Searched refs:keydata (Results 1 - 8 of 8) sorted by relevance

/external/qemu/distrib/sdl-1.2.15/src/video/x11/
H A DSDL_x11events.c589 char *keydata = keybuf; local
596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status);
601 keydata = SDL_malloc(count);
602 if ( keydata == NULL ) {
606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status);
650 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size);
652 /* The keydata contained an invalid byte
717 if (keydata != NULL && keybuf != keydata) {
718 SDL_free(keydata);
[all...]
/external/wpa_supplicant_8/hostapd/src/eapol_supp/
H A Deapol_supp_sm.c645 struct eap_key_data keydata; local
681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata));
689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16);
697 os_memcpy(keydata.sign_key, keydata.encr_key, 16);
721 hmac_md5(keydata.sign_key, sign_key_len,
742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key,
760 os_memcpy(datakey, keydata.encr_key, key_len);
/external/wpa_supplicant_8/src/eapol_supp/
H A Deapol_supp_sm.c645 struct eap_key_data keydata; local
681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata));
689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16);
697 os_memcpy(keydata.sign_key, keydata.encr_key, 16);
721 hmac_md5(keydata.sign_key, sign_key_len,
742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key,
760 os_memcpy(datakey, keydata.encr_key, key_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.c645 struct eap_key_data keydata; local
681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata));
689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16);
697 os_memcpy(keydata.sign_key, keydata.encr_key, 16);
721 hmac_md5(keydata.sign_key, sign_key_len,
742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key,
760 os_memcpy(datakey, keydata.encr_key, key_len);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c1189 const u8 *keydata,
1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c1189 const u8 *keydata,
1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c1189 const u8 *keydata,
1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3con.c3806 SECItem * keydata; local
3818 keydata = PK11_GetKeyData(pwSpec->master_secret);
3819 if (keydata && keydata->len <= sizeof pwSpec->raw_master_secret) {
3820 memcpy(pwSpec->raw_master_secret, keydata->data, keydata->len);
3822 pwSpec->msItem.len = keydata->len;

Completed in 116 milliseconds