ip_conntrack *ct) argument
309 struct ip_conntrack *ct; member in struct:ip_conntrack_ecache
349 struct ip_conntrack *ct = (struct ip_conntrack *)skb->nfct; local
360 ip_conntrack_event(enum ip_conntrack_events event, struct ip_conntrack *ct) argument
376 ip_conntrack_event(enum ip_conntrack_events event, struct ip_conntrack *ct) argument
378 ip_ct_deliver_cached_events(const struct ip_conntrack *ct) argument
[all...]
/external/skia/tests/
H A DBitmapCopyTest.cpp72 static void init_src(const SkBitmap& bitmap, const SkColorTable* ct) { argument
75 if (ct) {
263 SkColorTable* ct = NULL; local
268 ct = init_ctable();
270 src.allocPixels(ct);
271 SkSafeUnref(ct);
273 init_src(src, ct);
436 SkColorTable* ct = NULL; local
443 ct = init_ctable();
446 src.allocPixels(ct);
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Daes.c861 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
865 #define PUTU32(ct, st) { \
866 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \
867 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
931 void rijndaelEncrypt(const u32 rk[/*44*/], const u8 pt[16], u8 ct[16]) argument
989 PUTU32(ct , s0);
991 PUTU32(ct
999 rijndaelDecrypt(const u32 rk[ ], const u8 ct[16], u8 pt[16]) argument
[all...]

Completed in 452 milliseconds

123456