/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
D | rijndael-alg-fst.c | 45 #define tk xtk.x8 in rijndaelKeySched() macro 49 *((word32*)tk[j]) = *((word32*)k[j]); in rijndaelKeySched() 56 *((word32*)W[r][t]) = *((word32*)tk[j]); in rijndaelKeySched() 66 tk[0][0] ^= S[tk[KC-1][1]]; in rijndaelKeySched() 67 tk[0][1] ^= S[tk[KC-1][2]]; in rijndaelKeySched() 68 tk[0][2] ^= S[tk[KC-1][3]]; in rijndaelKeySched() 69 tk[0][3] ^= S[tk[KC-1][0]]; in rijndaelKeySched() 70 tk[0][0] ^= rcon[rconpointer++]; in rijndaelKeySched() 74 *((word32*)tk[j]) ^= *((word32*)tk[j-1]); in rijndaelKeySched() 78 *((word32*)tk[j]) ^= *((word32*)tk[j-1]); in rijndaelKeySched() [all …]
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/lexer/ |
D | nuances.rb | 24 tokens = lexer.each { |tk| tk } 44 tks = lexer.map { |tk| tk }
|
D | filter-mode.rb | 91 tokens = lexer.map { |tk| tk } 239 lexer.each { |tk| tk }
|
D | xml.rb | 161 lexer.map { |tk| tk }
|
D | properties.rb | 32 tokens = lexer.map { |tk| tk }
|
/external/javassist/src/main/javassist/compiler/ |
D | Lex.java | 70 Token tk = lookAheadTokens; in lookAhead() local 71 if (tk == null) { in lookAhead() 72 lookAheadTokens = tk = currentToken; // reuse an object! in lookAhead() 73 tk.next = null; in lookAhead() 74 get(tk); in lookAhead() 77 for (; i-- > 0; tk = tk.next) in lookAhead() 78 if (tk.next == null) { in lookAhead() 80 tk.next = tk2 = new Token(); in lookAhead() 84 currentToken = tk; in lookAhead() 85 return tk.tokenId; in lookAhead()
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
D | streams.rb | 926 tk = look( k ) and return( tk.type ) 960 tk = @tokens.at( cursor += 1 ) or return( cursor ) 962 end until tk.channel == @channel 983 tk = @tokens.at( cursor -= 1 ) or return( nil ) 984 end until tk.channel == @channel 1072 tk = look( -1 ) and string << " #{ tk.inspect } <--" 1073 tk = look( 1 ) and string << " --> #{ tk.inspect }"
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal.c | 36 u8 tk[32]; in crypto_hash_init() local 61 MD5Final(tk, &ctx->u.md5); in crypto_hash_init() 62 key = tk; in crypto_hash_init() 80 SHA1Final(tk, &ctx->u.sha1); in crypto_hash_init() 81 key = tk; in crypto_hash_init() 100 sha256_done(&ctx->u.sha256, tk); in crypto_hash_init() 101 key = tk; in crypto_hash_init()
|
D | md5.c | 30 u8 tk[16]; in hmac_md5_vector() local 44 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector() 46 key = tk; in hmac_md5_vector()
|
D | md5-non-fips.c | 31 u8 tk[16]; in hmac_md5_vector_non_fips_allow() local 45 if (md5_vector_non_fips_allow(1, &key, &key_len, tk)) in hmac_md5_vector_non_fips_allow() 47 key = tk; in hmac_md5_vector_non_fips_allow()
|
D | sha256.c | 29 unsigned char tk[32]; in hmac_sha256_vector() local 43 sha256_vector(1, &key, &key_len, tk); in hmac_sha256_vector() 44 key = tk; in hmac_sha256_vector()
|
D | sha1.c | 30 unsigned char tk[20]; in hmac_sha1_vector() local 44 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector() 46 key = tk; in hmac_sha1_vector()
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/delegation/ |
D | import.rb | 256 lexer.map { |tk| lexer.capture( tk.text ) } 281 lexer.map { |tk| lexer.capture( tk.text ) }
|
/external/dropbear/libtomcrypt/src/math/fp/ |
D | ltc_ecc_fp_mulmod.c | 784 void *tk, *order; in accel_fp_mul() local 807 if ((err = mp_init(&tk)) != CRYPT_OK) { in accel_fp_mul() 811 if ((err = mp_mod(k, order, tk)) != CRYPT_OK) { in accel_fp_mul() 812 mp_clear(tk); in accel_fp_mul() 817 tk = k; in accel_fp_mul() 821 tk = k; in accel_fp_mul() 833 if (mp_unsigned_bin_size(tk) > (sizeof(kb) - 2)) { in accel_fp_mul() 834 if (tk != k) { in accel_fp_mul() 835 mp_clear(tk); in accel_fp_mul() 842 if ((err = mp_to_unsigned_bin(tk, kb)) != CRYPT_OK) { in accel_fp_mul() [all …]
|
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
D | Interp.java | 115 StringTokenizer tk = new StringTokenizer(ignoreTokens, " "); in main() local 116 while ( tk.hasMoreTokens() ) { in main() 117 String tokenName = tk.nextToken(); in main()
