/external/webkit/Source/WebKit/chromium/tests/ |
IDBBindingUtilitiesTest.cpp | 75 PassRefPtr<SerializedScriptValue> injectKey(PassRefPtr<IDBKey> key, PassRefPtr<SerializedScriptValue> value, const String& keyPath) 81 return injectIDBKeyIntoSerializedValue(key, value, idbKeyPath); 86 RefPtr<IDBKey> key = prpKey; local 87 RefPtr<SerializedScriptValue> newValue = injectKey(key, value, keyPath); 90 EXPECT_TRUE(key->isEqual(extractedKey.get())); 93 void checkInjectionFails(PassRefPtr<IDBKey> key, PassRefPtr<SerializedScriptValue> value, const String& keyPath) 95 EXPECT_FALSE(injectKey(key, value, keyPath)); 194 checkInjectionFails(IDBKey::createString("key"), SerializedScriptValue::create(object), "foo.bar"); 195 checkInjectionFails(IDBKey::createString("key"), SerializedScriptValue::create(object), "[3]");
|
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
WKDatabaseManager.cpp | 45 static WebString* key = WebString::create(WebDatabaseManagerProxy::originKey()).releaseRef(); local 46 return toAPI(key); 51 static WebString* key = WebString::create(WebDatabaseManagerProxy::originQuotaKey()).releaseRef(); local 52 return toAPI(key); 57 static WebString* key = WebString::create(WebDatabaseManagerProxy::originUsageKey()).releaseRef(); local 58 return toAPI(key); 63 static WebString* key = WebString::create(WebDatabaseManagerProxy::databaseDetailsKey()).releaseRef(); local 64 return toAPI(key); 69 static WebString* key = WebString::create(WebDatabaseManagerProxy::databaseDetailsNameKey()).releaseRef(); local 70 return toAPI(key); 75 static WebString* key = WebString::create(WebDatabaseManagerProxy::databaseDetailsDisplayNameKey()).releaseRef(); local 81 static WebString* key = WebString::create(WebDatabaseManagerProxy::databaseDetailsExpectedUsageKey()).releaseRef(); local 87 static WebString* key = WebString::create(WebDatabaseManagerProxy::databaseDetailsCurrentUsageKey()).releaseRef(); local [all...] |
/external/webkit/Source/WebKit2/UIProcess/cf/ |
WebPageProxyCF.cpp | 141 LOG(SessionState, "SessionState dictionary has a SessionHistory key, but the value is not a dictionary"); 149 LOG(SessionState, "SessionState dictionary has a ProvisionalValue key, but the value is not a string"); 185 String key = "com.apple.WebKit.searchField:" + name; local 186 return RetainPtr<CFStringRef>(AdoptCF, key.createCFString());
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls.c | 41 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 60 "key passphrase"); 132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 138 wpa_printf(MSG_INFO, "EAP-TLS: Failed to derive key"); 229 u8 *key; local 234 key = os_malloc(EAP_TLS_KEY_LEN); 235 if (key == NULL) 239 os_memcpy(key, data->key_data, EAP_TLS_KEY_LEN); 241 return key; 248 u8 *key; local [all...] |
eap_vendor_test.c | 156 u8 *key; local 162 key = os_malloc(key_len); 163 if (key == NULL) 166 os_memset(key, 0x11, key_len / 2); 167 os_memset(key + key_len / 2, 0x22, key_len / 2); 170 return key;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_vendor_test.c | 149 u8 *key; local 155 key = os_malloc(key_len); 156 if (key == NULL) 159 os_memset(key, 0x11, key_len / 2); 160 os_memset(key + key_len / 2, 0x22, key_len / 2); 163 return key;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 25 int private_key; /* whether private key is set */ 64 * crypto_rsa_import_public_key - Import an RSA public key 65 * @buf: Key buffer (DER encoded RSA public key) 66 * @len: Key buffer length in bytes 67 * Returns: Pointer to the public key or %NULL on failure 72 struct crypto_rsa_key *key; local 76 key = os_zalloc(sizeof(*key)); 77 if (key == NULL 136 struct crypto_rsa_key *key; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
preauth_auth.c | 198 const u8 *key; local 204 key = ieee802_1x_get_key(sta->eapol_sm, &len); 207 if (success && key) { 208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 22 u8 key[16]; member in struct:crypto_cipher::__anon15582::__anon15583 32 struct des3_key_s key; member in struct:crypto_cipher::__anon15582::__anon15585 45 const u8 *iv, const u8 *key, 58 if (key_len > sizeof(ctx->u.rc4.key)) { 63 os_memcpy(ctx->u.rc4.key, key, key_len); 70 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 75 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 89 des3_key_setup(key, &ctx->u.des3.key); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 35 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 54 "key passphrase"); 126 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 132 wpa_printf(MSG_INFO, "EAP-TLS: Failed to derive key"); 223 u8 *key; local 228 key = os_malloc(EAP_TLS_KEY_LEN); 229 if (key == NULL) 233 os_memcpy(key, data->key_data, EAP_TLS_KEY_LEN); 235 return key; 242 u8 *key; local [all...] |
