/external/dropbear/ |
cli-authpubkey.c | 64 buffer* keybuf = NULL; local 77 keybuf = buf_new(MAX_PUBKEY_SIZE); 92 keybuf->pos = keybuf->len = 0; 93 buf_put_pub_key(keybuf, keyitem->key, keytype); 94 buf_setpos(keybuf, 0); 95 buf_incrpos(keybuf, 4); /* first int is the length of the remainder (ie 100 if (keybuf->len-4 != remotelen) { 101 TRACE(("lengths differed: localh %d remote %d", keybuf->len, remotelen)) 105 if (memcmp(buf_getptr(keybuf, remotelen) [all...] |
keyimport.c | 543 unsigned char keybuf[32]; 548 MD5Final(keybuf, &md5c); 551 MD5Update(&md5c, keybuf, 16); 554 MD5Final(keybuf+16, &md5c); 559 des3_decrypt_pubkey_ossh(keybuf, (unsigned char *)key->iv, 563 memset(keybuf, 0, sizeof(keybuf)); [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/dga/ |
SDL_dgaevents.c | 97 char keybuf[32]; local 99 if ( XLookupString(&xkey, keybuf, sizeof(keybuf), NULL, &state) ) { 106 keysym.unicode = (Uint8)keybuf[0];
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
key_prot.x | 93 typedef opaque keybuf[HEXKEYBYTES]; /* store key in hex */ 150 keybuf st_priv_key; 151 keybuf st_pub_key; 177 KEY_SET(keybuf) = 1; 219 KEY_SET(keybuf) = 1; 280 KEY_GET_CONV(keybuf) = 10;
|
key_prot.h | 70 typedef char keybuf[HEXKEYBYTES]; typedef 115 keybuf st_priv_key; 116 keybuf st_pub_key; 236 extern bool_t xdr_keybuf (XDR *, keybuf);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/ |
key_prot.h | 72 typedef char keybuf[HEXKEYBYTES]; typedef 74 extern "C" bool_t xdr_keybuf(XDR *, keybuf); 76 extern bool_t xdr_keybuf(XDR *, keybuf); 173 keybuf st_priv_key; 174 keybuf st_pub_key;
|
/external/icu4c/common/ |
uloc_tag.c | 563 char keyBuf[MAX_LDML_KEY_LEN]; 575 if (keyLen >= sizeof(keyBuf)) { 581 uprv_memcpy(keyBuf, key, keyLen); 582 keyBuf[keyLen] = 0; 586 keyBuf[i] = uprv_tolower(keyBuf[i]); 597 uBcpKey = ures_getStringByKey(rb, keyBuf, &bcpKeyLen, &tmpStatus); 702 char keyBuf[MAX_LDML_KEY_LEN]; 715 if (keyLen >= sizeof(keyBuf)) { 720 uprv_memcpy(keyBuf, key, keyLen) [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 733 unsigned char keybuf[20]; local 751 if (!derive_pvk_key(keybuf, p, saltlen, 761 EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, NULL); 768 memset(keybuf + 5, 0, 11); 769 EVP_DecryptInit_ex(&cctx, EVP_rc4(), NULL, keybuf, 771 OPENSSL_cleanse(keybuf, 20); 784 OPENSSL_cleanse(keybuf, 20); 887 unsigned char keybuf[20]; local 899 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 903 memset(keybuf + 5, 0, 11) [all...] |
/external/quake/quake/src/WinQuake/ |
sys_dos.cpp | 51 static unsigned char keybuf[KEYBUF_SIZE];
variable 149 keybuf[keybuf_head] = dos_inportb(0x60);
152 if (scantokey[keybuf[keybuf_head]&0x7f] == K_CTRL)
153 ctrl=keybuf[keybuf_head]&0x80;
154 if (ctrl && scantokey[keybuf[keybuf_head]&0x7f] == 'c')
494 k = keybuf[keybuf_tail++];
499 next = keybuf[(keybuf_tail-2)&(KEYBUF_SIZE-1)];
511 if ( keybuf[(keybuf_tail-2)&(KEYBUF_SIZE-1)]==0xe0 )
517 if (k==0xc5 && keybuf[(keybuf_tail-2)&(KEYBUF_SIZE-1)] == 0x9d)
|
/external/icu4c/i18n/ |
zonemeta.cpp | 609 char keyBuf[ZID_KEY_MAX + 1]; 617 keyLen = mzid.extract(0, mzid.length(), keyBuf, ZID_KEY_MAX, US_INV); 621 ures_getByKey(rb, keyBuf, rb, &status); 626 region.extract(0, region.length(), keyBuf, ZID_KEY_MAX, US_INV); 627 tzid = ures_getStringByKey(rb, keyBuf, &tzidLen, &status);
|
/external/sqlite/android/ |
