/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.c | 387 static void hostapd_config_free_wep(struct hostapd_wep_keys *keys) argument 391 bin_clear_free(keys->key[i], keys->len[i]); 392 keys->key[i] = NULL; 868 /* individual keys are not use; can use key idx0 for 869 * broadcast keys */
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_internal.c | 312 struct tls_keys *keys) 316 return tlsv1_client_get_keys(conn->client, keys); 320 return tlsv1_server_get_keys(conn->server, keys); 311 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 297 * @label: Label string for deriving the keys, e.g., "client EAP encryption" 311 struct tls_keys keys; local 330 if (tls_connection_get_keys(data->ssl_ctx, data->conn, &keys)) 333 if (keys.client_random == NULL || keys.server_random == NULL || 334 keys.master_key == NULL) 337 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 340 os_memcpy(rnd, keys.client_random, keys 377 struct tls_keys keys; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 686 * @keys: Structure of key/random data (filled on success) 689 int tlsv1_client_get_keys(struct tlsv1_client *conn, struct tls_keys *keys) argument 691 os_memset(keys, 0, sizeof(*keys)); 695 keys->client_random = conn->client_random; 696 keys->client_random_len = TLS_RANDOM_LEN; 699 keys->server_random = conn->server_random; 700 keys->server_random_len = TLS_RANDOM_LEN; 701 keys->master_key = conn->master_secret; 702 keys [all...] |
H A D | tlsv1_server.c | 573 * @keys: Structure of key/random data (filled on success) 576 int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument 578 os_memset(keys, 0, sizeof(*keys)); 582 keys->client_random = conn->client_random; 583 keys->client_random_len = TLS_RANDOM_LEN; 586 keys->server_random = conn->server_random; 587 keys->server_random_len = TLS_RANDOM_LEN; 588 keys->master_key = conn->master_secret; 589 keys [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.c | 387 static void hostapd_config_free_wep(struct hostapd_wep_keys *keys) argument 391 bin_clear_free(keys->key[i], keys->len[i]); 392 keys->key[i] = NULL; 868 /* individual keys are not use; can use key idx0 for 869 * broadcast keys */
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_internal.c | 312 struct tls_keys *keys) 316 return tlsv1_client_get_keys(conn->client, keys); 320 return tlsv1_server_get_keys(conn->server, keys); 311 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 297 * @label: Label string for deriving the keys, e.g., "client EAP encryption" 311 struct tls_keys keys; local 330 if (tls_connection_get_keys(data->ssl_ctx, data->conn, &keys)) 333 if (keys.client_random == NULL || keys.server_random == NULL || 334 keys.master_key == NULL) 337 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 340 os_memcpy(rnd, keys.client_random, keys 377 struct tls_keys keys; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 686 * @keys: Structure of key/random data (filled on success) 689 int tlsv1_client_get_keys(struct tlsv1_client *conn, struct tls_keys *keys) argument 691 os_memset(keys, 0, sizeof(*keys)); 695 keys->client_random = conn->client_random; 696 keys->client_random_len = TLS_RANDOM_LEN; 699 keys->server_random = conn->server_random; 700 keys->server_random_len = TLS_RANDOM_LEN; 701 keys->master_key = conn->master_secret; 702 keys [all...] |
H A D | tlsv1_server.c | 573 * @keys: Structure of key/random data (filled on success) 576 int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument 578 os_memset(keys, 0, sizeof(*keys)); 582 keys->client_random = conn->client_random; 583 keys->client_random_len = TLS_RANDOM_LEN; 586 keys->server_random = conn->server_random; 587 keys->server_random_len = TLS_RANDOM_LEN; 588 keys->master_key = conn->master_secret; 589 keys [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.p2.garbagecollector_1.0.100.v20100503.jar | ... .MarkSet[] aProfileMarkSets
int i
java.util.Collection keys
protected boolean getBooleanPreference (java.lang.String, boolean) String ... |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 114 private IgnoresCaseHashtable keys = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi 234 Enumeration e = certs.keys(); 240 e = keys.keys(); 250 return tab.keys(); 256 return (certs.get(alias) != null || keys.get(alias) != null); 267 Key k = (Key)keys.remove(alias); 326 Enumeration k = certs.keys(); 340 k = keyCerts.keys(); 413 Enumeration e = chainCerts.keys(); 1700 private Hashtable keys = new Hashtable(); field in class:PKCS12KeyStoreSpi.IgnoresCaseHashtable 1715 public Enumeration keys() method in class:PKCS12KeyStoreSpi.IgnoresCaseHashtable [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | RFC3280CertPathUtilities.java | 429 * @return A <code>Set</code> with all keys of possible CRL issuer 569 Set keys) 573 for (Iterator it = keys.iterator(); it.hasNext();) 1776 Set keys = RFC3280CertPathUtilities.processCRLF(crl, cert, defaultCRLSignCert, defaultCRLSignKey, 1779 PublicKey key = RFC3280CertPathUtilities.processCRLG(crl, keys); 567 processCRLG( X509CRL crl, Set keys) argument
