/external/srtp/crypto/test/ |
auth_driver.c | 62 /* key1 is for TAG_WORDS = 2 */ 64 const uint16_t key1[47] = { variable 139 status = auth_init(a, (uint8_t *)key1);
|
/external/icu4c/test/cintltst/ |
chashtst.c | 28 static UBool U_EXPORT2 U_CALLCONV isEqualChars(const UHashTok key1, const UHashTok key2); 326 static UBool U_EXPORT2 U_CALLCONV isEqualChars(const UHashTok key1, const UHashTok key2) { 327 return (UBool)((key1.pointer != NULL) && 329 (uprv_strcmp((const char*)key1.pointer, (const char*)key2.pointer) == 0));
|
/external/skia/third_party/glu/libtess/ |
dict.c | 48 int (*leq)(void *frame, DictKey key1, DictKey key2) )
|
/external/apache-harmony/text/src/test/java/org/apache/harmony/text/tests/java/text/ |
RuleBasedCollatorTest.java | 105 CollationKey key1 = coll.getCollationKey(source); local 106 assertEquals(source, key1.getSourceString()); 110 assertTrue(key1.compareTo(key2) > 0);
|
/external/icu4c/common/ |
uhash.c | 922 const UHashTok key1 = elem1->key; local 928 const UHashElement* elem2 = _uhash_find(hash2, key1, hash2->keyHasher(key1)); 942 uhash_compareUChars(const UHashTok key1, const UHashTok key2) { 943 const UChar *p1 = (const UChar*) key1.pointer; 959 uhash_compareChars(const UHashTok key1, const UHashTok key2) { 960 const char *p1 = (const char*) key1.pointer; 976 uhash_compareIChars(const UHashTok key1, const UHashTok key2) { 977 const char *p1 = (const char*) key1.pointer; [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 93 const AES_KEY *key1, const AES_KEY *key2, 136 size_t len, const AES_KEY *key1, 139 size_t len, const AES_KEY *key1, 149 const AES_KEY *key1, const AES_KEY *key2, 152 const AES_KEY *key1, const AES_KEY *key2, 206 const AES_KEY *key1, const AES_KEY *key2, 212 const AES_KEY *key1, const AES_KEY *key2, 373 xctx->xts.key1 = &xctx->ks1; 1046 /* key1 and key2 are used as an indicator both key and IV are set */ 1047 xctx->xts.key1 = NULL [all...] |
/external/libvpx/examples/includes/HTML-Toc-0.91/ |
TocUpdator.pm | 90 my ($key1, $value1, $key2, $value2, $result); 94 HASH1: while (($key1, $value1) = each %$aHash1) { 97 if ($value1 ne $aHash2->{$key1}) {
|
/external/chromium/net/server/ |
http_server.cc | 77 std::string key1 = GetHeaderValue(request, "Sec-WebSocket-Key1"); 80 uint32 fp1 = WebSocketKeyFingerprint(key1); 392 std::string key1 = GetHeaderValue(request, "Sec-WebSocket-Key1"); local 402 if (!key1.empty() && !key2.empty()) {
|
/external/icu4c/test/intltest/ |
regcoll.cpp | 1136 uint8_t key1[100], key2[100]; local 1139 len1 = calcKeyIncremental(coll, text1[i], -1, key1, sizeof(key1), status); 1150 if (len1 == len2 && uprv_memcmp(key1, key2, len1) == 0) { 1151 errln(UnicodeString("Failed: Identical key\n") + " text1: " + text1[i] + "\n" + " text2: " + text2[i] + "\n" + " key : " + TestUtility::hex(key1, len1)); 1153 logln(UnicodeString("Keys produced -\n") + " text1: " + text1[i] + "\n" + " key1 : " + TestUtility::hex(key1, len1) + "\n" + " text2: " + text2[i] + "\n" + " key2 : " 1192 CollationKey key1, key2; local [all...] |
/external/v8/src/ |
serialize.h | 125 static bool Match(void* key1, void* key2) { return key1 == key2; } 434 static bool SerializationMatchFun(void* key1, void* key2) { 435 return key1 == key2;
|
interface.cc | 35 static bool Match(void* key1, void* key2) { 36 String* name1 = *static_cast<String**>(key1);
|
/external/openssl/crypto/des/ |
des.h | 231 void DES_string_to_2keys(const char *str,DES_cblock *key1,DES_cblock *key2); 239 int DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt,
|
/external/openssl/include/openssl/ |
des.h | 231 void DES_string_to_2keys(const char *str,DES_cblock *key1,DES_cblock *key2); 239 int DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt,
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 484 private boolean matchKeys(Object key1, Object key2) 486 if ((key1 instanceof RSAPublicKey) && (key2 instanceof RSAPublicKey)) 488 RSAPublicKey savedRSAKey = (RSAPublicKey) key1; 504 if ((key1 instanceof DSAPublicKey) && (key2 instanceof DSAPublicKey)) 506 DSAPublicKey savedDSAKey = (DSAPublicKey) key1;
|
/external/chromium/net/websockets/ |
websocket_handshake_handler.cc | 207 request_info.extra_headers.GetHeader("Sec-WebSocket-Key1", &key); 208 request_info.extra_headers.RemoveHeader("Sec-WebSocket-Key1"); 226 std::string key1; local 239 "sec-websocket-key1")) { 241 key1 = iter.values(); 262 GetKeyNumber(key1, challenge);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
ExemptionMechanismTest.java | 143 Key key1 = new MyExemptionMechanismSpi().new tmpKey("Proba", local 145 assertFalse(em.isCryptoAllowed(key1)); 147 em.init(key1);
|
/external/openssl/crypto/modes/ |
modes_lcl.h | 121 void *key1, *key2; member in struct:xts128_context
|
/external/stlport/test/unit/ |
map_test.cpp | 367 Key key1(1), key2(2), key3(3), key4(4); 368 cont.insert(value(&key1, 1)); 416 Key key1(1), key2(2), key3(3), key4(4); 417 cont.insert(value(&key1, 1));
|
set_test.cpp | 422 Key key1(1), key2(2), key3(3), key4(4); 423 keySet.insert(&key1); 469 Key key1(1), key2(2), key3(3), key4(4); 470 keySet.insert(&key1);
|
/ndk/tests/device/test-gnustl-full/unit/ |
map_test.cpp | 367 Key key1(1), key2(2), key3(3), key4(4); 368 cont.insert(value(&key1, 1)); 416 Key key1(1), key2(2), key3(3), key4(4); 417 cont.insert(value(&key1, 1));
|
set_test.cpp | 422 Key key1(1), key2(2), key3(3), key4(4); 423 keySet.insert(&key1); 469 Key key1(1), key2(2), key3(3), key4(4); 470 keySet.insert(&key1);
|
/ndk/tests/device/test-stlport/unit/ |
map_test.cpp | 367 Key key1(1), key2(2), key3(3), key4(4); 368 cont.insert(value(&key1, 1)); 416 Key key1(1), key2(2), key3(3), key4(4); 417 cont.insert(value(&key1, 1));
|
set_test.cpp | 422 Key key1(1), key2(2), key3(3), key4(4); 423 keySet.insert(&key1); 469 Key key1(1), key2(2), key3(3), key4(4); 470 keySet.insert(&key1);
|
/external/webkit/LayoutTests/dom/xhtml/level3/core/ |
nodegetuserdata01.js | 98 userData = doc.getUserData("key1");
|
nodegetuserdata02.js | 98 userData = doc.getUserData("key1");
|