/external/v8/test/cctest/ |
H A D | test-hydrogen-types.cc | 49 HType tk = kTypes[k]; local 50 CHECK(!ti.Equals(tj) || !tj.Equals(tk) || ti.Equals(tk)); 61 HType tk = kTypes[k]; local 62 CHECK(!ti.IsSubtypeOf(tj) || !tj.IsSubtypeOf(tk) || ti.IsSubtypeOf(tk));
|
/external/dhcpcd-6.8.2/crypt/ |
H A D | hmac_md5.c | 53 uint8_t tk[MD5_DIGEST_LENGTH]; local 61 MD5Final(tk, &context); 62 key = tk;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 91 os_memset(tk, 0, sizeof(tk));
|
H A D | sha1.c | 30 unsigned char tk[20]; local 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 44 u8 tk[32]; local 79 MD5Final(tk, &ctx->u.md5); 80 key = tk; 98 SHA1Final(tk, &ctx->u.sha1); 99 key = tk; 118 sha256_done(&ctx->u.sha256, tk); 119 key = tk;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 91 os_memset(tk, 0, sizeof(tk));
|
H A D | sha1.c | 30 unsigned char tk[20]; local 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 44 u8 tk[32]; local 79 MD5Final(tk, &ctx->u.md5); 80 key = tk; 98 SHA1Final(tk, &ctx->u.sha1); 99 key = tk; 118 sha256_done(&ctx->u.sha256, tk); 119 key = tk;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 91 os_memset(tk, 0, sizeof(tk));
|
H A D | sha1.c | 30 unsigned char tk[20]; local 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 44 u8 tk[32]; local 79 MD5Final(tk, &ctx->u.md5); 80 key = tk; 98 SHA1Final(tk, &ctx->u.sha1); 99 key = tk; 118 sha256_done(&ctx->u.sha256, tk); 119 key = tk;
|
/external/tcpdump/ |
H A D | signature.c | 55 unsigned char tk[16]; local 65 MD5_Final(tk, &tctx); 67 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[ 100 #undef tk macro [all...] |
/external/pdfium/third_party/freetype/src/type1/ |
H A D | t1afm.c | 373 AFM_TrackKern tk = fi->TrackKerns + i; local 376 if ( tk->degree != degree ) 379 if ( ptsize < tk->min_ptsize ) 380 *kerning = tk->min_kern; 381 else if ( ptsize > tk->max_ptsize ) 382 *kerning = tk->max_kern; 385 *kerning = FT_MulDiv( ptsize - tk->min_ptsize, 386 tk->max_kern - tk->min_kern, 387 tk [all...] |
/external/toybox/toys/pending/ |
H A D | modprobe.c | 233 char *tk = NULL; local 237 for (tk = strtok(linecp, "# \t"), tcount = 0; tk; 238 tk = strtok(NULL, "# \t"), tcount++) { 239 tokens[tcount] = tk; 245 if (!tk) continue;
|
H A D | syslogd.c | 101 char *tk; local 103 for (tk = strtok(config, "; \0"); tk; tk = strtok(NULL, "; \0")) { 104 char *fac = tk, *lvl; 109 tk = strchr(fac, '.'); 110 if (!tk) return -1; 111 *tk = '\0'; 112 lvl = tk + 1; 130 for (tk 157 char *confline, *tk[2]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 254 u8 *tk; local 262 tk = data->key_data; 263 if (tk == NULL) 265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 274 os_memcpy(data->ipmk, tk, 40); 277 os_memcpy(data->cmk, tk + 40, 20); 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 295 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_peap.c | 254 u8 *tk; local 262 tk = data->key_data; 263 if (tk == NULL) 265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 274 os_memcpy(data->ipmk, tk, 40); 277 os_memcpy(data->cmk, tk + 40, 20); 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 295 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 254 u8 *tk; local 262 tk = data->key_data; 263 if (tk == NULL) 265 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 274 os_memcpy(data->ipmk, tk, 40); 277 os_memcpy(data->cmk, tk + 40, 20); 294 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 295 if (peap_prfplus(data->peap_version, tk, 40,
|
/external/freetype/src/psaux/ |
H A D | afmparse.c | 589 AFM_TrackKern tk; local 627 tk = fi->TrackKerns + n; 637 tk->degree = shared_vals[0].u.i; 638 tk->min_ptsize = shared_vals[1].u.f; 639 tk->min_kern = shared_vals[2].u.f; 640 tk->max_ptsize = shared_vals[3].u.f; 641 tk->max_kern = shared_vals[4].u.f;
|
/external/pdfium/third_party/freetype/src/psaux/ |
H A D | afmparse.c | 589 AFM_TrackKern tk; local 627 tk = fi->TrackKerns + n; 637 tk->degree = shared_vals[0].u.i; 638 tk->min_ptsize = shared_vals[1].u.f; 639 tk->min_kern = shared_vals[2].u.f; 640 tk->max_ptsize = shared_vals[3].u.f; 641 tk->max_kern = shared_vals[4].u.f;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_peap.c | 325 u8 *tk; local 332 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 334 if (tk == NULL) 336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 340 os_memcpy(data->ipmk, tk, 40); 343 os_memcpy(data->cmk, tk + 40, 20); 346 os_free(tk); 360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); 361 if (peap_prfplus(data->peap_version, tk, 40, 364 os_free(tk); [all...] |