/external/v8/tools/gyp/test/mac/kext/GypKext/ |
H A D | GypKext.c | 8 kern_return_t GypKext_start(kmod_info_t* ki, void* d) { argument 13 kern_return_t GypKext_stop(kmod_info_t* ki, void* d) { argument
|
/external/clang/test/CXX/temp/temp.arg/temp.arg.nontype/ |
H A D | p1.cpp | 42 const int ki = 9; // expected-note 5{{here}} member in namespace:addr_of_obj_or_func 53 X0<ki> x0c; // expected-error {{must have its address taken}} expected-warning {{internal linkage is a C++11 extension}} 54 X0<&ki> x0c_addr; // expected-error {{cannot be converted to a value of type 'int *'}} expected-warning {{internal linkage is a C++11 extension}} 68 X2<ki> x2c; // expected-error {{ignores qualifiers}} expected-warning {{internal linkage is a C++11 extension}} 69 X2k<ki> x2kc; // expected-warning {{internal linkage is a C++11 extension}} 70 X2k<&ki> x2kc_addr; // expected-error {{address taken}} expected-warning {{internal linkage is a C++11 extension}}
|
/external/apache-xml/src/main/java/org/apache/xalan/transformer/ |
H A D | KeyIterator.java | 103 KeyIterator ki = (KeyIterator) m_lpi; 104 org.apache.xpath.XPathContext xctxt = ki.getXPathContext(); 105 Vector keys = ki.getKeyDeclarations(); 107 QName name = ki.getName(); 124 // xctxt.setNamespaceContext(ki.getPrefixResolver());
|
H A D | KeyTable.java | 101 KeyIterator ki = new KeyIterator(name, keyDeclarations); 103 m_keyNodes = new XNodeSet(ki); 134 KeyIterator ki = (KeyIterator) (m_keyNodes).getContainedIter(); 135 XPathContext xctxt = ki.getXPathContext(); 189 KeyIterator ki = (KeyIterator) (m_keyNodes).getContainedIter(); 190 XPathContext xctxt = ki.getXPathContext(); 207 ki.getPrefixResolver());
|
/external/boringssl/src/crypto/md5/asm/ |
H A D | md5-586.pl | 45 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 48 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 52 &comment("R0 $ki"); 66 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 73 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 75 &comment("R1 $ki"); 82 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 96 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 101 &comment("R2 $ki"); 114 &mov($tmp2,&DWP($xo[$ki [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/math/ec/ |
H A D | ECAlgorithms.java | 108 * 5: if (ki = 1) and (li = 0) then R <- R + P end if 109 * 6: if (ki = 0) and (li = 1) then R <- R + Q end if 110 * 7: if (ki = 1) and (li = 1) then R <- R + Z end if 368 BigInteger ki = ks[i]; negs[i] = ki.signum() < 0; ki = ki.abs(); 370 int width = Math.max(2, Math.min(16, WNafUtil.getWindowSize(ki.bitLength()))); 372 wnafs[i] = WNafUtil.generateWindowNaf(width, ki);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 85 u8 ki[16]; member in struct:milenage_parameters 126 " ki CHAR(32) NOT NULL," 173 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 174 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 175 printf("Invalid ki value in database\n"); 439 hexstr2bin(pos, m->ki, 16)) { 539 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16); 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 688 gsm_milenage(m->opc, m->ki, _ran [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
H A D | eap_eke_common.c | 490 os_memcpy(sess->ki, buf + ke_len, ki_len); 491 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); 650 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) 682 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 748 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
H A D | eap_eke_common.c | 490 os_memcpy(sess->ki, buf + ke_len, ki_len); 491 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); 650 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) 682 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 748 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
H A D | eap_eke_common.c | 490 os_memcpy(sess->ki, buf + ke_len, ki_len); 491 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); 650 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) 682 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 748 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
|
/external/guice/core/test/com/google/inject/ |
H A D | KeyTest.java | 58 Key<Integer> ki = k.ofType(Integer.class); 59 assertEquals(Integer.class, ki.getRawType()); 60 assertEquals(Foo.class, ki.getAnnotationType());
|
/external/boringssl/src/crypto/cipher/ |
H A D | e_rc2.c | 313 uint16_t *ki; local 355 ki = &(key->data[63]); 357 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
|
/external/mksh/src/ |
H A D | funcs.c | 1332 const struct kill_info *ki = (const struct kill_info *)arg; local 1336 ki->num_width, i, 1337 ki->name_width, sigtraps[i].name, 1412 struct kill_info ki = { 0, 0 }; local 1415 ki.num_width++; 1420 if (w > ki.name_width) 1421 ki.name_width = w; 1431 kill_fmt_entry, (void *)&ki, 1432 ki.num_width + 1 + ki [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 1113 struct ieee802_1x_mka_ki *ki) 1122 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1246 struct ieee802_1x_mka_ki ki; local 1292 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1293 ki.kn = ntohl(body->lkn); 1296 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 1497 os_memcpy(&pkey->key_identifier, &conf->ki, 1649 os_memcpy(conf->ki.mi, sak_ki.mi, MI_LEN); 1650 conf->ki 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2711 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
H A D | ieee802_1x_kay.h | 185 struct ieee802_1x_mka_ki *ki);
|
H A D | ieee802_1x_kay_i.h | 59 struct ieee802_1x_mka_ki ki; member in struct:key_conf
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 1113 struct ieee802_1x_mka_ki *ki) 1122 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1246 struct ieee802_1x_mka_ki ki; local 1292 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1293 ki.kn = ntohl(body->lkn); 1296 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 1497 os_memcpy(&pkey->key_identifier, &conf->ki, 1649 os_memcpy(conf->ki.mi, sak_ki.mi, MI_LEN); 1650 conf->ki 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2711 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
H A D | ieee802_1x_kay.h | 185 struct ieee802_1x_mka_ki *ki);
|
H A D | ieee802_1x_kay_i.h | 59 struct ieee802_1x_mka_ki ki; member in struct:key_conf
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 1113 struct ieee802_1x_mka_ki *ki) 1122 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1246 struct ieee802_1x_mka_ki ki; local 1292 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); 1293 ki.kn = ntohl(body->lkn); 1296 if (is_ki_equal(&sa_key->key_identifier, &ki)) { 1497 os_memcpy(&pkey->key_identifier, &conf->ki, 1649 os_memcpy(conf->ki.mi, sak_ki.mi, MI_LEN); 1650 conf->ki 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, struct ieee802_1x_mka_ki *ki) argument 2711 ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, struct ieee802_1x_mka_ki *ki) argument [all...] |
H A D | ieee802_1x_kay.h | 185 struct ieee802_1x_mka_ki *ki);
|
H A D | ieee802_1x_kay_i.h | 59 struct ieee802_1x_mka_ki ki; member in struct:key_conf
|