Searched refs:key (Results 1 - 25 of 6813) sorted by last modified time

1234567891011>>

/external/zxing/core/
H A Dcore.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ...
/external/zopfli/src/zopflipng/lodepng/
H A Dlodepng.cpp2729 unsigned lodepng_add_text(LodePNGInfo* info, const char* key, const char* str) argument
2745 string_set(&info->text_keys[info->text_num - 1], key);
2801 unsigned lodepng_add_itext(LodePNGInfo* info, const char* key, const char* langtag, argument
2824 string_set(&info->itext_keys[info->itext_num - 1], key);
3471 unsigned char key; /*a color key is required, or more*/ member in struct:ColorProfile
3497 profile->key = 0;
3529 std::cout << "key: " << (int)p->key << std::endl;
3592 /*only use color key i
4351 char *key = 0, *str = 0; local
[all...]
H A Dlodepng.h335 transparent color key (tRNS)
341 pixels with this key to transparent already in the raw RGBA output.
343 The color key is only supported for color types 0 and 2.
345 unsigned key_defined; /*is a transparent color key given? 0 = false, 1 = true*/
346 unsigned key_r; /*red/greyscale component of color key*/
347 unsigned key_g; /*green component of color key*/
348 unsigned key_b; /*blue component of color key*/
486 unsigned lodepng_add_text(LodePNGInfo* info, const char* key, const char* str); /*push back both texts at once*/
489 unsigned lodepng_add_itext(LodePNGInfo* info, const char* key, const char* langtag,
1146 colortype and bitdepth, text chunks, time chunk, the color key, th
[all...]
/external/zopfli/src/zopflipng/
H A Dzopflipng_lib.cc105 // First check if we want to preserve potential color-key background color,
107 bool key = true; local
110 key = false;
120 // Choose the color key or first initial background color.
122 if (key || palette) {
126 // used as a valid color key, or in case of palette ensures a color
142 if (!key && !palette) {
143 // Use the last encountered RGB value if no key or palette is used: that
/external/webrtc/src/system_wrappers/interface/
H A Dsort.h45 // key values which will be used to sort the data array. There must be a
46 // one-to-one correspondence between data elements and key elements, with
52 // key [in] A pointer to an array of keys used to sort the
56 // keyType Enum corresponding to the type of the key array.
60 WebRtc_Word32 KeySort(void* data, void* key, WebRtc_UWord32 numOfElements,
/external/webrtc/src/system_wrappers/source/
H A Devent.cc39 for(int key = 0x20; key < 0x90; key++)
41 short res = GetAsyncKeyState(key);
54 // loop through all Mac virtual key constant values
H A Dsort.cc60 (static_cast<const SortKey*>(SORT_KEY_X)->key)); \
62 (static_cast<const SortKey*>(SORT_KEY_Y)->key)); \
70 KEY_TYPE* keyT = (KEY_TYPE*)(key); \
73 ptrSortKey[i].key = &keyT[i]; \
87 void* key; member in struct:webrtc::SortKey
94 KeyType key;
208 return sortKeyX.key < sortKeyY.key;
218 return sortKey.key >> offset;
245 inline WebRtc_Word32 SetupKeySort(void* key,
420 KeySort(void* data, void* key, WebRtc_UWord32 numOfElements, WebRtc_UWord32 sizeOfElement, Type keyType) argument
[all...]
/external/webrtc/src/system_wrappers/test/TestSort/
H A DTestSort.cpp26 KeyType key; member in struct:LotsOfData
50 KeyType keyX = ((const DataType*)dataX)->key;
51 KeyType keyY = ((const DataType*)dataY)->key;
69 return dataX.key < dataY.key;
131 KeyType key[DataLength]; local
151 key[j] = TypedRand<KeyType>();
152 data[j].key = key[j];
158 memcpy(keyRef, key, sizeo
[all...]
/external/wpa_supplicant_8/hostapd/
H A Dconfig_file.c728 if (keyidx < 0 || keyidx > 3 || wep->key[keyidx] != NULL)
735 wep->key[keyidx] = os_malloc(len);
736 if (wep->key[keyidx] == NULL)
738 os_memcpy(wep->key[keyidx], val + 1, len);
744 wep->key[keyidx] = os_malloc(len);
745 if (wep->key[keyidx] == NULL)
748 if (hexstr2bin(val, wep->key[keyidx], len) < 0)
965 if (hexstr2bin(pos, r0kh->key, sizeof(r0kh->key))) {
966 wpa_printf(MSG_ERROR, "Invalid R0KH key
[all...]
H A Dctrl_iface.c528 char *ssid, *auth, *encr = NULL, *key = NULL; local
544 key = pos;
548 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.c49 /* use key0 in individual key and key1 in broadcast key */
391 bin_clear_free(keys->key[i], keys->len[i]);
392 keys->key[i] = NULL;
868 /* individual keys are not use; can use key idx0 for
H A Dap_config.h37 u8 *key[NUM_WEP_KEYS]; member in struct:hostapd_wep_keys
40 size_t default_len; /* key length used for dynamic key generation */
H A Dap_drv_ops.c689 const u8 *key, size_t key_len)
