Searched defs:tk (Results 1 - 25 of 56) sorted by relevance

123

/external/v8/test/cctest/
H A Dtest-hydrogen-types.cc49 HType tk = kTypes[k]; local
50 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk));
61 HType tk = kTypes[k]; local
62 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
/external/dhcpcd-6.8.2/crypt/
H A Dhmac_md5.c53 uint8_t tk[MD5_DIGEST_LENGTH]; local
61 MD5Final(tk, &context);
62 key = tk;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
91 os_memset(tk, 0, sizeof(tk));
H A Dsha1.c30 unsigned char tk[20]; local
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c44 u8 tk[32]; local
79 MD5Final(tk, &ctx->u.md5);
80 key = tk;
98 SHA1Final(tk, &ctx->u.sha1);
99 key = tk;
118 sha256_done(&ctx->u.sha256, tk);
119 key = tk;
/external/wpa_supplicant_8/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
91 os_memset(tk, 0, sizeof(tk));
H A Dsha1.c30 unsigned char tk[20]; local
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c44 u8 tk[32]; local
79 MD5Final(tk, &ctx->u.md5);
80 key = tk;
98 SHA1Final(tk, &ctx->u.sha1);
99 key = tk;
118 sha256_done(&ctx->u.sha256, tk);
119 key = tk;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd5.c30 u8 tk[16]; local
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
91 os_memset(tk, 0, sizeof(tk));
H A Dsha1.c30 unsigned char tk[20]; local
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
H A Dsha256.c30 unsigned char tk[32]; local
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
H A Dcrypto_internal.c44 u8 tk[32]; local
79 MD5Final(tk, &ctx->u.md5);
80 key = tk;
98 SHA1Final(tk, &ctx->u.sha1);
99 key = tk;
118 sha256_done(&ctx->u.sha256, tk);
119 key = tk;
/external/tcpdump/
H A Dsignature.c55 unsigned char tk[16]; local
65 MD5_Final(tk, &tctx);
67 key = tk;
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-alg-fst.c45 #define tk xtk.x8 macro
49 *((word32*)tk[j]) = *((word32*)k[j]);
56 *((word32*)W[r][t]) = *((word32*)tk[j]);
66 tk[0][0] ^= S[tk[KC-1][1]];
67 tk[0][1] ^= S[tk[KC-1][2]];
68 tk[0][2] ^= S[tk[KC-1][3]];
69 tk[
100 #undef tk macro
[all...]
/external/pdfium/third_party/freetype/src/type1/
H A Dt1afm.c373 AFM_TrackKern tk = fi->TrackKerns + i; local
376 if ( tk->degree != degree )
379 if ( ptsize < tk->min_ptsize )
380 *kerning = tk->min_kern;
381 else if ( ptsize > tk->max_ptsize )
382 *kerning = tk->max_kern;
385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize,
386 tk->max_kern - tk->min_kern,
387 tk
[all...]
/external/toybox/toys/pending/
H A Dmodprobe.c233 char *tk = NULL; local
237 for (tk = strtok(linecp, "# \t"), tcount = 0; tk;
238 tk = strtok(NULL, "# \t"), tcount++) {
239 tokens[tcount] = tk;
245 if (!tk) continue;
H A Dsyslogd.c101 char *tk; local
103 for (tk = strtok(config, "; \0"); tk; tk = strtok(NULL, "; \0")) {
104 char *fac = tk, *lvl;
109 tk = strchr(fac, '.');
110 if (!tk) return -1;
111 *tk = '\0';
112 lvl = tk + 1;
130 for (tk
157 char *confline, *tk[2]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_peap.c254 u8 *tk; local
262 tk = data->key_data;
263 if (tk == NULL)
265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
274 os_memcpy(data->ipmk, tk, 40);
277 os_memcpy(data->cmk, tk + 40, 20);
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
295 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_peap.c254 u8 *tk; local
262 tk = data->key_data;
263 if (tk == NULL)
265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
274 os_memcpy(data->ipmk, tk, 40);
277 os_memcpy(data->cmk, tk + 40, 20);
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
295 if (peap_prfplus(data->peap_version, tk, 40,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_peap.c254 u8 *tk; local
262 tk = data->key_data;
263 if (tk == NULL)
265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
274 os_memcpy(data->ipmk, tk, 40);
277 os_memcpy(data->cmk, tk + 40, 20);
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
295 if (peap_prfplus(data->peap_version, tk, 40,
/external/freetype/src/psaux/
H A Dafmparse.c589 AFM_TrackKern tk; local
627 tk = fi->TrackKerns + n;
637 tk->degree = shared_vals[0].u.i;
638 tk->min_ptsize = shared_vals[1].u.f;
639 tk->min_kern = shared_vals[2].u.f;
640 tk->max_ptsize = shared_vals[3].u.f;
641 tk->max_kern = shared_vals[4].u.f;
/external/pdfium/third_party/freetype/src/psaux/
H A Dafmparse.c589 AFM_TrackKern tk; local
627 tk = fi->TrackKerns + n;
637 tk->degree = shared_vals[0].u.i;
638 tk->min_ptsize = shared_vals[1].u.f;
639 tk->min_kern = shared_vals[2].u.f;
640 tk->max_ptsize = shared_vals[3].u.f;
641 tk->max_kern = shared_vals[4].u.f;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_peap.c325 u8 *tk; local
332 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
334 if (tk == NULL)
336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
340 os_memcpy(data->ipmk, tk, 40);
343 os_memcpy(data->cmk, tk + 40, 20);
346 os_free(tk);
360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
361 if (peap_prfplus(data->peap_version, tk, 40,
364 os_free(tk);
[all...]

Completed in 1364 milliseconds

123