/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | rsa.c | 40 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) { 42 "tag 0x%x", hdr.class, hdr.tag); 89 hdr.tag != ASN1_TAG_SEQUENCE) { 91 "(public key) - found class %d tag 0x%x", 92 hdr.class, hdr.tag); 173 hdr.tag != ASN1_TAG_SEQUENCE) { 175 "(public key) - found class %d tag 0x%x", 176 hdr.class, hdr.tag);
|
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
/external/valgrind/main/VEX/priv/ |
H A D | host_x86_defs.c | 163 am->tag = Xam_IR; 170 am->tag = Xam_IRRS; 180 switch (am->tag) { 192 switch (am->tag) { 214 switch (am->tag) { 228 switch (am->tag) { 245 op->tag = Xrmi_Imm; 251 op->tag = Xrmi_Reg; 257 op->tag = Xrmi_Mem; 263 switch (op->tag) { [all...] |
H A D | host_x86_isel.c | 108 return e->tag == Iex_Const 109 && e->Iex.Const.con->tag == Ico_U8 115 return e->tag == Iex_Const 116 && e->Iex.Const.con->tag == Ico_U32 122 return e->tag == Iex_Const 123 && e->Iex.Const.con->tag == Ico_U64 312 switch (am4->tag) { 374 switch (e->tag) { 559 if (guard->tag == Iex_Const 560 && guard->Iex.Const.con->tag [all...] |
H A D | host_ppc_defs.c | 322 am->tag = Pam_IR; 329 am->tag = Pam_RR; 336 switch (am->tag) { 347 switch (am->tag) { 367 switch (am->tag) { 381 switch (am->tag) { 398 op->tag = Prh_Imm; 410 op->tag = Prh_Reg; 416 switch (op->tag) { 435 switch (op->tag) { [all...] |
/external/protobuf/src/google/protobuf/compiler/ |
H A D | plugin.pb.cc | 234 ::google::protobuf::uint32 tag; local 235 while ((tag = input->ReadTag()) != 0) { 236 switch (::google::protobuf::internal::WireFormatLite::GetTagFieldNumber(tag)) { 239 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == 257 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == 274 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == 289 if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == 294 input, tag, mutable_unknown_fields())); 568 ::google::protobuf::uint32 tag; local 569 while ((tag 889 ::google::protobuf::uint32 tag; local [all...] |
/external/javassist/src/main/javassist/bytecode/ |
H A D | MethodInfo.java | 168 = (AnnotationDefaultAttribute) getAttribute(AnnotationDefaultAttribute.tag); 177 = getAttribute(SignatureAttribute.tag); 324 ExceptionsAttribute.tag); 334 AttributeInfo info = AttributeInfo.lookup(attribute, CodeAttribute.tag); 342 AttributeInfo.remove(attribute, ExceptionsAttribute.tag); 364 AttributeInfo.remove(attribute, CodeAttribute.tag); 453 .getAttribute(LineNumberAttribute.tag);
|
/external/icu4c/test/intltest/ |
H A D | restsnew.cpp | 633 char tag[100]; local 699 uprv_strcpy(tag, "string_"); 700 uprv_strcat(tag, frag); 704 action += tag; 709 UnicodeString string = theBundle.getStringEx(tag, status); 726 uprv_strcpy(tag, "array_"); 727 uprv_strcat(tag, frag); 731 action += tag; 736 ResourceBundle array = theBundle.get(tag, status); 774 ResourceBundle array = theBundle.get(tag, statu [all...] |
/external/chromium/chrome/browser/sync/glue/ |
H A D | autofill_model_associator.cc | 73 std::string tag = KeyToTag(ix->key().name(), ix->key().value()); local 74 if (id_map_.find(tag) != id_map_.end()) { 82 if (node.InitByClientTagLookup(syncable::AUTOFILL, tag)) { 84 DCHECK_EQ(tag, KeyToTag(UTF8ToUTF16(autofill.name()), 93 if (!write_node.InitByClientTagLookup(syncable::AUTOFILL, tag)) { 100 Associate(&tag, node.GetId()); 104 autofill_root, tag)) { 108 node.SetTitle(UTF8ToWide(tag)); 110 Associate(&tag, node.GetId()); 338 std::string tag(KeyToTa 450 GetSyncIdForTaggedNode(const std::string& tag, int64* sync_id) argument [all...] |
/external/elfutils/src/ |
H A D | ldscript.y | 49 static struct expression *new_expr (int tag); 52 static struct input_rule *new_input_rule (int tag); 53 static struct output_rule *new_output_rule (int tag); 472 new_expr (int tag) 477 newp->tag = tag; 495 new_input_rule (int tag) 500 newp->tag = tag; 507 new_output_rule (int tag) [all...] |
/external/freetype/src/sfnt/ |
H A D | ttload.c | 51 /* tag :: The searched tag. */ 58 FT_ULong tag ) 69 (FT_Char)( tag >> 24 ), 70 (FT_Char)( tag >> 16 ), 71 (FT_Char)( tag >> 8 ), 72 (FT_Char)( tag ) )); 81 if ( entry->Tag == tag ) 116 /* tag :: The searched tag [all...] |
/external/protobuf/java/src/main/java/com/google/protobuf/ |
H A D | AbstractMessage.java | 255 final int tag = input.readTag(); 256 if (tag == 0) { 261 this, tag)) { 262 // end group tag 274 * @param tag The tag, which should have already been read. 275 * @return {@code true} unless the tag is an end-group tag. 283 final int tag) throws IOException { 287 tag 278 mergeFieldFrom( final CodedInputStream input, final UnknownFieldSet.Builder unknownFields, final ExtensionRegistryLite extensionRegistry, final Message.Builder builder, final int tag) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
/external/dropbear/libtomcrypt/demos/ |