sqlite3_android.cpp | 410 char keybuf[1024]; local 411 uint32_t result = ucol_getSortKey(collator, token, -1, (uint8_t*)keybuf, sizeof(keybuf)-1); 412 if (result > sizeof(keybuf)) { 420 base16Encode(base16buf, keybuf, keysize);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 702 u8 *keybuf, *pos; local 721 keybuf = os_malloc(keybuf_len); 722 if (keybuf == NULL) 726 data, data_len, keybuf, keybuf_len)) { 727 os_free(keybuf); 731 pos = keybuf; 788 os_free(keybuf);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 703 u8 *keybuf, *pos; local 722 keybuf = os_malloc(keybuf_len); 723 if (keybuf == NULL) 727 data, data_len, keybuf, keybuf_len)) { 728 os_free(keybuf); 732 pos = keybuf; 789 os_free(keybuf);
|
/external/qemu/distrib/sdl-1.2.12/src/video/x11/ |
SDL_x11events.c | 583 char keybuf[32]; local 584 char *keydata = keybuf; 591 count = Xutf8LookupString(SDL_IC, &xevent.xkey, keydata, sizeof(keybuf), &xkeysym, &status); 712 if (keydata != NULL && keybuf != keydata) { 723 char keybuf[32]; local 730 keybuf, sizeof(keybuf), 738 keysym.unicode = (Uint8)keybuf[0]; 1227 char keybuf[32]; local [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/cybergfx/ |
SDL_amigaevents.c | 522 unsigned char keybuf[32]; 523 if ( XLookupString(xkey, (char *)keybuf, sizeof(keybuf), 525 keysym->unicode = keybuf[0];
|
/external/qemu/distrib/sdl-1.2.12/src/video/ipod/ |
SDL_ipodvideo.c | 446 unsigned char keybuf[128]; local 455 nread = read (kbfd, keybuf, 128); 457 char ascii = iPod_SC_keymap[keybuf[i] & 0x7f]; 459 if (dbgout) fprintf (dbgout, "Key! %02x is %c %s", keybuf[i], ascii, (keybuf[i] & 0x80)? "up" : "down"); 462 ev.type = (keybuf[i] & 0x80)? SDL_KEYUP : SDL_KEYDOWN;
|
/external/qemu/block/ |
qcow.c | 175 uint8_t keybuf[16]; local 178 memset(keybuf, 0, 16); 185 keybuf[i] = key[i]; 189 if (AES_set_encrypt_key(keybuf, 128, &s->aes_encrypt_key) != 0) 191 if (AES_set_decrypt_key(keybuf, 128, &s->aes_decrypt_key) != 0)
|
qcow2.c | 257 uint8_t keybuf[16]; local 260 memset(keybuf, 0, 16); 267 keybuf[i] = key[i]; 271 if (AES_set_encrypt_key(keybuf, 128, &s->aes_encrypt_key) != 0) 273 if (AES_set_decrypt_key(keybuf, 128, &s->aes_decrypt_key) != 0) [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/ps2gs/ |
SDL_gsevents.c | 762 unsigned char keybuf[BUFSIZ]; local 768 nread = read(keyboard_fd, keybuf, BUFSIZ); 770 scancode = keybuf[i] & 0x7F; 771 if ( keybuf[i] & 0x80 ) {
|
/external/qemu/distrib/sdl-1.2.12/src/video/windx5/ |
SDL_dx5events.c | 272 static void handle_keyboard(const int numevents, DIDEVICEOBJECTDATA *keybuf) 279 if ( keybuf[i].dwData & 0x80 ) { 281 TranslateKey(keybuf[i].dwOfs, &keysym, 1)); 284 TranslateKey(keybuf[i].dwOfs, &keysym, 0));
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 420 u8 keybuf[32]; local 423 if (key_len > sizeof(keybuf)) 436 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 437 os_memset(keybuf + key_len, 0, pad_len); 438 keybuf[key_len] = 0xdd; 440 key = keybuf; [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/fbcon/ |
SDL_fbevents.c | 987 unsigned char keybuf[BUFSIZ]; local 993 nread = read(keyboard_fd, keybuf, BUFSIZ); 995 scancode = keybuf[i] & 0x7F; 996 if ( keybuf[i] & 0x80 ) {
|
/external/icu4c/test/intltest/ |
regcoll.cpp | 1084 static int32_t calcKeyIncremental(UCollator *coll, const UChar* text, int32_t len, uint8_t *keyBuf, int32_t /*keyBufLen*/, UErrorCode& status) { 1093 int32_t keyPartLen = ucol_nextSortKeyPart(coll, &uiter, state, &keyBuf[keyLen], count, &status); [all...] |