/external/ppp/pppd/plugins/pppoatm/ |
H A D | text2atm.c | 97 addr->sas_addr.prv[0] = ATM_AFI_E164; 98 addr->sas_addr.prv[1] = 0; 99 memset(addr->sas_addr.prv+1,0,8); 104 if (pos & 1) addr->sas_addr.prv[pos >> 1] |= *text-'0'; 105 else addr->sas_addr.prv[pos >> 1] = (*text-'0') << 4; 109 addr->sas_addr.prv[8] |= 0xf; 119 if (pos & 1) addr->sas_addr.prv[pos >> 1] |= value; 120 else addr->sas_addr.prv[pos >> 1] = value << 4; 132 if (pos > 1 && !*addr->sas_addr.prv) 143 if (len > 7 && addr->sas_addr.prv[ [all...] |
H A D | ans.c | 93 sas_addr.prv,data,ATM_ESA_LEN); 100 sas_addr.prv,data,ATM_ESA_LEN); 251 if (addr->sas_addr.prv) { 252 res = encode_nsap(tmp,addr->sas_addr.prv); 254 res = encode_nsap_new(tmp,addr->sas_addr.prv);
|
/external/iproute2/include/linux/ |
H A D | atm.h | 208 unsigned char prv[ATM_ESA_LEN];/* private ATM address */ member in struct:sockaddr_atmsvc::__anon7722 219 return *addr.sas_addr.prv || *addr.sas_addr.pub;
|
/external/kernel-headers/original/uapi/linux/ |
H A D | atm.h | 208 unsigned char prv[ATM_ESA_LEN];/* private ATM address */ member in struct:sockaddr_atmsvc::__anon8422 219 return *addr.sas_addr.prv || *addr.sas_addr.pub;
|
/external/openssh/ |
H A D | sshkey.c | 2990 sshkey_private_to_blob2(const struct sshkey *prv, struct sshbuf *blob, argument 3061 (r = sshkey_to_blob(prv, &pubkeyblob, &pubkeylen)) != 0 || 3074 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 || 3633 struct sshkey *prv = NULL; local 3650 if ((prv = sshkey_new_private(KEY_RSA1)) == NULL) { 3669 (r = sshbuf_get_bignum1(copy, prv->rsa->n)) != 0 || 3670 (r = sshbuf_get_bignum1(copy, prv->rsa->e)) != 0 || 3705 if ((r = sshbuf_get_bignum1(decrypted, prv->rsa->d)) != 0 || 3706 (r = sshbuf_get_bignum1(decrypted, prv->rsa->iqmp)) != 0 || 3707 (r = sshbuf_get_bignum1(decrypted, prv 3747 struct sshkey *prv = NULL; local [all...] |
H A D | ssh-keygen.c | 279 struct sshkey *prv; local 282 if ((r = sshkey_load_private(filename, "", &prv, NULL)) == 0) 283 return prv; 290 r = sshkey_load_private(filename, pass, &prv, NULL); 295 return prv; 751 struct sshkey *prv; local 759 prv = load_identity(identity_file); 760 if ((r = sshkey_write(prv, stdout)) != 0) 762 sshkey_free(prv);
|
H A D | sshconnect1.c | 173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument 181 if (rsa_private_decrypt(challenge, challenge, prv) != 0)
|
H A D | sshconnect2.c | 977 Key *prv; local 993 if ((prv = load_identity_file(id->filename, id->userprovided)) == NULL) 995 ret = sshkey_sign(prv, sigp, lenp, data, datalen, compat); 996 sshkey_free(prv);
|
/external/boringssl/include/openssl/ |
H A D | ec_key.h | 127 OPENSSL_EXPORT int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *prv);
|
/external/boringssl/src/include/openssl/ |
H A D | ec_key.h | 127 OPENSSL_EXPORT int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *prv);
|
/external/caliper/lib/ |
H A D | gson-2.2.2.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/gson/ com/google/gson/stream/ ... |
/external/robolectric/v3/runtime/ |
H A D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.3_r2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.0.0_r2-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.1.1_r9-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |