Searched defs:keys (Results 251 - 275 of 471) sorted by relevance

<<111213141516171819

/external/wpa_supplicant_8/src/ap/
H A Dap_config.c387 static void hostapd_config_free_wep(struct hostapd_wep_keys *keys) argument
391 bin_clear_free(keys->key[i], keys->len[i]);
392 keys->key[i] = NULL;
868 /* individual keys are not use; can use key idx0 for
869 * broadcast keys */
/external/wpa_supplicant_8/src/crypto/
H A Dtls_internal.c312 struct tls_keys *keys)
316 return tlsv1_client_get_keys(conn->client, keys);
320 return tlsv1_server_get_keys(conn->server, keys);
311 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_tls_common.c297 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
311 struct tls_keys keys; local
330 if (tls_connection_get_keys(data->ssl_ctx, data->conn, &keys))
333 if (keys.client_random == NULL || keys.server_random == NULL ||
334 keys.master_key == NULL)
337 rnd = os_malloc(keys.client_random_len + keys.server_random_len);
340 os_memcpy(rnd, keys.client_random, keys
377 struct tls_keys keys; local
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c686 * @keys: Structure of key/random data (filled on success)
689 int tlsv1_client_get_keys(struct tlsv1_client *conn, struct tls_keys *keys) argument
691 os_memset(keys, 0, sizeof(*keys));
695 keys->client_random = conn->client_random;
696 keys->client_random_len = TLS_RANDOM_LEN;
699 keys->server_random = conn->server_random;
700 keys->server_random_len = TLS_RANDOM_LEN;
701 keys->master_key = conn->master_secret;
702 keys
[all...]
H A Dtlsv1_server.c573 * @keys: Structure of key/random data (filled on success)
576 int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument
578 os_memset(keys, 0, sizeof(*keys));
582 keys->client_random = conn->client_random;
583 keys->client_random_len = TLS_RANDOM_LEN;
586 keys->server_random = conn->server_random;
587 keys->server_random_len = TLS_RANDOM_LEN;
588 keys->master_key = conn->master_secret;
589 keys
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_config.c387 static void hostapd_config_free_wep(struct hostapd_wep_keys *keys) argument
391 bin_clear_free(keys->key[i], keys->len[i]);
392 keys->key[i] = NULL;
868 /* individual keys are not use; can use key idx0 for
869 * broadcast keys */
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_internal.c312 struct tls_keys *keys)
316 return tlsv1_client_get_keys(conn->client, keys);
320 return tlsv1_server_get_keys(conn->server, keys);
311 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_tls_common.c297 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
311 struct tls_keys keys; local
330 if (tls_connection_get_keys(data->ssl_ctx, data->conn, &keys))
333 if (keys.client_random == NULL || keys.server_random == NULL ||
334 keys.master_key == NULL)
337 rnd = os_malloc(keys.client_random_len + keys.server_random_len);
340 os_memcpy(rnd, keys.client_random, keys
377 struct tls_keys keys; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c686 * @keys: Structure of key/random data (filled on success)
689 int tlsv1_client_get_keys(struct tlsv1_client *conn, struct tls_keys *keys) argument
691 os_memset(keys, 0, sizeof(*keys));
695 keys->client_random = conn->client_random;
696 keys->client_random_len = TLS_RANDOM_LEN;
699 keys->server_random = conn->server_random;
700 keys->server_random_len = TLS_RANDOM_LEN;
701 keys->master_key = conn->master_secret;
702 keys
[all...]
H A Dtlsv1_server.c573 * @keys: Structure of key/random data (filled on success)
576 int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument
578 os_memset(keys, 0, sizeof(*keys));
582 keys->client_random = conn->client_random;
583 keys->client_random_len = TLS_RANDOM_LEN;
586 keys->server_random = conn->server_random;
587 keys->server_random_len = TLS_RANDOM_LEN;
588 keys->master_key = conn->master_secret;
589 keys
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.equinox.p2.garbagecollector_1.0.100.v20100503.jar ... .MarkSet[] aProfileMarkSets int i java.util.Collection keys protected boolean getBooleanPreference (java.lang.String, boolean) String ...
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
H A DPKCS12KeyStoreSpi.java114 private IgnoresCaseHashtable keys = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi
234 Enumeration e = certs.keys();
240 e = keys.keys();
250 return tab.keys();
256 return (certs.get(alias) != null || keys.get(alias) != null);
267 Key k = (Key)keys.remove(alias);
326 Enumeration k = certs.keys();
340 k = keyCerts.keys();
413 Enumeration e = chainCerts.keys();
1700 private Hashtable keys = new Hashtable(); field in class:PKCS12KeyStoreSpi.IgnoresCaseHashtable
1715 public Enumeration keys() method in class:PKCS12KeyStoreSpi.IgnoresCaseHashtable
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DRFC3280CertPathUtilities.java429 * @return A <code>Set</code> with all keys of possible CRL issuer
569 Set keys)
573 for (Iterator it = keys.iterator(); it.hasNext();)