|
/external/chromium/chrome/browser/ui/webui/options/ |
D | advanced_options_utils_gtk.cc | 47 CStringTokenizer tk(path, path + strlen(path), ":"); in SearchPATH() local 49 while (tk.GetNext()) { in SearchPATH() 51 bin_path = FilePath(tk.token()).Append(commands[i].argv[0]); in SearchPATH()
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/parser/ |
D | properties.rb | 164 tk = parser.a 165 tk.should == [
|
/external/freetype/src/psaux/ |
D | afmparse.c | 586 AFM_TrackKern tk; in afm_parse_track_kern() local 618 tk = fi->TrackKerns + n; in afm_parse_track_kern() 628 tk->degree = shared_vals[0].u.i; in afm_parse_track_kern() 629 tk->min_ptsize = shared_vals[1].u.f; in afm_parse_track_kern() 630 tk->min_kern = shared_vals[2].u.f; in afm_parse_track_kern() 631 tk->max_ptsize = shared_vals[3].u.f; in afm_parse_track_kern() 632 tk->max_kern = shared_vals[4].u.f; in afm_parse_track_kern()
|
/external/valgrind/main/coregrind/m_demangle/ |
D | cplus-dem.c | 1647 string *s, type_kind_t tk) in demangle_expression() argument 1688 success = demangle_template_value_parm (work, mangled, s, tk); in demangle_expression() 1841 string *s, type_kind_t tk) in demangle_template_value_parm() argument 1861 else if (tk == tk_integral) in demangle_template_value_parm() 1863 else if (tk == tk_char) in demangle_template_value_parm() 1884 else if (tk == tk_bool) in demangle_template_value_parm() 1894 else if (tk == tk_real) in demangle_template_value_parm() 1896 else if (tk == tk_pointer || tk == tk_reference) in demangle_template_value_parm() 1920 if (tk == tk_pointer) in demangle_template_value_parm() 3406 type_kind_t tk = tk_none; in do_type() local [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | sha256.c | 35 unsigned char tk[32]; in hmac_sha256_vector() local 49 sha256_vector(1, &key, &key_len, tk); in hmac_sha256_vector() 50 key = tk; in hmac_sha256_vector()
|
D | crypto_internal.c | 72 u8 tk[20]; in crypto_hash_init() local 92 MD5Final(tk, &ctx->u.md5); in crypto_hash_init() 93 key = tk; in crypto_hash_init() 110 SHA1Final(tk, &ctx->u.sha1); in crypto_hash_init() 111 key = tk; in crypto_hash_init()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_peap.c | 252 u8 *tk; in eap_peap_derive_cmk() local 259 tk = data->key_data; in eap_peap_derive_cmk() 260 if (tk == NULL) in eap_peap_derive_cmk() 262 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); in eap_peap_derive_cmk() 267 os_memcpy(data->ipmk, tk, 40); in eap_peap_derive_cmk() 270 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk() 287 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); in eap_peap_derive_cmk() 288 peap_prfplus(data->peap_version, tk, 40, "Inner Methods Compound Keys", in eap_peap_derive_cmk()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_peap.c | 246 u8 *tk; in eap_peap_derive_cmk() local 253 tk = data->key_data; in eap_peap_derive_cmk() 254 if (tk == NULL) in eap_peap_derive_cmk() 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); in eap_peap_derive_cmk() 261 os_memcpy(data->ipmk, tk, 40); in eap_peap_derive_cmk() 264 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk() 281 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); in eap_peap_derive_cmk() 282 if (peap_prfplus(data->peap_version, tk, 40, in eap_peap_derive_cmk()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 324 u8 *tk; in eap_peap_derive_cmk() local 331 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", in eap_peap_derive_cmk() 333 if (tk == NULL) in eap_peap_derive_cmk() 335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); in eap_peap_derive_cmk() 347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40); in eap_peap_derive_cmk() 348 if (peap_prfplus(data->peap_version, tk, 40, in eap_peap_derive_cmk() 351 os_free(tk); in eap_peap_derive_cmk() 357 os_free(tk); in eap_peap_derive_cmk()
|
/external/icu4c/data/lang/ |
D | ps.txt | 42 tk{"ترکمني"}
|