694 key_idx, set_tx, seq, seq_len, key,
685 hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
H A Dap_drv_ops.h87 const u8 *key, size_t key_len);
H A Dhostapd.c243 1, NULL, 0, ssid->wep.key[idx],
404 if (hapd->conf->ssid.wep.key[i] &&
407 hapd->conf->ssid.wep.key[i],
413 if (hapd->conf->ssid.wep.key[i] &&
1048 * to 1. Clear it here so any other key/station deletion, which is not
H A Dieee802_11.c211 "authentication (shared key, transaction %d)",
217 u8 key[8]; local
226 os_memcpy(key, &now.sec, 4);
227 os_memcpy(key + 4, &r, 4);
228 rc4_skip(key, sizeof(key), 0,
243 "shared key authentication - invalid "
250 "authentication OK (shared key)");
426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
1439 * the old key an
[all...]
H A Dieee802_1x.c121 struct ieee802_1x_eapol_key *key; local
128 len = sizeof(*key) + key_len;
134 key = (struct ieee802_1x_eapol_key *) (hdr + 1);
135 key->type = EAPOL_KEY_TYPE_RC4;
136 WPA_PUT_BE16(key->key_length, key_len);
137 wpa_get_ntp_timestamp(key->replay_counter);
139 if (random_get_bytes(key->key_iv, sizeof(key->key_iv))) {
145 key->key_index = idx | (broadcast ? 0 : BIT(7));
148 * interpret bit7 as an indication whether the key i
781 struct ieee802_1x_eapol_key *key; local
2101 struct ieee802_1x_eapol_key *key; local
2398 const u8 *key; local
[all...]
H A Dpeerkey_auth.c82 struct wpa_state_machine *sm, struct wpa_eapol_key *key)
89 if (wpa_parse_kde_ies((const u8 *) (key + 1),
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
139 NULL, key->key_nonce, buf, pos - buf, 0, 0, 0);
147 struct wpa_eapol_key *key,
179 key->key_nonce, WPA_NONCE_LEN);
192 NULL, key->key_nonce, buf, pos - buf, 0, 1, 0);
200 struct wpa_eapol_key *key,
231 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, key->key_nonce,
256 struct wpa_state_machine *sm, struct wpa_eapol_key *key)
81 wpa_smk_m1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key) argument
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
255 wpa_smk_m3(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key) argument
326 wpa_smk_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key) argument
[all...]
H A Dpreauth_auth.c198 const u8 *key; local
204 key = ieee802_1x_get_key(sta->eapol_sm, &len);
207 if (success && key) {
208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len,
H A Dvlan_init.c783 if (mssid->wep.key[i] &&
786 mssid->wep.key[i], mssid->wep.len[i]))
H A Dwpa_auth.c109 u8 *key, size_t key_len)
114 key, key_len);
777 * Error report is not a request for a new key handshake, but since
790 struct wpa_eapol_key *key; local
803 if (data_len < sizeof(*hdr) + sizeof(*key))
807 key = (struct wpa_eapol_key *) (hdr + 1);
808 key_info = WPA_GET_BE16(key->key_info);
809 key_data_length = WPA_GET_BE16(key->key_data_length);
812 MAC2STR(sm->addr), key_info, key->type, key_data_length);
813 if (key_data_length > data_len - sizeof(*hdr) - sizeof(*key)) {
106 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) argument
1286 struct wpa_eapol_key *key; local
1479 struct wpa_eapol_key *key; local
[all...]
H A Dwpa_auth.h57 u8 pad[4]; /* 8-octet boundary for AES key wrap */
73 u8 pad[2]; /* 8-octet boundary for AES key wrap */
83 /* Encrypted with AES key-wrap */
92 u8 pad[6]; /* 8-octet boundary for AES key wrap */
114 u8 key[16]; member in struct:ft_remote_r0kh
122 u8 key[16]; member in struct:ft_remote_r1kh
199 const u8 *addr, int idx, u8 *key, size_t key_len);
H A Dwpa_auth_ft.c347 if (aes_wrap(r0kh->key, sizeof(r0kh->key),
378 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
422 const u8 *key; local
431 * Pad key for AES Key Wrap if it is not multiple of 8 bytes or is less
444 key = keybuf;
446 key = gsm->GTK[gsm->GN - 1];
463 if (aes_wrap(sm->PTK.kek, 16, key_len / 8, key, subelem + 13)) {
761 u8 *key, size_t key_len)
766 key, key_le
758 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) argument
[all...]
H A Dwpa_auth_glue.c247 const u8 *key; local
255 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
256 if (key == NULL)
261 os_memcpy(msk, key, keylen);
269 const u8 *addr, int idx, u8 *key,
282 key, key_len);
268 hostapd_wpa_auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) argument
H A Dwpa_auth_i.h140 /* per group key state machine data */
230 struct wpa_state_machine *sm, struct wpa_eapol_key *key);
232 struct wpa_state_machine *sm, struct wpa_eapol_key *key);
234 struct wpa_state_machine *sm, struct wpa_eapol_key *key);

Completed in 236 milliseconds

1234567891011>>