/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_free.c | 15 DSA implementation, free a DSA key, Tom St Denis 21 Free a DSA key 22 @param key The key to free from memory 24 void dsa_free(dsa_key *key) argument 26 LTC_ARGCHKVD(key != NULL); 27 mp_clear_multi(key->g, key->q, key->p, key [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_free.c | 27 Free an ECC key from memory 28 @param key The key you wish to free 30 void ecc_free(ecc_key *key) argument 32 LTC_ARGCHKVD(key != NULL); 33 mp_clear_multi(key->pubkey.x, key->pubkey.y, key->pubkey.z, key->k, NULL);
|
H A D | ecc_get_size.c | 27 Get the size of an ECC key 28 @param key The key to get the size of 29 @return The size (octets) of the key or INT_MAX on error 31 int ecc_get_size(ecc_key *key) argument 33 LTC_ARGCHK(key != NULL); 34 if (ltc_ecc_is_valid_idx(key->idx)) 35 return key->dp->size;
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
H A D | katja_free.c | 15 Free an Katja key, Tom St Denis 21 Free an Katja key from memory 22 @param key The RSA key to free 24 void katja_free(katja_key *key) argument 26 LTC_ARGCHK(key != NULL); 27 mp_clear_multi( key->d, key->N, key->dQ, key [all...] |
/external/dropbear/libtomcrypt/src/pk/rsa/ |
H A D | rsa_free.c | 15 Free an RSA key, Tom St Denis 21 Free an RSA key from memory 22 @param key The RSA key to free 24 void rsa_free(rsa_key *key) argument 26 LTC_ARGCHKVD(key != NULL); 27 mp_clear_multi(key->e, key->d, key->N, key [all...] |
/external/openssl/crypto/des/ |
H A D | des_old2.c | 79 void _ossl_096_des_random_seed(DES_cblock *key) argument 81 RAND_seed(key, sizeof(DES_cblock));
|
/external/v8/test/mjsunit/ |
H A D | property-object-key.js | 28 var key = { toString: function() { return 'baz'; } } 31 assertEquals(42, object[key]); 32 object[key] = 87; 33 assertEquals(87, object[key]); 34 object[key]++; 35 assertEquals(88, object[key]);
|
/external/valgrind/main/exp-ptrcheck/tests/ |
H A D | pth_create.c | 14 pthread_key_t* key = malloc(sizeof(pthread_key_t)); local 17 pthread_key_create ( (pthread_key_t*)((long)key + 1), NULL );
|
H A D | pth_specific.c | 7 // key allocation/getting is done on the real CPU where the skin can't see, 8 // the get/set of the info is done using that key on the simd CPU where it 13 pthread_key_t key; local 22 assert( 0 == pthread_key_create ( &key, NULL ) ); 23 assert( 0 == pthread_setspecific( key, x ) ); 24 z = (char*)pthread_getspecific( key ); 29 // ensure the key went in and out correctly
|
/external/webkit/Source/WebCore/bindings/js/ |
H A D | JSIDBKeyCustom.cpp | 40 JSValue toJS(ExecState* exec, JSDOMGlobalObject*, IDBKey* key) argument 42 if (!key) 45 switch (key->type()) { 49 return jsNumber(key->number()); 51 return jsString(exec, key->string());
|
/external/webkit/Source/WebCore/bindings/v8/custom/ |
H A D | V8IDBKeyCustom.cpp | 39 v8::Handle<v8::Value> toV8(IDBKey* key) argument 41 if (!key) 44 switch (key->type()) { 48 return v8::Number::New(key->number()); 50 return v8String(key->string()); 52 return v8::Date::New(key->date());
|
/external/chromium/base/ |
H A D | base_paths.cc | 13 bool PathProvider(int key, FilePath* result) { argument 17 switch (key) {
|
/external/chromium/chrome/browser/ |
H A D | preferences_mac.cc | 11 CFPropertyListRef MacPreferences::CopyAppValue(CFStringRef key, argument 13 return CFPreferencesCopyAppValue(key, applicationID); 16 Boolean MacPreferences::AppValueIsForced(CFStringRef key, argument 18 return CFPreferencesAppValueIsForced(key, applicationID);
|
/external/chromium/chrome/browser/ui/login/ |
H A D | login_prompt_unittest.cc | 39 std::string key = GetSignonRealm(GURL(url[i]), *auth_info); local 40 EXPECT_EQ(expected[i], key);
|
/external/chromium/net/disk_cache/ |
H A D | hash.h | 19 inline uint32 Hash(const char* key, size_t length) { argument 20 return SuperFastHash(key, static_cast<int>(length)); 23 inline uint32 Hash(const std::string& key) { argument 24 if (key.empty()) 26 return SuperFastHash(key.data(), static_cast<int>(key.size()));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-encblock.c | 24 * @key: Key for AES 29 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out) argument 32 ctx = aes_encrypt_init(key, 16);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-encblock.c | 24 * @key: Key for AES 29 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out) argument 32 ctx = aes_encrypt_init(key, 16);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-encblock.c | 24 * @key: Key for AES 29 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out) argument 32 ctx = aes_encrypt_init(key, 16);
|
/external/chromium/chrome/common/net/ |
H A D | net_resource_provider.cc | 54 base::StringPiece NetResourceProvider(int key) { argument 57 if (IDR_DIR_HEADER_HTML == key) 60 return ResourceBundle::GetSharedInstance().GetRawDataResource(key);
|
/external/chromium/net/base/ |
H A D | net_module.cc | 17 base::StringPiece NetModule::GetResource(int key) { argument 18 return resource_provider ? resource_provider(key) : base::StringPiece();
|
/external/clang/test/CodeGen/ |
H A D | 2007-02-04-AddrLValue.c | 6 char *key; member in struct:__anon3262
|
/external/dropbear/libtomcrypt/demos/ |
H A D | multi.c | 6 unsigned char key[16], buf[2][MAXBLOCKSIZE]; local 38 hmac_memory(find_hash("sha256"), key, 16, (unsigned char*)"hello", 5, buf[0], &len); 40 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"hello", 5UL, NULL); 46 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL); 52 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"h", 1UL, "e", 1UL, "l", 1UL, "l", 1UL, "o", 1UL, NULL); 60 omac_memory(find_cipher("aes"), key, 16, (unsigned char*)"hello", 5, buf[0], &len); 62 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"hello", 5UL, NULL); 68 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL); 74 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"h", 1UL, "e", 1UL, "l", 1UL, "l", 1UL, "o", 1UL, NULL); 82 pmac_memory(find_cipher("aes"), key, 1 [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) { 30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
H A D | f9_init.c | 23 @param key [in] Secret key 24 @param keylen Length of secret key in octets 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 32 LTC_ARGCHK(key != NULL); 34 /* schedule the key */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 49 /* make the second key */ 51 f9->akey[x] = key[ [all...] |
/external/dropbear/libtomcrypt/src/mac/hmac/ |
H A D | hmac_file.c | 24 @param key The secret key 25 @param keylen The length of the secret key 31 const unsigned char *key, unsigned long keylen, 44 LTC_ARGCHK(key != NULL); 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { 30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
|