/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
H A D | SDL_x11events.c | 589 char *keydata = keybuf; local 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 601 keydata = SDL_malloc(count); 602 if ( keydata == NULL ) { 606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 650 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size); 652 /* The keydata contained an invalid byte 717 if (keydata != NULL && keybuf != keydata) { 718 SDL_free(keydata); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 649 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 630 struct eap_key_data keydata; local 666 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 674 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 682 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 706 hmac_md5(keydata.sign_key, sign_key_len, 727 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 745 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 630 struct eap_key_data keydata; local 666 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 674 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 682 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 706 hmac_md5(keydata.sign_key, sign_key_len, 727 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 745 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 630 struct eap_key_data keydata; local 666 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 674 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 682 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 706 hmac_md5(keydata.sign_key, sign_key_len, 727 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 745 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/kernel-headers/original/linux/spi/ |
H A D | cpcap.h | 701 void *keydata; member in struct:cpcap_device 713 cpcap->keydata = data; 718 return cpcap->keydata;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) {
|
H A D | wpa.c | 1051 const u8 *keydata, 1059 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1060 wpa_supplicant_parse_ies(keydata, keydatalen, &ie); 1050 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) {
|
H A D | wpa.c | 1145 const u8 *keydata, 1153 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1154 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1144 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) {
|
H A D | wpa.c | 1145 const u8 *keydata, 1153 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1154 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1144 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 783 const u8 *keydata; local 793 keydata = (const u8 *) (key + 1); 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 796 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0 || 832 const u8 *keydata; local 844 keydata = (const u8 *) (key + 1); 846 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", keydata, len); 847 if (wpa_supplicant_parse_ies(keydata, len, &kde) < 0) {
|
H A D | wpa.c | 1145 const u8 *keydata, 1153 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1154 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1144 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|