/external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/bin/tests/ |
H A D | bin-farabs.asm | 0 keybuf equ 0040h:001Eh 11 mov ax, seg keybuf 16 mov bx, keybuf 23 jmp keybuf 29 jmp near keybuf 47 jmp far keybuf ; Illegal in NASM ("value referenced by FAR is not relocatable") 51 dw keybuf ; offset part 52 dw seg keybuf ; segment part 1 keybuf equ 0040h:001Eh define
|
/external/openfst/src/include/fst/extensions/far/ |
H A D | create.h | 66 ostringstream keybuf; local 67 keybuf.width(generate_keys); 68 keybuf.fill('0'); 69 keybuf << i + 1; 70 key = keybuf.str();
|
H A D | compile-strings.h | 272 ostringstream keybuf; local 273 keybuf.width(key_size); 274 keybuf.fill('0'); 275 keybuf << n; 278 key = keybuf.str(); 285 key += keybuf.str();
|
/external/qemu/distrib/sdl-1.2.15/src/video/dga/ |
H A D | SDL_dgaevents.c | 98 char keybuf[32]; local 100 if ( XLookupString(&xkey, keybuf, sizeof(keybuf), NULL, &state) ) { 107 keysym.unicode = (Uint8)keybuf[0];
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
H A D | c_test.c | 280 char keybuf[100]; local 289 snprintf(keybuf, sizeof(keybuf), "k%020d", i); 291 leveldb_put(db, woptions, keybuf, strlen(keybuf), valbuf, strlen(valbuf),
|
H A D | db_test.cc | 1761 char keybuf[20]; local 1762 snprintf(keybuf, sizeof(keybuf), "%016d", key); 1769 ASSERT_OK(db->Put(WriteOptions(), Slice(keybuf), Slice(valbuf))); 1772 Status s = db->Get(ReadOptions(), Slice(keybuf), &value);
|
/external/sqlite/android/ |
H A D | sqlite3_android.cpp | 362 char keybuf[1024]; local 363 uint32_t result = ucol_getSortKey(collator, token, -1, (uint8_t*)keybuf, sizeof(keybuf)-1); 364 if (result > sizeof(keybuf)) { 372 base16Encode(base16buf, keybuf, keysize);
|
/external/openssl/crypto/pem/ |
H A D | pvkfmt.c | 738 unsigned char keybuf[20]; local 755 if (!derive_pvk_key(keybuf, p, saltlen, 769 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL)) 779 memset(keybuf + 5, 0, 11); 780 if (!EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, 783 OPENSSL_cleanse(keybuf, 20); 797 OPENSSL_cleanse(keybuf, 20); 902 unsigned char keybuf[20]; local 913 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 917 memset(keybuf [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/fbcon/ |
H A D | SDL_fbevents.c | 996 unsigned char keybuf[BUFSIZ]; local 1002 nread = read(keyboard_fd, keybuf, BUFSIZ); 1004 scancode = keybuf[i] & 0x7F; 1005 if ( keybuf[i] & 0x80 ) {
|
/external/qemu/distrib/sdl-1.2.15/src/video/ipod/ |
H A D | SDL_ipodvideo.c | 446 unsigned char keybuf[128]; local 455 nread = read (kbfd, keybuf, 128); 457 char ascii = iPod_SC_keymap[keybuf[i] & 0x7f]; 459 if (dbgout) fprintf (dbgout, "Key! %02x is %c %s", keybuf[i], ascii, (keybuf[i] & 0x80)? "up" : "down"); 462 ev.type = (keybuf[i] & 0x80)? SDL_KEYUP : SDL_KEYDOWN;
|
/external/qemu/distrib/sdl-1.2.15/src/video/ps2gs/ |
H A D | SDL_gsevents.c | 762 unsigned char keybuf[BUFSIZ]; local 768 nread = read(keyboard_fd, keybuf, BUFSIZ); 770 scancode = keybuf[i] & 0x7F; 771 if ( keybuf[i] & 0x80 ) {
|
/external/qemu/distrib/sdl-1.2.15/src/video/windx5/ |
H A D | SDL_dx5events.c | 279 static void handle_keyboard(const int numevents, DIDEVICEOBJECTDATA *keybuf) argument 286 if ( keybuf[i].dwData & 0x80 ) { 288 TranslateKey(keybuf[i].dwOfs, &keysym, 1)); 291 TranslateKey(keybuf[i].dwOfs, &keysym, 0));
|
/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
H A D | SDL_x11events.c | 588 char keybuf[32]; local 589 char *keydata = keybuf; 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 717 if (keydata != NULL && keybuf != keydata) { 728 char keybuf[32]; local 735 keybuf, sizeof(keybuf), 743 keysym.unicode = (Uint8)keybuf[0]; 1252 char keybuf[32]; local 1299 if ( XLookupString(&xkey, keybuf, sizeo [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 632 u8 *keybuf, *pos; local 647 keybuf = os_malloc(keybuf_len); 648 if (keybuf == NULL) 652 data, data_len, keybuf, keybuf_len)) { 653 os_free(keybuf); 657 pos = keybuf; 714 os_free(keybuf);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 632 u8 *keybuf, *pos; local 647 keybuf = os_malloc(keybuf_len); 648 if (keybuf == NULL) 652 data, data_len, keybuf, keybuf_len)) { 653 os_free(keybuf); 657 pos = keybuf; 714 os_free(keybuf);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 632 u8 *keybuf, *pos; local 647 keybuf = os_malloc(keybuf_len); 648 if (keybuf == NULL) 652 data, data_len, keybuf, keybuf_len)) { 653 os_free(keybuf); 657 pos = keybuf; 714 os_free(keybuf);
|
/external/mdnsresponder/mDNSCore/ |
H A D | DNSDigest.c | 1322 mDNSu8 keybuf[1024]; local 1323 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); 1325 DNSDigest_ConstructHMACKey(info, keybuf, (mDNSu32)keylen);
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
H A D | fpdf_parser_encrypt.cpp | 380 FX_BYTE keybuf[32];
local 382 key = keybuf;
|
/external/qemu/block/ |
H A D | qcow2.c | 257 uint8_t keybuf[16]; local 260 memset(keybuf, 0, 16); 267 keybuf[i] = key[i]; 271 if (AES_set_encrypt_key(keybuf, 128, &s->aes_encrypt_key) != 0) 273 if (AES_set_decrypt_key(keybuf, 128, &s->aes_decrypt_key) != 0)
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 424 u8 keybuf[32]; local 427 if (key_len > sizeof(keybuf)) 439 if (pad_len && key_len < sizeof(keybuf)) { 440 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 441 os_memset(keybuf + key_len, 0, pad_len); 442 keybuf[key_len] = 0xdd; 444 key = keybuf;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 424 u8 keybuf[32]; local 427 if (key_len > sizeof(keybuf)) 439 if (pad_len && key_len < sizeof(keybuf)) { 440 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 441 os_memset(keybuf + key_len, 0, pad_len); 442 keybuf[key_len] = 0xdd; 444 key = keybuf;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 424 u8 keybuf[32]; local 427 if (key_len > sizeof(keybuf)) 439 if (pad_len && key_len < sizeof(keybuf)) { 440 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 441 os_memset(keybuf + key_len, 0, pad_len); 442 keybuf[key_len] = 0xdd; 444 key = keybuf;
|