1776 Set keys = RFC3280CertPathUtilities.processCRLF(crl, cert, defaultCRLSignCert, defaultCRLSignKey,
1779 PublicKey key = RFC3280CertPathUtilities.processCRLG(crl, keys);
567 processCRLG( X509CRL crl, Set keys) argument
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/
H A Dkey_sequence.js6 * @fileoverview A JavaScript class that represents a sequence of keys entered
17 * A class to represent a sequence of keys entered by a user or affiliated with
22 * - Two discrete keys (at most): [Down arrow], [A, A] or [O, W] etc. Can
28 * - Two discrete keys (at most): [Down arrow], [A, A] or [O, W] etc.
30 * - Whether or not the ChromeVox modifier key was active when the keys were
32 * - Whether or not a prefix key was entered before the discrete keys.
69 * Stores the key codes and modifiers for the keys in the key sequence.
77 * pressed by itself, the keys object will have:
82 this.keys = {
124 * is entering two shortcut keys
[all...]
/external/chromium_org/chrome/browser/ssl/
H A Dssl_blocking_page.cc661 const char* keys[5] = { local
666 strings->SetString(keys[i], extra_info[i]);
669 strings->SetString(keys[i], std::string());
/external/chromium_org/chrome/browser/ui/omnibox/
H A Domnibox_view_browsertest.cc179 void SendKeySequence(const ui::KeyboardCode* keys) { argument
180 for (; *keys != ui::VKEY_UNKNOWN; ++keys)
181 ASSERT_NO_FATAL_FAILURE(SendKey(*keys, 0));
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
H A DOAuth.php166 // Up to the SP to implement this lookup of keys. Possible ideas are:
174 // Up to the SP to implement this lookup of keys. Possible ideas are:
777 // we always want the keys to be Cased-Like-This and arh()
850 // Urlencode both keys and values
851 $keys = OAuthUtil::urlencode_rfc3986(array_keys($params)); variable
853 $params = array_combine($keys, $values);
/external/chromium_org/chrome/test/chromedriver/
H A Dutil.cc38 base::string16 keys; local
42 return Status(kUnknownError, "keys should be a string");
49 keys.append(keys_list_part);
51 *dest = keys;
62 base::string16 keys; local
63 Status status = FlattenStringArray(key_list, &keys);
69 keys, release_modifiers, &sticky_modifiers_tmp, &events);
/external/chromium_org/content/child/indexed_db/
H A Dindexed_db_dispatcher.cc676 const std::vector<IndexedDBKey>& keys = p.keys; local
690 cur_iter->second->SetPrefetchData(keys, primary_keys, values, blob_infos);
/external/chromium_org/content/renderer/service_worker/
H A Dservice_worker_cache_storage_dispatcher.cc323 const std::vector<base::string16>& keys) {
325 blink::WebVector<blink::WebString> webKeys(keys.size());
326 for (size_t i = 0; i < keys.size(); ++i)
327 webKeys[i] = keys[i];
321 OnCacheStorageKeysSuccess( int request_id, const std::vector<base::string16>& keys) argument
/external/chromium_org/content/shell/browser/
H A Dshell_views.cc300 static const ui::KeyboardCode keys[] = { ui::VKEY_F5, local
303 for (size_t i = 0; i < arraysize(keys); ++i) {
305 ui::Accelerator(keys[i], ui::EF_NONE),
/external/chromium_org/media/cdm/
H A Daes_decryptor.cc25 // Keeps track of the session IDs and DecryptionKeys. The keys are ordered by
292 KeyIdAndKeyPairs keys; local
294 if (!ExtractKeysFromJWKSet(key_string, &keys, &session_type)) {
301 if (keys.empty()) {
303 INVALID_ACCESS_ERROR, 0, "response does not contain any keys.");
307 for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) {
514 // Remove all keys associated with |web_session_id|. Since the data is
/external/chromium_org/native_client_sdk/src/libraries/ppapi_simple/
H A Dps_instance.cc516 pp::VarArray keys = dictionary.GetKeys(); local
517 if (keys.GetLength() == 1) {
518 pp::Var key = keys.Get(0);
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_lib.c1140 /* Temporary RSA keys are never used. */
1144 /* Temporary RSA keys are never used. */
1453 /* Ignore the callback; temporary RSA keys are never used. */
1484 /* Temporary RSA keys are never used. */
1571 unsigned char *keys = parg; local
1572 if (!keys)
1581 memcpy(ctx->tlsext_tick_key_name, keys, 16);
1582 memcpy(ctx->tlsext_tick_hmac_key, keys + 16, 16);
1583 memcpy(ctx->tlsext_tick_aes_key, keys + 32, 16);
1587 memcpy(keys, ct
[all...]
/external/chromium_org/third_party/libaddressinput/chromium/
H A Dinput_suggester.cc89 // their keys. The |regions_match_name| parameter contains the regions that
113 if (parents->keys.empty() && parents->names.empty())
142 (parents && !parents->keys.empty() && key_region &&
143 parents->keys.find(&key_region->parent()) != parents->keys.end());
163 regions->keys.insert(key_region);
172 regions->keys.insert(key_region);
203 // input by keys and names.
205 std::set<const RegionData*> keys; member in struct:autofill::__anon12532::AddressSuggestions::RegionsMatchInput
335 field_tries.keys
357 Trie<const RegionData*> keys; member in struct:autofill::InputSuggester::SubRegionData::FieldTries
[all...]

Completed in 635 milliseconds

<<111213141516171819