/external/srec/tools/parseStringTest/ |
H A D | parseStringTest.c | 82 LCHAR* keys[MAX_KEYS]; /* array of pointers to strings */ local 87 rc = result->getKeyList(result, (LCHAR**) & keys, &size); /* get the key list */ 93 if ((rc = result->getValue(result, keys[i], value, &len)) == ESR_SUCCESS) 94 pfprintf(fout, "{%s : %s}\n", keys[i], value);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) argument 350 work = RORc(right, 4) ^ *keys++; 355 work = right ^ *keys++; 361 work = RORc(leftt, 4) ^ *keys++; 366 work = leftt ^ *keys++;
|
H A D | tls_none.c | 82 struct tls_keys *keys) 81 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 36 struct ikev2_keys keys; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 103 struct tls_keys keys; local 114 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 117 if (keys.client_random == NULL || keys.server_random == NULL || 118 keys.master_key == NULL) 121 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 124 os_memcpy(rnd, keys.client_random, keys.client_random_len); 125 os_memcpy(rnd + keys [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) argument 350 work = RORc(right, 4) ^ *keys++; 355 work = right ^ *keys++; 361 work = RORc(leftt, 4) ^ *keys++; 366 work = leftt ^ *keys++;
|
H A D | tls_none.c | 82 struct tls_keys *keys) 81 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 36 struct ikev2_keys keys; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls_common.c | 103 struct tls_keys keys; local 114 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 117 if (keys.client_random == NULL || keys.server_random == NULL || 118 keys.master_key == NULL) 121 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 124 os_memcpy(rnd, keys.client_random, keys.client_random_len); 125 os_memcpy(rnd + keys [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) argument 350 work = RORc(right, 4) ^ *keys++; 355 work = right ^ *keys++; 361 work = RORc(leftt, 4) ^ *keys++; 366 work = leftt ^ *keys++;
|
H A D | tls_none.c | 82 struct tls_keys *keys) 81 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 36 struct ikev2_keys keys; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 103 struct tls_keys keys; local 114 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 117 if (keys.client_random == NULL || keys.server_random == NULL || 118 keys.master_key == NULL) 121 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 124 os_memcpy(rnd, keys.client_random, keys.client_random_len); 125 os_memcpy(rnd + keys [all...] |
/external/bison/src/ |
H A D | getargs.c | 86 /** Decode an option's set of keys. 89 * \param keys array of valid subarguments. 102 const char * const keys[], const int values[], 111 int value = XARGMATCH (option, args + no, keys, values); 138 * \arg FlagName_args the list of keys. 101 flags_argmatch(const char *option, const char * const keys[], const int values[], int all, int *flags, char *args) argument
|
/external/chromium_org/chrome/browser/predictors/ |
H A D | resource_prefetch_predictor_tables.cc | 352 const std::vector<std::string>& keys) { 355 for (std::vector<std::string>::const_iterator it = keys.begin(); 356 it != keys.end(); ++it) { 350 DeleteDataHelper( PrefetchKeyType key_type, const std::vector<std::string>& keys) argument
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/background/keymaps/ |
H A D | key_map.js | 104 * @return {Array.<cvox.KeySequence>} Array of all keys. 106 cvox.KeyMap.prototype.keys = function() { 223 * @return {!Array.<cvox.KeySequence>} The keys associated with that command, 251 var keys = inputMap.keys(); 253 for (var i = 0; i < keys.length; ++i) { 254 var key = keys[i]; 429 * Resets the default modifier keys. 438 * Builds the map of commands to keys.