eap_vendor_test.c | 150 u8 *key; local 156 key = os_malloc(key_len); 157 if (key == NULL) 160 os_memset(key, 0x11, key_len / 2); 161 os_memset(key + key_len / 2, 0x22, key_len / 2); 164 return key;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 143 u8 *key; local 149 key = os_malloc(key_len); 150 if (key == NULL) 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 157 return key;
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 18 int private_key; /* whether private key is set */ 56 * crypto_rsa_import_public_key - Import an RSA public key 57 * @buf: Key buffer (DER encoded RSA public key) 58 * @len: Key buffer length in bytes 59 * Returns: Pointer to the public key or %NULL on failure 64 struct crypto_rsa_key *key; local 68 key = os_zalloc(sizeof(*key)); 69 if (key == NULL 128 struct crypto_rsa_key *key; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_dict_helpers.h | 33 const char *key, const char *value); 36 const char *key, const char value); 39 const char *key, 43 const char *key, 47 const char *key, 51 const char *key, 55 const char *key, 59 const char *key, 63 const char *key, 67 const char *key, 136 const char *key; \/** key of the dict entry *\/ member in struct:wpa_dbus_dict_entry [all...] |
/frameworks/av/include/drm/ |
DrmConstraints.h | 68 * Iterator for key 119 String8 key = keyIt.next(); local 120 const char* value = this->getAsByteArray(&key); 137 * Adds constraint information as <key, value> pair to this instance 139 * @param[in] key Key to add 143 status_t put(const String8* key, const char* value); 146 * Retrieves the value of given key 148 * @param key Key whose value to be retrieve [all...] |
/frameworks/base/core/java/android/app/backup/ |
BackupDataInput.java | 43 * String key = data.getKey(); 46 * if (key.equals(MY_BACKUP_KEY_ONE)) { 54 * } else if (key.equals(MY_BACKUP_KEY_TO_IGNORE) { 55 * // a key we recognize but wish to discard 68 String key; field in class:BackupDataInput.EntityHeader 117 * Report the key associated with the current entity in the restore stream 118 * @return the current entity's key string 123 return mHeader.key;
|
FileBackupHelper.java | 96 String key = data.getKey(); local 97 if (isKeyInList(key, mFiles)) { 98 File f = new File(mFilesDir, key);
|
SharedPreferencesBackupHelper.java | 122 String key = data.getKey(); local 123 if (DEBUG) Log.d(TAG, "got entity '" + key + "' size=" + data.size()); 125 if (isKeyInList(key, mPrefGroups)) { 126 File f = context.getSharedPrefsFile(key).getAbsoluteFile();
|
/frameworks/base/core/jni/ |
android_backup_BackupDataInput.cpp | 70 String8 key; local 72 err = reader->ReadEntityHeader(&key, &dataSize); 77 jstring keyStr = env->NewStringUTF(key.string()); 140 s_keyField = env->GetFieldID(clazz, "key", "Ljava/lang/String;"); 142 "Unable to find key field in android.app.backup.BackupDataInput.EntityHeader");
|
android_os_SystemProperties.cpp | 34 const char* key; local 39 jniThrowNullPointerException(env, "key must not be null."); 43 key = env->GetStringUTFChars(keyJ, NULL); 45 len = property_get(key, buf, ""); 54 env->ReleaseStringUTFChars(keyJ, key); 70 const char* key; local 76 jniThrowNullPointerException(env, "key must not be null."); 80 key = env->GetStringUTFChars(keyJ, NULL); 82 len = property_get(key, buf, ""); 90 env->ReleaseStringUTFChars(keyJ, key); 100 const char* key; local 130 const char* key; local 166 const char* key; local [all...] |
/frameworks/compile/mclinker/unittests/ |
HashTableTest.cpp | 111 int key = 100; local 112 HashTableTy::entry_type* val = hashTable->insert(key, exist); 117 HashTableTy::iterator entry = hashTable->find(key); 129 for (unsigned int key=0; key<100; ++key) { 130 entry = hashTable->insert(key, exist); 134 EXPECT_EQ(key, entry->key()); 135 entry->setValue(key+10) 319 unsigned int key = 0; local [all...] |
/frameworks/native/opengl/libs/EGL/ |
trace.cpp | 54 GLenumString key = {e, ""}; local 56 &key, g_enumnames,
|
/frameworks/rs/ |
rsScriptC.cpp | 248 const char * key = mHal.info.exportedPragmaKeyList[i]; local 251 if (!strcmp(key, "version")) { 259 if (!strcmp(key, "stateVertex")) { 271 if (!strcmp(key, "stateRaster")) { 283 if (!strcmp(key, "stateFragment")) { 295 if (!strcmp(key, "stateStore")) {
|
/hardware/ti/wlan/mac80211/ti-utils/ |
misc_cmds.c | 26 struct nlattr *key; local 50 key = nla_nest_start(msg, NL80211_ATTR_TESTDATA); 51 if (!key) { 58 nla_nest_end(msg, key); 88 struct nlattr *key; 94 key = nla_nest_start(msg, NL80211_ATTR_TESTDATA); 95 if (!key) 101 nla_nest_end(msg, key);
|
/libcore/luni/src/main/java/java/net/ |
CookieManager.java | 209 String key = entry.getKey(); local 211 if (key != null && (key.equalsIgnoreCase(VERSION_ZERO_HEADER) 212 || key.equalsIgnoreCase(VERSION_ONE_HEADER))) {
|