/external/iproute2/tc/ |
p_ip.c | 27 parse_ip(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 38 tkey->off = 12; 39 res = parse_cmd(&argc, &argv, 4, TIPV4,RU32,sel,tkey); 44 tkey->off = 16; 45 res = parse_cmd(&argc, &argv, 4, TIPV4,RU32,sel,tkey); 54 tkey->off = 1; 55 res = parse_cmd(&argc, &argv, 1, TU32,RU8,sel,tkey); 60 tkey->off = 0; 61 res = parse_cmd(&argc, &argv, 1, TU32,RU8,sel,tkey); 66 tkey->off = 9 [all...] |
m_pedit.c | 62 pedit_parse_nopopt (int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 122 pack_key(struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 129 if (tkey->off % 4) { 134 sel->keys[hwm].val = tkey->val; 135 sel->keys[hwm].mask = tkey->mask; 136 sel->keys[hwm].off = tkey->off; 137 sel->keys[hwm].at = tkey->at; 138 sel->keys[hwm].offmask = tkey->offmask; 139 sel->keys[hwm].shift = tkey->shift; 146 pack_key32(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 417 struct tc_pedit_key tkey; local [all...] |
m_pedit.h | 46 int (*parse_peopt)(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 50 extern int parse_cmd(int *argc_p, char ***argv_p, __u32 len, int type,__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 51 extern int pack_key(struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 52 extern int pack_key32(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 53 extern int pack_key16(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 54 extern int pack_key8(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 56 extern int parse_cmd(int *argc_p, char ***argv_p, __u32 len, int type,__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey); 57 extern int parse_offset(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey);
|
p_tcp.c | 27 parse_tcp(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
|
p_udp.c | 27 parse_udp(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
|
p_icmp.c | 28 parse_icmp(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 39 unsigned char tkey[MAXBLOCKSIZE]; local 63 zeromem(tkey, sizeof(tkey)); 64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { 65 tkey[x] = key[x]; 67 for (x = 0; x < skeylen && x < (int)sizeof(tkey); x++) { 68 tkey[x] ^= salt_key[x]; 70 for (; x < keylen && x < (int)sizeof(tkey); x++) { 71 tkey[x] ^= 0x55; 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV * [all...] |
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
SubActivityScreen.java | 51 res.putExtra("tkey", "tval"); 96 res.putExtra("tkey", "tval"); 137 } else if (!("tval".equals(data.getStringExtra("tkey")))) {
|
/external/icu4c/layout/ |
KernTable.cpp | 203 le_uint32 tkey = SWAP_KEY(tp); local 205 fprintf(stdout, " %.3d (%0.8x)\n", ((char*)tp - (char*)pairs)/KERN_PAIRINFO_SIZE, tkey); 207 if (tkey <= key) { 208 if (tkey == key) {
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
heap.h | 138 int tkey = key_[j]; local 140 pos_[key_[k] = tkey] = k;
|
/external/openssl/ssl/ |
d1_clnt.c | 1060 EC_KEY *tkey; local 1094 tkey = s->session->sess_cert->peer_ecdh_tmp; 1110 tkey = srvr_pub_pkey->pkey.ec; 1113 srvr_group = EC_KEY_get0_group(tkey); 1114 srvr_ecpoint = EC_KEY_get0_public_key(tkey); 1141 tkey = s->cert->key->privatekey->pkey.ec; 1142 priv_key = EC_KEY_get0_private_key(tkey); [all...] |
s3_clnt.c | 2338 EC_KEY *tkey; local [all...] |
s3_srvr.c | 2350 const EC_KEY *tkey; local [all...] |
t1_enc.c | 524 printf("\tkey= "); for (i=0; i<c->key_len; i++) printf("%02x", key[i]);
|
/external/chromium/third_party/icu/source/test/intltest/ |
restsnew.cpp | 921 const char *tkey=NULL; local 922 UnicodeString value=tagelement.getNextString(&tkey, status); 923 UnicodeString key(tkey); [all...] |
/external/icu4c/test/intltest/ |
restsnew.cpp | 926 const char *tkey=NULL; local 927 UnicodeString value=tagelement.getNextString(&tkey, status); 928 UnicodeString key(tkey); [all...] |
/external/openssl/crypto/evp/ |
e_des3.c | 262 printf("\tKEY= ");
|
/external/chromium/third_party/icu/source/common/ |
rbbiscan.cpp | 721 UnicodeString *tkey = new UnicodeString(s); 722 if (tkey == NULL || el == NULL || setToAdopt == NULL) { 724 delete tkey; 725 tkey = NULL; 734 el->key = tkey; [all...] |
/external/icu4c/common/ |
rbbiscan.cpp | 721 UnicodeString *tkey = new UnicodeString(s); 722 if (tkey == NULL || el == NULL || setToAdopt == NULL) { 724 delete tkey; 725 tkey = NULL; 734 el->key = tkey; [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 456 out.println("\tkey:");
|
/bionic/libc/netbsd/resolv/ |
res_debug.c | 462 {ns_t_tkey, "TKEY", "tkey"},
|
/external/tcpdump/ |
print-domain.c | 300 { T_TKEY, "TKEY" }, /* RFC 2930 */
|
print-ospf.c | [all...] |
/external/dnsmasq/src/ |
cache.c | 58 { 249, "TKEY" }, [all...] |
rfc1035.c | 445 forwarding. We look for SIG and TSIG in the addition section, and TKEY queries (for GSS-TSIG) */ [all...] |