/external/chromium_org/v8/test/cctest/ |
H A D | test-hydrogen-types.cc | 50 HType tk = kTypes[k]; local 51 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk)); 62 HType tk = kTypes[k]; local 63 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/tcpdump/ |
H A D | signature.c | 59 unsigned char tk[16]; local 69 MD5_Final(tk, &tctx); 71 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[ 100 #undef tk macro [all...] |
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/type1/ |
H A D | t1afm.c | 373 AFM_TrackKern tk = fi->TrackKerns + i; local 376 if ( tk->degree != degree ) 379 if ( ptsize < tk->min_ptsize ) 380 *kerning = tk->min_kern; 381 else if ( ptsize > tk->max_ptsize ) 382 *kerning = tk->max_kern; 385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize, 386 tk->max_kern - tk->min_kern, 387 tk [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_utils.c | 470 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) argument 472 UINT8 *p = tk; 478 key.p_data = tk;
|
H A D | smp_int.h | 192 BT_OCTET16 tk; member in struct:__anon1720 303 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 257 u8 *tk; local 264 tk = data->key_data; 265 if (tk == NULL) 267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 272 os_memcpy(data->ipmk, tk, 40); 275 os_memcpy(data->cmk, tk + 40, 20); 292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 293 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_peap.c | 257 u8 *tk; local 264 tk = data->key_data; 265 if (tk == NULL) 267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 272 os_memcpy(data->ipmk, tk, 40); 275 os_memcpy(data->cmk, tk + 40, 20); 292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 293 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 257 u8 *tk; local 264 tk = data->key_data; 265 if (tk == NULL) 267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 272 os_memcpy(data->ipmk, tk, 40); 275 os_memcpy(data->cmk, tk + 40, 20); 292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 293 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/chromium_org/third_party/freetype/src/psaux/ |
H A D | afmparse.c | 589 AFM_TrackKern tk; local 621 tk = fi->TrackKerns + n; 631 tk->degree = shared_vals[0].u.i; 632 tk->min_ptsize = shared_vals[1].u.f; 633 tk->min_kern = shared_vals[2].u.f; 634 tk->max_ptsize = shared_vals[3].u.f; 635 tk->max_kern = shared_vals[4].u.f;
|
/external/freetype/src/psaux/ |
H A D | afmparse.c | 589 AFM_TrackKern tk; local 621 tk = fi->TrackKerns + n; 631 tk->degree = shared_vals[0].u.i; 632 tk->min_ptsize = shared_vals[1].u.f; 633 tk->min_kern = shared_vals[2].u.f; 634 tk->max_ptsize = shared_vals[3].u.f; 635 tk->max_kern = shared_vals[4].u.f;
|
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/psaux/ |
H A D | afmparse.c | 589 AFM_TrackKern tk; local 621 tk = fi->TrackKerns + n; 631 tk->degree = shared_vals[0].u.i; 632 tk->min_ptsize = shared_vals[1].u.f; 633 tk->min_kern = shared_vals[2].u.f; 634 tk->max_ptsize = shared_vals[3].u.f; 635 tk->max_kern = shared_vals[4].u.f;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_peap.c | 294 u8 *tk; local 301 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 303 if (tk == NULL) 305 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 317 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 318 if (peap_prfplus(data->peap_version, tk, 40, 321 os_free(tk); 327 os_free(tk);
|