Searched defs:cs (Results 1 - 25 of 314) sorted by last modified time

1234567891011>>

/external/webrtc/src/system_wrappers/source/
H A Dcondition_variable_posix.cc84 CriticalSectionPosix* cs = reinterpret_cast<CriticalSectionPosix*>( local
86 pthread_cond_wait(&_cond, &cs->_mutex);
104 CriticalSectionPosix* cs = reinterpret_cast<CriticalSectionPosix*>( local
132 const int res = pthread_cond_timedwait(&_cond, &cs->_mutex, &ts);
137 pthread_cond_wait(&_cond, &cs->_mutex);
H A Dcondition_variable_win.cc9 * http://www.cs.wustl.edu/~schmidt/win32-cv-1.html (section 3.2).
132 CriticalSectionWindows* cs = reinterpret_cast<CriticalSectionWindows*>( local
138 &(cs->crit),maxTimeInMS);
151 LeaveCriticalSection(&cs->crit);
177 EnterCriticalSection(&cs->crit);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c334 HCERTSTORE cs; local
337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0,
340 if (cs == NULL) {
348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING |
363 ret = CertFindCertificateInStore(cs,
372 CertCloseStore(cs, 0);
480 HCERTSTORE cs; local
498 cs = CertOpenSystemStore(0, wstore);
501 cs = CertOpenSystemStore(0, store);
503 if (cs
1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_macsec_qca.c484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument
490 os_memcmp(cs, default_cs_id, cs_len) != 0) {
492 cs, cs_len);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pwd.c498 u32 cs; local
508 ptr = (u8 *) &cs;
590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c750 u32 cs; local
757 ptr = (u8 *) &cs;
836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
851 data->my_confirm, &cs, data->msk, data->emsk,
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay.c1517 struct macsec_ciphersuite *cs; local
1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak);
1599 if (!cs) {
1604 sak_len = cs->sak_len;
1606 participant->kay->macsec_csindex = cs->index;
H A Dieee802_1x_secy_ops.c69 const u8 *cs, size_t cs_len)
85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len);
68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c334 HCERTSTORE cs; local
337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0,
340 if (cs == NULL) {
348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING |
363 ret = CertFindCertificateInStore(cs,
372 CertCloseStore(cs, 0);
480 HCERTSTORE cs; local
498 cs = CertOpenSystemStore(0, wstore);
501 cs = CertOpenSystemStore(0, store);
503 if (cs
1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_macsec_qca.c484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument
490 os_memcmp(cs, default_cs_id, cs_len) != 0) {
492 cs, cs_len);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pwd.c498 u32 cs; local
508 ptr = (u8 *) &cs;
590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c750 u32 cs; local
757 ptr = (u8 *) &cs;
836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
851 data->my_confirm, &cs, data->msk, data->emsk,
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay.c1517 struct macsec_ciphersuite *cs; local
1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak);
1599 if (!cs) {
1604 sak_len = cs->sak_len;
1606 participant->kay->macsec_csindex = cs->index;
H A Dieee802_1x_secy_ops.c69 const u8 *cs, size_t cs_len)
85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len);
68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Ddriver_i.h687 const u8 *cs, size_t cs_len)
691 return wpa_s->driver->set_current_cipher_suite(wpa_s->drv_priv, cs,
686 wpa_drv_set_current_cipher_suite(struct wpa_supplicant *wpa_s, const u8 *cs, size_t cs_len) argument
H A Dwpas_kay.c53 static int wpas_set_current_cipher_suite(void *wpa_s, const u8 *cs, argument
56 return wpa_drv_set_current_cipher_suite(wpa_s, cs, cs_len);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c334 HCERTSTORE cs; local
337 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0,
340 if (cs == NULL) {
348 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING |
363 ret = CertFindCertificateInStore(cs,
372 CertCloseStore(cs, 0);
480 HCERTSTORE cs; local
498 cs = CertOpenSystemStore(0, wstore);
501 cs = CertOpenSystemStore(0, store);
503 if (cs
1753 X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx); local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_macsec_qca.c484 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs, argument
490 os_memcmp(cs, default_cs_id, cs_len) != 0) {
492 cs, cs_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c498 u32 cs; local
508 ptr = (u8 *) &cs;
590 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
667 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c750 u32 cs; local
757 ptr = (u8 *) &cs;
836 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32));
851 data->my_confirm, &cs, data->msk, data->emsk,
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.c1517 struct macsec_ciphersuite *cs; local
1598 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak);
1599 if (!cs) {
1604 sak_len = cs->sak_len;
1606 participant->kay->macsec_csindex = cs->index;
H A Dieee802_1x_secy_ops.c69 const u8 *cs, size_t cs_len)
85 return ops->set_current_cipher_suite(ops->ctx, cs, cs_len);
68 secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, const u8 *cs, size_t cs_len) argument
/external/valgrind/main/none/tests/x86/
H A Dmovbe.c13 typedef struct { UChar cs[40]; } Block; member in struct:__anon33250
20 printf("%02x", (UInt)b->cs[i]);
/external/valgrind/main/callgrind/
H A Dcallstack.c92 call_stack *cs = &CLG_(current_call_stack); local
94 if (i < cs->size) return;
96 oldsize = cs->size;
97 cs->size *= 2;
98 while (i > cs->size) cs->size *= 2;
100 cs->entry = (call_entry*) VG_(realloc)("cl.callstack.ess.1",
101 cs->entry,
102 cs->size * sizeof(call_entry));
104 for(i=oldsize; i<cs
[all...]
H A Dcontext.c283 call_stack* cs = &CLG_(current_call_stack); local
292 CLG_ASSERT(cs->sp < cs->size);
293 CLG_ASSERT(cs->entry[cs->sp].cxt == 0);
294 cs->entry[cs->sp].cxt = CLG_(current_state).cxt;
295 cs->entry[cs->sp].fn_sp = CLG_(current_fn_stack).top - CLG_(current_fn_stack).bottom;

Completed in 251 milliseconds

1234567891011>>