H A D | tv_gen.c | 398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 403 "are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous\n" 428 len = sizeof(tag); 429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) { 439 fprintf(out, "%02X", tag[z]); 445 key[z] = tag[z % len]; 458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 463 "are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag o 522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local [all...] |
/external/e2fsprogs/lib/blkid/ |
H A D | read.c | 238 * Extract a tag of the form NAME="value" from the line. 278 * Extract a tag of the form <NAME>value</NAME> from the line. 298 * Extract a tag from the line. 300 * Return 1 if a valid tag was found. 301 * Return 0 if no tag found. 327 DBG(DEBUG_READ, printf(" tag: %s=\"%s\"\n", name, value)); 464 blkid_tag tag = list_entry(p, struct blkid_struct_tag, bit_tags); local 465 if (tag) 466 printf(" tag: %s=\"%s\"\n", tag [all...] |
H A D | save.c | 46 blkid_tag tag = list_entry(p, struct blkid_struct_tag, bit_tags); local 47 fprintf(file, " %s=\"%s\"", tag->bit_name,tag->bit_val);
|
/external/markdown/markdown/ |
H A D | preprocessors.py | 86 tag = p % left_tag 87 i = block.rfind(tag) 89 return tag.lstrip("<").rstrip(">"), i + len(p)-2 + len(left_tag) 105 def _is_oneliner(self, tag): 106 return (tag in ['hr', 'hr/']) 157 # if is block level tag and is not complete 177 # if find closing tag
|
/external/proguard/src/proguard/classfile/io/ |
H A D | LibraryClassReader.java | 102 int tag = constant.getTag(); 103 if (tag == ClassConstants.CONSTANT_Class || 104 tag == ClassConstants.CONSTANT_Utf8) 111 if (tag == ClassConstants.CONSTANT_Long || 112 tag == ClassConstants.CONSTANT_Double)
|
/external/srec/srec/EventLog/src/ |
H A D | riff.c | 27 char tag[4]; member in struct:ChunkContext_t 332 char form[4], tag[4]; local 371 if (fread(tag, 1, 4, f) != 4) break; 372 if (!strncmp(tag, c->tag, 4)) 386 if (fread(tag, 1, 4, f) != 4) break; 391 if (!strncmp(tag, c->tag, 4)) 428 if (fread(tag, 1, 4, f) != 4) break; 429 if (!strncmp(tag, [all...] |
/external/v8/src/ |
H A D | profile-generator.h | 97 INLINE(CodeEntry(Logger::LogEventsAndTags tag, 114 INLINE(static bool is_js_function_tag(Logger::LogEventsAndTags tag)); 310 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, 312 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, const char* name); 313 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, 315 CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, int args_count); 397 INLINE(CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, argument 401 return profiles_->NewCodeEntry(tag, name, resource_name, line_number); 404 INLINE(CodeEntry* NewCodeEntry(Logger::LogEventsAndTags tag, argument 406 return profiles_->NewCodeEntry(tag, nam 409 NewCodeEntry(Logger::LogEventsAndTags tag, const char* name_prefix, String* name) argument 415 NewCodeEntry(Logger::LogEventsAndTags tag, int args_count) argument [all...] |
/external/webkit/Source/JavaScriptCore/jit/ |
H A D | JITStubCall.h | 124 m_jit->poke(JIT::Imm32(value.tag()), m_stackIndex + 1); 129 void addArgument(JIT::RegisterID tag, JIT::RegisterID payload) argument 132 m_jit->poke(tag, m_stackIndex + 1); 148 void getArgument(size_t argumentNumber, JIT::RegisterID tag, JIT::RegisterID payload) argument 152 m_jit->peek(tag, stackIndex + 1);
|
/external/chromium/third_party/libevent/ |
H A D | event_rpcgen.py | 34 print >>sys.stderr, ( 'Entry "%s" duplicates tag number ' 58 """Prints the tag definitions for a structure.""" 212 ' ev_uint32_t tag;\n' 214 ' if (evtag_peek(evbuf, &tag) == -1)\n' 216 ' switch (tag) {\n' 265 ' ev_uint32_t tag;\n' 270 ' if (evtag_unmarshal(evbuf, &tag, tmp) == -1' 271 ' || tag != need_tag)\n' 287 'evtag_marshal_%(name)s(struct evbuffer *evbuf, ev_uint32_t tag, ' 294 ' evtag_marshal(evbuf, tag, EVBUFFER_DAT [all...] |
/external/chromium/chrome/browser/ |
H A D | keychain_mock_mac.h | 126 // Sets the data and length of |tag| in the item-th test item. 127 void SetTestDataBytes(int item, UInt32 tag, const void* data, size_t length); 128 // Sets the data and length of |tag| in the item-th test item based on 132 void SetTestDataString(int item, UInt32 tag, const char* value); 147 // Returns the address of the attribute in attribute_list with tag |tag|. 149 const SecKeychainAttributeList& attribute_list, UInt32 tag);
|
/external/chromium/net/tools/testserver/ |
H A D | chromiumsync.py | 49 # Well-known server tag of the top level "Google Chrome" folder. 161 tag: A known-to-the-client value that uniquely identifies a server-created 164 parent_tag: The tag of the permanent item's parent. If ROOT_ID, indicates 165 a top-level item. Otherwise, this must be the tag value of some other 172 def __init__(self, tag, name, parent_tag, sync_type): 173 self.tag = tag 308 def _ServerTagToId(self, tag): 309 """Determine the server ID from a server-unique tag. 315 tag [all...] |