/external/openfst/src/include/fst/extensions/far/ |
H A D | create.h | 66 ostringstream keybuf; local 67 keybuf.width(generate_keys); 68 keybuf.fill('0'); 69 keybuf << i + 1; 70 key = keybuf.str();
|
H A D | compile-strings.h | 272 ostringstream keybuf; local 273 keybuf.width(key_size); 274 keybuf.fill('0'); 275 keybuf << n; 278 key = keybuf.str(); 285 key += keybuf.str();
|
/external/vboot_reference/tests/ |
H A D | rsa_utility_tests.c | 133 uint8_t keybuf[8 + 2 * RSA1024NUMBYTES]; local 134 uint32_t* keybuf_len = (uint32_t*)keybuf; 145 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 0), 158 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 3), 171 uint8_t keybuf[8 + 2 * RSA1024NUMBYTES]; local 172 uint32_t* keybuf_len = (uint32_t*)keybuf; 183 TEST_EQ(RSAVerifyBinaryWithDigest_f(keybuf, NULL, digest, sig, 0), 196 TEST_EQ(RSAVerifyBinaryWithDigest_f(keybuf, NULL, digest, sig, 3),
|
/external/sqlite/android/ |
H A D | sqlite3_android.cpp | 362 char keybuf[1024]; local 363 uint32_t result = ucol_getSortKey(collator, token, -1, (uint8_t*)keybuf, sizeof(keybuf)-1); 364 if (result > sizeof(keybuf)) { 372 base16Encode(base16buf, keybuf, keysize);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 636 u8 *keybuf, *pos; local 651 keybuf = os_malloc(keybuf_len); 652 if (keybuf == NULL) 656 data, data_len, keybuf, keybuf_len)) { 657 os_free(keybuf); 661 pos = keybuf; 718 os_free(keybuf);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 636 u8 *keybuf, *pos; local 651 keybuf = os_malloc(keybuf_len); 652 if (keybuf == NULL) 656 data, data_len, keybuf, keybuf_len)) { 657 os_free(keybuf); 661 pos = keybuf; 718 os_free(keybuf);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 636 u8 *keybuf, *pos; local 651 keybuf = os_malloc(keybuf_len); 652 if (keybuf == NULL) 656 data, data_len, keybuf, keybuf_len)) { 657 os_free(keybuf); 661 pos = keybuf; 718 os_free(keybuf);
|
/external/openssh/ |
H A D | authfile.c | 57 sshkey_save_private_blob(struct sshbuf *keybuf, const char *filename) argument 63 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(keybuf), 64 sshbuf_len(keybuf)) != sshbuf_len(keybuf)) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 420 u8 keybuf[32]; local 423 if (key_len > sizeof(keybuf)) 435 if (pad_len && key_len < sizeof(keybuf)) { 436 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 437 os_memset(keybuf + key_len, 0, pad_len); 438 keybuf[key_len] = 0xdd; 440 key = keybuf;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 420 u8 keybuf[32]; local 423 if (key_len > sizeof(keybuf)) 435 if (pad_len && key_len < sizeof(keybuf)) { 436 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 437 os_memset(keybuf + key_len, 0, pad_len); 438 keybuf[key_len] = 0xdd; 440 key = keybuf;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 420 u8 keybuf[32]; local 423 if (key_len > sizeof(keybuf)) 435 if (pad_len && key_len < sizeof(keybuf)) { 436 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 437 os_memset(keybuf + key_len, 0, pad_len); 438 keybuf[key_len] = 0xdd; 440 key = keybuf;
|
/external/mdnsresponder/mDNSCore/ |
H A D | DNSDigest.c | 1324 mDNSu8 keybuf[1024]; local 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); 1327 DNSDigest_ConstructHMACKey(info, keybuf, (mDNSu32)keylen);
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
H A D | fpdf_parser_encrypt.cpp | 379 FX_BYTE keybuf[32]; local 381 key = keybuf;
|