/external/webrtc/src/system_wrappers/source/ |
H A D | condition_variable_posix.cc | 84 CriticalSectionPosix* cs = reinterpret_cast<CriticalSectionPosix*>( local 86 pthread_cond_wait(&_cond, &cs->_mutex); 104 CriticalSectionPosix* cs = reinterpret_cast<CriticalSectionPosix*>( local 132 const int res = pthread_cond_timedwait(&_cond, &cs->_mutex, &ts); 137 pthread_cond_wait(&_cond, &cs->_mutex);
|
H A D | condition_variable_win.cc | 9 * http://www.cs.wustl.edu/~schmidt/win32-cv-1.html (section 3.2). 132 CriticalSectionWindows* cs = reinterpret_cast<CriticalSectionWindows*>( local 138 &(cs->crit),maxTimeInMS); 151 LeaveCriticalSection(&cs->crit); 177 EnterCriticalSection(&cs->crit);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 334 HCERTSTORE cs; local 337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, 340 if (cs == NULL) { 348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING | 363 ret = CertFindCertificateInStore(cs, 372 CertCloseStore(cs, 0); 480 HCERTSTORE cs; local 498 cs = CertOpenSystemStore(0, wstore); 501 cs = CertOpenSystemStore(0, store); 503 if (cs 1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_macsec_qca.c | 484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument 490 os_memcmp(cs, default_cs_id, cs_len) != 0) { 492 cs, cs_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pwd.c | 498 u32 cs; local 508 ptr = (u8 *) &cs; 590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 750 u32 cs; local 757 ptr = (u8 *) &cs; 836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 851 data->my_confirm, &cs, data->msk, data->emsk,
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 1517 struct macsec_ciphersuite *cs; local 1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak); 1599 if (!cs) { 1604 sak_len = cs->sak_len; 1606 participant->kay->macsec_csindex = cs->index;
|
H A D | ieee802_1x_secy_ops.c | 69 const u8 *cs, size_t cs_len) 85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len); 68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 334 HCERTSTORE cs; local 337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, 340 if (cs == NULL) { 348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING | 363 ret = CertFindCertificateInStore(cs, 372 CertCloseStore(cs, 0); 480 HCERTSTORE cs; local 498 cs = CertOpenSystemStore(0, wstore); 501 cs = CertOpenSystemStore(0, store); 503 if (cs 1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_macsec_qca.c | 484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument 490 os_memcmp(cs, default_cs_id, cs_len) != 0) { 492 cs, cs_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pwd.c | 498 u32 cs; local 508 ptr = (u8 *) &cs; 590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 750 u32 cs; local 757 ptr = (u8 *) &cs; 836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 851 data->my_confirm, &cs, data->msk, data->emsk,
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 1517 struct macsec_ciphersuite *cs; local 1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak); 1599 if (!cs) { 1604 sak_len = cs->sak_len; 1606 participant->kay->macsec_csindex = cs->index;
|
H A D | ieee802_1x_secy_ops.c | 69 const u8 *cs, size_t cs_len) 85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len); 68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | driver_i.h | 687 const u8 *cs, size_t cs_len) 691 return wpa_s->driver->set_current_cipher_suite(wpa_s->drv_priv, cs, 686 wpa_drv_set_current_cipher_suite(struct wpa_supplicant *wpa_s, const u8 *cs, size_t cs_len) argument
|
H A D | wpas_kay.c | 53 static int wpas_set_current_cipher_suite(void *wpa_s, const u8 *cs, argument 56 return wpa_drv_set_current_cipher_suite(wpa_s, cs, cs_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 334 HCERTSTORE cs; local 337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, 340 if (cs == NULL) { 348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING | 363 ret = CertFindCertificateInStore(cs, 372 CertCloseStore(cs, 0); 480 HCERTSTORE cs; local 498 cs = CertOpenSystemStore(0, wstore); 501 cs = CertOpenSystemStore(0, store); 503 if (cs 1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_macsec_qca.c | 484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument 490 os_memcmp(cs, default_cs_id, cs_len) != 0) { 492 cs, cs_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 498 u32 cs; local 508 ptr = (u8 *) &cs; 590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 750 u32 cs; local 757 ptr = (u8 *) &cs; 836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); 851 data->my_confirm, &cs, data->msk, data->emsk,
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 1517 struct macsec_ciphersuite *cs; local 1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak); 1599 if (!cs) { 1604 sak_len = cs->sak_len; 1606 participant->kay->macsec_csindex = cs->index;
|
H A D | ieee802_1x_secy_ops.c | 69 const u8 *cs, size_t cs_len) 85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len); 68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
|
/external/valgrind/main/none/tests/x86/ |
H A D | movbe.c | 13 typedef struct { UChar cs[40]; } Block; member in struct:__anon33250 20 printf("%02x", (UInt)b->cs[i]);
|
/external/valgrind/main/callgrind/ |
H A D | callstack.c | 92 call_stack *cs = &CLG_(current_call_stack); local 94 if (i < cs->size) return; 96 oldsize = cs->size; 97 cs->size *= 2; 98 while (i > cs->size) cs->size *= 2; 100 cs->entry = (call_entry*) VG_(realloc)("cl.callstack.ess.1", 101 cs->entry, 102 cs->size * sizeof(call_entry)); 104 for(i=oldsize; i<cs [all...] |
H A D | context.c | 283 call_stack* cs = &CLG_(current_call_stack); local 292 CLG_ASSERT(cs->sp < cs->size); 293 CLG_ASSERT(cs->entry[cs->sp].cxt == 0); 294 cs->entry[cs->sp].cxt = CLG_(current_state).cxt; 295 cs->entry[cs->sp].fn_sp = CLG_(current_fn_stack).top - CLG_(current_fn_stack).bottom;
|