/external/javassist/src/main/javassist/compiler/ |
H A D | Lex.java | 70 Token tk = lookAheadTokens; 71 if (tk == null) { 72 lookAheadTokens = tk = currentToken; // reuse an object! 73 tk.next = null; 74 get(tk); 77 for (; i-- > 0; tk = tk.next) 78 if (tk.next == null) { 80 tk.next = tk2 = new Token(); 84 currentToken = tk; [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/lexer/ |
H A D | nuances.rb | 24 tokens = lexer.each { |tk| tk } 44 tks = lexer.map { |tk| tk }
|
H A D | properties.rb | 32 tokens = lexer.map { |tk| tk }
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 30 u8 tk[16]; local 44 if (md5_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha1.c | 30 unsigned char tk[20]; local 44 if (sha1_vector(1, &key, &key_len, tk)) 46 key = tk;
|
H A D | sha256.c | 30 unsigned char tk[32]; local 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk;
|
H A D | crypto_internal.c | 36 u8 tk[32]; local 61 MD5Final(tk, &ctx->u.md5); 62 key = tk; 80 SHA1Final(tk, &ctx->u.sha1); 81 key = tk; 100 sha256_done(&ctx->u.sha256, tk); 101 key = tk;
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 45 #define tk xtk.x8 macro 49 *((word32*)tk[j]) = *((word32*)k[j]); 56 *((word32*)W[r][t]) = *((word32*)tk[j]); 66 tk[0][0] ^= S[tk[KC-1][1]]; 67 tk[0][1] ^= S[tk[KC-1][2]]; 68 tk[0][2] ^= S[tk[KC-1][3]]; 69 tk[ 100 #undef tk macro [all...] |
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
H A D | Interp.java | 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); 116 while ( tk.hasMoreTokens() ) { 117 String tokenName = tk.nextToken();
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_api.c | 261 smp_convert_string_to_tk(p_cb->tk, passkey); 301 memcpy(p_cb->tk, p_data, len); 304 key.p_data = p_cb->tk;
|
H A D | smp_keys.c | 182 UINT8 *tt = p_cb->tk; 197 memset(p_cb->tk, 0, BT_OCTET16_LEN); 201 key.p_data = p_cb->tk; 245 if (!SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, &output)) 547 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p1, BT_OCTET16_LEN, &output)) 586 if (!SMP_Encrypt(p_cb->tk, BT_OCTET16_LEN, p2, BT_OCTET16_LEN, &output))
|
/external/chromium/chrome/browser/ui/webui/options/ |
H A D | advanced_options_utils_gtk.cc | 47 CStringTokenizer tk(path, path + strlen(path), ":"); 49 while (tk.GetNext()) { 51 bin_path = FilePath(tk.token()).Append(commands[i].argv[0]);
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/parser/ |
H A D | properties.rb | 132 a returns [$tk] 135 $tk = [ 164 tk = parser.a 165 tk.should == [
|
/external/dropbear/libtomcrypt/src/math/fp/ |
H A D | ltc_ecc_fp_mulmod.c | 784 void *tk, *order; local 807 if ((err = mp_init(&tk)) != CRYPT_OK) { 811 if ((err = mp_mod(k, order, tk)) != CRYPT_OK) { 812 mp_clear(tk); 817 tk = k; 821 tk = k; 833 if (mp_unsigned_bin_size(tk) > (sizeof(kb) - 2)) { 834 if (tk != k) { 835 mp_clear(tk); 842 if ((err = mp_to_unsigned_bin(tk, k [all...] |
/external/freetype/src/psaux/ |
H A D | afmparse.c | 586 AFM_TrackKern tk; local 618 tk = fi->TrackKerns + n; 628 tk->degree = shared_vals[0].u.i; 629 tk->min_ptsize = shared_vals[1].u.f; 630 tk->min_kern = shared_vals[2].u.f; 631 tk->max_ptsize = shared_vals[3].u.f; 632 tk->max_kern = shared_vals[4].u.f;
|
/external/valgrind/main/coregrind/m_demangle/ |
H A D | cplus-dem.c | 1647 string *s, type_kind_t tk) 1688 success = demangle_template_value_parm (work, mangled, s, tk); 1841 string *s, type_kind_t tk) 1861 else if (tk == tk_integral) 1863 else if (tk == tk_char) 1884 else if (tk == tk_bool) 1894 else if (tk == tk_real) 1896 else if (tk == tk_pointer || tk == tk_reference) 1920 if (tk 1646 demangle_expression(struct work_stuff *work, const char **mangled, string *s, type_kind_t tk) argument 1840 demangle_template_value_parm(struct work_stuff *work, const char **mangled, string *s, type_kind_t tk) argument 3406 type_kind_t tk = tk_none; local 3714 type_kind_t tk = tk_integral; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | sha256.c | 35 unsigned char tk[32]; local 49 sha256_vector(1, &key, &key_len, tk); 50 key = tk;
|