/external/qemu/distrib/sdl-1.2.15/src/video/x11/ |
H A D | SDL_x11events.c | 589 char *keydata = keybuf; local 596 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 601 keydata = SDL_malloc(count); 602 if ( keydata == NULL ) { 606 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, count, &xkeysym, &status); 650 utf16length = Utf8ToUtf16((Uint8 *)keydata, count, utf16data, utf16size); 652 /* The keydata contained an invalid byte 717 if (keydata != NULL && keybuf != keydata) { 718 SDL_free(keydata); [all...] |
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 645 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 645 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 645 struct eap_key_data keydata; local 681 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); 689 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); 697 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 721 hmac_md5(keydata.sign_key, sign_key_len, 742 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 760 os_memcpy(datakey, keydata.encr_key, key_len);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 1189 const u8 *keydata, 1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 1189 const u8 *keydata, 1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 1189 const u8 *keydata, 1197 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen); 1198 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) 1188 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3con.c | 3806 SECItem * keydata; local 3818 keydata = PK11_GetKeyData(pwSpec->master_secret); 3819 if (keydata && keydata->len <= sizeof pwSpec->raw_master_secret) { 3820 memcpy(pwSpec->raw_master_secret, keydata->data, keydata->len); 3822 pwSpec->msItem.len = keydata->len;
|