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
H A D | autofill_helper.cc | 178 void AddKeys(int profile, const std::set<AutofillKey>& keys) { argument 180 for (std::set<AutofillKey>::const_iterator i = keys.begin(); 181 i != keys.end(); 217 std::set<AutofillEntry> keys = GetAllKeys(profile); local 218 for (std::set<AutofillEntry>::const_iterator it = keys.begin(); 219 it != keys.end(); ++it) { 270 return "Waiting for matching autofill keys";
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_client.cc | 205 // Add device state keys. 300 const std::vector<std::string>& keys) { 301 state_keys_to_upload_ = keys; 299 SetStateKeysToUpload( const std::vector<std::string>& keys) argument
|
/external/chromium_org/content/browser/indexed_db/ |
H A D | indexed_db_callbacks.cc | 434 const std::vector<IndexedDBKey>& keys, 437 DCHECK_EQ(keys.size(), primary_keys.size()); 438 DCHECK_EQ(keys.size(), values->size()); 451 for (size_t i = 0; i < keys.size(); ++i) { 452 msgKeys.push_back(keys[i]); 461 params->keys = msgKeys; 433 OnSuccessWithPrefetch( const std::vector<IndexedDBKey>& keys, const std::vector<IndexedDBKey>& primary_keys, std::vector<IndexedDBValue>* values) argument
|
H A D | indexed_db_leveldb_coding_unittest.cc | 798 std::vector<IndexedDBKey> keys; local 800 keys.push_back(IndexedDBKey(-10, WebIDBKeyTypeNumber)); 801 keys.push_back(IndexedDBKey(0, WebIDBKeyTypeNumber)); 802 keys.push_back(IndexedDBKey(3.14, WebIDBKeyTypeNumber)); 804 keys.push_back(IndexedDBKey(0, WebIDBKeyTypeDate)); 805 keys.push_back(IndexedDBKey(100, WebIDBKeyTypeDate)); 806 keys.push_back(IndexedDBKey(100000, WebIDBKeyTypeDate)); 808 keys.push_back(IndexedDBKey(ASCIIToUTF16(""))); 809 keys.push_back(IndexedDBKey(ASCIIToUTF16("a"))); 810 keys 878 std::vector<std::string> keys; local [all...] |
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/ |
H A D | jspipe_test.cc | 175 // Verify we have a dictionary with 3 keys 177 PP_Var keys = dict_iface->GetKeys(message); local 178 ASSERT_EQ(PP_VARTYPE_ARRAY, keys.type); 179 ASSERT_EQ(3, array_iface->GetLength(keys)); 180 var_iface->Release(keys); 182 // Verify the keys
|
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl_unittest.cc | 66 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 67 keys.Add()->assign(encryption_key); 68 return keys; 520 // Receive an old nigori with old encryption keys and encrypted types. We should 539 // Set up the current encryption state (containing both keys and encrypt 564 // Has an old set of keys, and no encrypted types. 584 // The cryptographer should be able to decrypt both sets of keys and still 610 // Passing no keys should do nothing. 622 // Build a set of keystore keys. 626 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 1993 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2047 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2080 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2126 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2166 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2221 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2265 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
H A D | IDBObjectStore.cpp | 194 exceptionState.throwDOMException(DataError, "The object store uses in-line keys and the key parameter was provided."); 205 exceptionState.throwDOMException(DataError, "The effective object store of this cursor uses in-line keys and evaluating the key path of the value parameter results in a different value than the cursor's effective key."); 211 exceptionState.throwDOMException(DataError, "The object store uses out-of-line keys and has no key generator and the key parameter was not provided."); 250 IndexKeys keys; local 251 generateIndexKeysForValue(scriptState->isolate(), it->value, clone, &keys); 253 indexKeys.append(keys); 332 // This class creates the index keys for a given index by extracting
|
/external/chromium_org/third_party/WebKit/Source/wtf/ |
H A D | HashMap.h | 44 // For pointer keys this means that null pointers are not allowed unless you supply custom key traits. 101 // iterators iterate over pairs of keys and values 107 HashMapKeysProxy& keys() { return static_cast<HashMapKeysProxy&>(*this); } function in class:WTF::HashMap 108 const HashMapKeysProxy& keys() const { return static_cast<const HashMapKeysProxy&>(*this); } function in class:WTF::HashMap 173 return HashMapType::begin().keys(); 178 return HashMapType::end().keys(); 183 return HashMapType::begin().keys(); 188 return HashMapType::end().keys(); 476 iterator it = collection.begin().keys(); 477 iterator end = collection.end().keys(); [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/port/ |
H A D | test.py | 94 def keys(self): member in class:TestList 95 return self.tests.keys()
|