/external/chromium_org/third_party/libsrtp/srtp/crypto/kernel/ |
H A D | key.c | 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { argument 67 *new_key = original;
|
/external/srtp/crypto/kernel/ |
H A D | key.c | 64 key_limit_clone(key_limit_t original, key_limit_t *new_key) { argument 67 *new_key = original;
|
/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
H A D | manager_password_service.cc | 145 std::string new_key; local 149 kEncryptedPassword, &new_key); 163 new_key,
|
/external/chromium_org/v8/src/ |
H A D | splay-tree-inl.h | 161 const Key& new_key) { 166 Splay(new_key); 167 int cmp = Config::Compare(new_key, root_->key_); 173 node_to_move->key_ = new_key; 160 Move(const Key& old_key, const Key& new_key) argument
|
H A D | hydrogen.cc | 8438 HValue* new_key = loop.BeginBody( local 8440 HValue* key = AddUncasted<HAdd>(new_key, graph()->GetConstant1()); 8445 elements, new_key, element, kind);
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | attestation_policy_observer_unittest.cc | 134 bool new_key = (mock_options & MOCK_NEW_KEY); local 135 if (new_key || !key_uploaded) { 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 147 if (new_key) {
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
H A D | session_manager_operation.cc | 115 scoped_refptr<PublicKey> new_key) { 117 public_key_ = new_key; 114 StorePublicKey(const base::Closure& callback, scoped_refptr<PublicKey> new_key) argument
|
/external/qemu/qobject/ |
H A D | qdict.c | 484 char *new_key; local 493 new_key = NULL; 497 new_key = g_strdup_printf("%s.%s", prefix, entry->key); 504 new_key ? new_key : entry->key); 509 qdict_put_obj(target, new_key, value); 513 g_free(new_key);
|
/external/chromium_org/chromeos/login/auth/ |
H A D | cryptohome_authenticator.cc | 321 scoped_ptr<Key> new_key = local 326 new_key->GetSecret(), 333 new_key->GetSecret(),
|
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl_unittest.cc | 1546 const char kNewKey[] = "new_key"; 1581 KeyParams new_key = {"localhost", "dummy", kNewKey}; local 1583 new_cryptographer.AddKey(new_key); 1653 const char kNewKey[] = "new_key"; 1688 KeyParams new_key = {"localhost", "dummy", kNewKey}; local 1690 new_cryptographer.AddKey(new_key); 1761 const char kNewKey[] = "new_key"; 1783 KeyParams new_key = {"localhost", "dummy", kNewKey}; local 1785 new_cryptographer.AddKey(new_key);
|
/external/chromium_org/chromeos/dbus/ |
H A D | fake_cryptohome_client.cc | 127 const std::string& new_key, 124 AsyncAddKey( const std::string& username, const std::string& key, const std::string& new_key, const AsyncMethodCallback& callback) argument
|
/external/qemu/distrib/mini-glib/src/ |
H A D | glib-mini.c | 622 gpointer new_key, 627 entry->key = new_key; 619 _g_hash_table_insert_index(GHashTable* hash_table, guint key_index, guint new_key_hash, gpointer new_key, gpointer new_value) argument
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay_i.h | 236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay_i.h | 236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay_i.h | 236 struct data_key *new_key; member in struct:ieee802_1x_mka_participant
|
/external/chromium_org/third_party/libpng/ |
H A D | pngwutil.c | 1224 * The new_key is allocated to hold the corrected keyword and must be freed 1229 png_check_keyword(png_structp png_ptr, png_charp key, png_charpp new_key) argument 1238 *new_key = NULL; 1248 *new_key = (png_charp)png_malloc_warn(png_ptr, (png_uint_32)(key_len + 2)); 1249 if (*new_key == NULL) 1256 for (kp = key, dp = *new_key; *kp != '\0'; kp++, dp++) 1280 kp = *new_key + key_len - 1; 1293 kp = *new_key; 1308 for (kflag = 0, dp = *new_key; *kp != '\0'; kp++) 1332 png_free(png_ptr, *new_key); 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 249 sctp_key_t *new_key; local 251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 253 if (new_key == NULL) { 257 new_key->keylen = keylen; 258 return (new_key); 321 sctp_key_t *new_key; local 323 new_key = sctp_alloc_key(keylen); 324 if (new_key == NULL) { 328 SCTP_READ_RANDOM(new_key 336 sctp_key_t *new_key; local 408 sctp_key_t *new_key; local 463 sctp_sharedkey_t *new_key; local 1441 sctp_key_t *new_key; local 1981 sctp_key_t *new_key; local [all...] |
H A D | sctp_pcb.c | 7103 sctp_key_t *new_key; local 7688 new_key = sctp_alloc_key(keylen); 7689 if (new_key != NULL) { 7693 bcopy(p_random, new_key->key, keylen); 7697 bcopy(chunks, new_key->key + keylen, 7703 bcopy(hmacs, new_key->key + keylen, 7712 stcb->asoc.authinfo.peer_random = new_key;
|
/external/libpng/ |
H A D | pngwutil.c | 675 * The 'new_key' buffer must be 80 characters in size (for the keyword plus a 680 png_check_keyword(png_structrp png_ptr, png_const_charp key, png_bytep new_key) argument 691 *new_key = 0; 700 *new_key++ = ch, ++key_len, space = 0; 707 *new_key++ = 32, ++key_len, space = 1; 720 --key_len, --new_key; 726 *new_key = 0; 1582 png_byte new_key[80]; local 1586 key_len = png_check_keyword(png_ptr, key, new_key); 1609 png_write_chunk_data(png_ptr, new_key, key_le 1625 png_byte new_key[81]; local 1678 png_byte new_key[82]; local [all...] |
/external/qemu/distrib/libpng-1.2.46/ |
H A D | pngwutil.c | 1224 * The new_key is allocated to hold the corrected keyword and must be freed 1229 png_check_keyword(png_structp png_ptr, png_charp key, png_charpp new_key) argument 1238 *new_key = NULL; 1248 *new_key = (png_charp)png_malloc_warn(png_ptr, (png_uint_32)(key_len + 2)); 1249 if (*new_key == NULL) 1256 for (kp = key, dp = *new_key; *kp != '\0'; kp++, dp++) 1280 kp = *new_key + key_len - 1; 1293 kp = *new_key; 1308 for (kflag = 0, dp = *new_key; *kp != '\0'; kp++) 1332 png_free(png_ptr, *new_key); 1358 png_charp new_key; local 1400 png_charp new_key; local 1460 png_charp new_key = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 1232 char *new_key; local 1261 new_key = os_strchr(new_encr, ' '); 1262 if (new_key == NULL) 1264 *new_key++ = '\0'; 1270 ap.key_hex = new_key; 1385 char *new_key; local 1408 new_key = os_strchr(new_encr, ' '); 1409 if (new_key == NULL) 1411 *new_key++ = '\0'; 1417 ap.key_hex = new_key; [all...] |