Searched defs:tk (Results 1 - 25 of 39) sorted by relevance

12

/external/chromium_org/v8/test/cctest/
H A Dtest-hydrogen-types.cc50 HType tk = kTypes[k]; local
51 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk));
62 HType tk = kTypes[k]; local
63 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/wpa_supplicant_8/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
44 if (md5_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha1.c30 unsigned char tk[20]; local
44 if (sha1_vector(1, &key, &key_len, tk))
46 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c36 u8 tk[32]; local
61 MD5Final(tk, &ctx->u.md5);
62 key = tk;
80 SHA1Final(tk, &ctx->u.sha1);
81 key = tk;
100 sha256_done(&ctx->u.sha256, tk);
101 key = tk;
/external/tcpdump/
H A Dsignature.c59 unsigned char tk[16]; local
69 MD5_Final(tk, &tctx);
71 key = tk;
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-alg-fst.c45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[
100 #undef tk macro
[all...]
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/type1/
H A Dt1afm.c373 AFM_TrackKern tk = fi->TrackKerns + i; local
376 if ( tk->degree != degree )
379 if ( ptsize < tk->min_ptsize )
380 *kerning = tk->min_kern;
381 else if ( ptsize > tk->max_ptsize )
382 *kerning = tk->max_kern;
385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize,
386 tk->max_kern - tk->min_kern,
387 tk
[all...]
/external/bluetooth/bluedroid/stack/smp/
H A Dsmp_utils.c470 void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey) argument
472 UINT8 *p = tk;
478 key.p_data = tk;
H A Dsmp_int.h192 BT_OCTET16 tk; member in struct:__anon1720
303 extern void smp_convert_string_to_tk(BT_OCTET16 tk, UINT32 passkey);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_peap.c257 u8 *tk; local
264 tk = data->key_data;
265 if (tk == NULL)
267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
272 os_memcpy(data->ipmk, tk, 40);
275 os_memcpy(data->cmk, tk + 40, 20);
292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
293 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_peap.c257 u8 *tk; local
264 tk = data->key_data;
265 if (tk == NULL)
267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
272 os_memcpy(data->ipmk, tk, 40);
275 os_memcpy(data->cmk, tk + 40, 20);
292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
293 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_peap.c257 u8 *tk; local
264 tk = data->key_data;
265 if (tk == NULL)
267 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
272 os_memcpy(data->ipmk, tk, 40);
275 os_memcpy(data->cmk, tk + 40, 20);
292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
293 if (peap_prfplus(data->peap_version, tk, 40,
/external/chromium_org/third_party/freetype/src/psaux/
H A Dafmparse.c589 AFM_TrackKern tk; local
621 tk = fi->TrackKerns + n;
631 tk->degree = shared_vals[0].u.i;
632 tk->min_ptsize = shared_vals[1].u.f;
633 tk->min_kern = shared_vals[2].u.f;
634 tk->max_ptsize = shared_vals[3].u.f;
635 tk->max_kern = shared_vals[4].u.f;
/external/freetype/src/psaux/
H A Dafmparse.c589 AFM_TrackKern tk; local
621 tk = fi->TrackKerns + n;
631 tk->degree = shared_vals[0].u.i;
632 tk->min_ptsize = shared_vals[1].u.f;
633 tk->min_kern = shared_vals[2].u.f;
634 tk->max_ptsize = shared_vals[3].u.f;
635 tk->max_kern = shared_vals[4].u.f;
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/psaux/
H A Dafmparse.c589 AFM_TrackKern tk; local
621 tk = fi->TrackKerns + n;
631 tk->degree = shared_vals[0].u.i;
632 tk->min_ptsize = shared_vals[1].u.f;
633 tk->min_kern = shared_vals[2].u.f;
634 tk->max_ptsize = shared_vals[3].u.f;
635 tk->max_kern = shared_vals[4].u.f;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_peap.c294 u8 *tk; local
301 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
303 if (tk == NULL)
305 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
317 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
318 if (peap_prfplus(data->peap_version, tk, 40,
321 os_free(tk);
327 os_free(tk);

Completed in 976 milliseconds

12