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/ |
H A D | key_sequence.js | 6 * @fileoverview A JavaScript class that represents a sequence of keys entered 17 * A class to represent a sequence of keys entered by a user or affiliated with 22 * - Two discrete keys (at most): [Down arrow], [A, A] or [O, W] etc. Can 28 * - Two discrete keys (at most): [Down arrow], [A, A] or [O, W] etc. 30 * - Whether or not the ChromeVox modifier key was active when the keys were 32 * - Whether or not a prefix key was entered before the discrete keys. 69 * Stores the key codes and modifiers for the keys in the key sequence. 77 * pressed by itself, the keys object will have: 82 this.keys = { 124 * is entering two shortcut keys [all...] |
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_blocking_page.cc | 661 const char* keys[5] = { local 666 strings->SetString(keys[i], extra_info[i]); 669 strings->SetString(keys[i], std::string());
|
/external/chromium_org/chrome/browser/ui/omnibox/ |
H A D | omnibox_view_browsertest.cc | 179 void SendKeySequence(const ui::KeyboardCode* keys) { argument 180 for (; *keys != ui::VKEY_UNKNOWN; ++keys) 181 ASSERT_NO_FATAL_FAILURE(SendKey(*keys, 0));
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 166 // Up to the SP to implement this lookup of keys. Possible ideas are: 174 // Up to the SP to implement this lookup of keys. Possible ideas are: 777 // we always want the keys to be Cased-Like-This and arh() 850 // Urlencode both keys and values 851 $keys = OAuthUtil::urlencode_rfc3986(array_keys($params)); variable 853 $params = array_combine($keys, $values);
|
/external/chromium_org/chrome/test/chromedriver/ |
H A D | util.cc | 38 base::string16 keys; local 42 return Status(kUnknownError, "keys should be a string"); 49 keys.append(keys_list_part); 51 *dest = keys; 62 base::string16 keys; local 63 Status status = FlattenStringArray(key_list, &keys); 69 keys, release_modifiers, &sticky_modifiers_tmp, &events);
|
/external/chromium_org/content/child/indexed_db/ |
H A D | indexed_db_dispatcher.cc | 676 const std::vector<IndexedDBKey>& keys = p.keys; local 690 cur_iter->second->SetPrefetchData(keys, primary_keys, values, blob_infos);
|
/external/chromium_org/content/renderer/service_worker/ |
H A D | service_worker_cache_storage_dispatcher.cc | 323 const std::vector<base::string16>& keys) { 325 blink::WebVector<blink::WebString> webKeys(keys.size()); 326 for (size_t i = 0; i < keys.size(); ++i) 327 webKeys[i] = keys[i]; 321 OnCacheStorageKeysSuccess( int request_id, const std::vector<base::string16>& keys) argument
|
/external/chromium_org/content/shell/browser/ |
H A D | shell_views.cc | 300 static const ui::KeyboardCode keys[] = { ui::VKEY_F5, local 303 for (size_t i = 0; i < arraysize(keys); ++i) { 305 ui::Accelerator(keys[i], ui::EF_NONE),
|
/external/chromium_org/media/cdm/ |
H A D | aes_decryptor.cc | 25 // Keeps track of the session IDs and DecryptionKeys. The keys are ordered by 292 KeyIdAndKeyPairs keys; local 294 if (!ExtractKeysFromJWKSet(key_string, &keys, &session_type)) { 301 if (keys.empty()) { 303 INVALID_ACCESS_ERROR, 0, "response does not contain any keys."); 307 for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) { 514 // Remove all keys associated with |web_session_id|. Since the data is
|
/external/chromium_org/native_client_sdk/src/libraries/ppapi_simple/ |
H A D | ps_instance.cc | 516 pp::VarArray keys = dictionary.GetKeys(); local 517 if (keys.GetLength() == 1) { 518 pp::Var key = keys.Get(0);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_lib.c | 1140 /* Temporary RSA keys are never used. */ 1144 /* Temporary RSA keys are never used. */ 1453 /* Ignore the callback; temporary RSA keys are never used. */ 1484 /* Temporary RSA keys are never used. */ 1571 unsigned char *keys = parg; local 1572 if (!keys) 1581 memcpy(ctx->tlsext_tick_key_name, keys, 16); 1582 memcpy(ctx->tlsext_tick_hmac_key, keys + 16, 16); 1583 memcpy(ctx->tlsext_tick_aes_key, keys + 32, 16); 1587 memcpy(keys, ct [all...] |
/external/chromium_org/third_party/libaddressinput/chromium/ |
H A D | input_suggester.cc | 89 // their keys. The |regions_match_name| parameter contains the regions that 113 if (parents->keys.empty() && parents->names.empty()) 142 (parents && !parents->keys.empty() && key_region && 143 parents->keys.find(&key_region->parent()) != parents->keys.end()); 163 regions->keys.insert(key_region); 172 regions->keys.insert(key_region); 203 // input by keys and names. 205 std::set<const RegionData*> keys; member in struct:autofill::__anon12532::AddressSuggestions::RegionsMatchInput 335 field_tries.keys 357 Trie<const RegionData*> keys; member in struct:autofill::InputSuggester::SubRegionData::FieldTries [all...] |