/system/core/libnl_2/ |
socket.c | 27 int nl_socket_add_membership(struct nl_sock *sk, int group) 29 return setsockopt(sk->s_fd, SOL_NETLINK, 36 struct nl_sock *sk; local 40 sk = (struct nl_sock *) malloc(sizeof(struct nl_sock)); 41 if (!sk) 43 memset(sk, 0, sizeof(*sk)); 50 sk->s_seq_next = (int) tv.tv_sec; 53 sk->s_local.nl_family = AF_NETLINK; 54 sk->s_local.nl_pid = 0; /* Kernel fills in pid * 71 struct nl_sock *sk = _nl_socket_alloc(); local 90 struct nl_sock *sk = _nl_socket_alloc(); local [all...] |
netlink.c | 29 int nl_send_auto_complete(struct nl_sock *sk, struct nl_msg *msg) 45 nlh->nlmsg_pid = sk->s_local.nl_pid; 48 return nl_send(sk, msg); 57 int nl_recv(struct nl_sock *sk, struct sockaddr_nl *nla, \ 78 msg.msg_name = (void *) &sk->s_peer; 79 msg.msg_namelen = sizeof(sk->s_peer); 87 sk_flags = fcntl(sk->s_fd, F_GETFL, 0); 88 fcntl(sk->s_fd, F_SETFL, O_NONBLOCK); 89 rc = recvmsg(sk->s_fd, &msg, 0); 91 fcntl(sk->s_fd, F_SETFL, sk_flags) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSSecretKeyEntryTest.java | 42 SecretKey sk = null; local 44 new KeyStore.SecretKeyEntry(sk); 50 sk = new tmpSecretKey(); 52 KeyStore.SecretKeyEntry ske = new KeyStore.SecretKeyEntry(sk); 65 SecretKey sk = new tmpSecretKey(); local 66 KeyStore.SecretKeyEntry ske = new KeyStore.SecretKeyEntry(sk); 67 assertEquals("Incorrect SecretKey", sk, ske.getSecretKey()); 75 SecretKey sk = new tmpSecretKey(); local 76 KeyStore.SecretKeyEntry ske = new KeyStore.SecretKeyEntry(sk);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSSecretKeyEntryTest.java | 48 SecretKey sk = null; local 50 new KeyStore.SecretKeyEntry(sk); 61 SecretKey sk = new tmpSecretKey(); local 62 KeyStore.SecretKeyEntry ske = new KeyStore.SecretKeyEntry(sk); 63 assertEquals("Incorrect SecretKey", sk, ske.getSecretKey()); 71 SecretKey sk = new tmpSecretKey(); local 72 KeyStore.SecretKeyEntry ske = new KeyStore.SecretKeyEntry(sk);
|
/external/openssl/crypto/stack/ |
stack.h | 76 #define M_sk_num(sk) ((sk) ? (sk)->num:-1) 77 #define M_sk_value(sk,n) ((sk) ? (sk)->data[n] : NULL) 88 int sk_insert(_STACK *sk, void *data, int where); 98 int (*sk_set_cmp_func(_STACK *sk, int (*c)(const void *, const void *)))
|
stack.c | 80 int (*sk_set_cmp_func(_STACK *sk, int (*c)(const void *, const void *))) 83 int (*old)(const void *,const void *)=sk->comp; 85 if (sk->comp != c) 86 sk->sorted=0; 87 sk->comp=c; 92 _STACK *sk_dup(_STACK *sk) 97 if ((ret=sk_new(sk->comp)) == NULL) goto err; 99 (unsigned int)sizeof(char *)*sk->num_alloc); 103 ret->num=sk->num; 104 memcpy(ret->data,sk->data,sizeof(char *)*sk->num) [all...] |
/external/openssl/include/openssl/ |
stack.h | 76 #define M_sk_num(sk) ((sk) ? (sk)->num:-1) 77 #define M_sk_value(sk,n) ((sk) ? (sk)->data[n] : NULL) 88 int sk_insert(_STACK *sk, void *data, int where); 98 int (*sk_set_cmp_func(_STACK *sk, int (*c)(const void *, const void *)))
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SecretKeyTest.java | 40 checkSecretKey sk = new checkSecretKey(); local 42 sk.getSerVerUID(), //SecretKey.serialVersionUID
|
SecretKeyFactorySpiTest.java | 64 SecretKey sk = null; local 65 assertNull("Not null result", skfSpi.engineTranslateKey(sk)); 70 assertNull("Not null result", skfSpi.engineGetKeySpec(sk, null));
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SecretKeyFactorySpiTest.java | 57 SecretKey sk = null; local 58 assertNull("Not null result", skfSpi.engineTranslateKey(sk)); 63 assertNull("Not null result", skfSpi.engineGetKeySpec(sk, null));
|
/external/e2fsprogs/misc/ |
findsuper.c | 100 #define WHY(fmt, arg...) { printf("\r%Ld: " fmt, sk, ##arg) ; continue; } 116 loff_t sk=0, skl=0; local 163 sk = skl = strtoll(argv[optind], &s, 0) << 10; 171 if (sk < 0) { 172 fprintf(stderr, _("startkb should be positive, not %Lu\n"), sk); 183 printf(_("starting at %Lu, with %u byte increments\n"), sk, skiprate); 188 for (; lseek64(fd, sk, SEEK_SET) != -1 && 189 read(fd, &ext2, 512) == 512; sk += skiprate) { 194 if (sk && !(sk & (interval - 1))) [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SecretKeyTest.java | 48 checkSecretKey sk = new checkSecretKey(); local 50 sk.getSerVerUID(), //SecretKey.serialVersionUID
|
/external/kernel-headers/original/linux/ |
udp.h | 55 static inline struct udp_sock *udp_sk(const struct sock *sk) 57 return (struct udp_sock *)sk;
|
ipv6.h | 405 extern int inet6_sk_rebuild_header(struct sock *sk); 437 static inline struct raw6_sock *raw6_sk(const struct sock *sk) 439 return (struct raw6_sock *)sk; 453 #define __ipv6_only_sock(sk) (inet6_sk(sk)->ipv6only) 454 #define ipv6_only_sock(sk) ((sk)->sk_family == PF_INET6 && __ipv6_only_sock(sk)) 472 static inline struct inet6_timewait_sock *inet6_twsk(const struct sock *sk) 474 return (struct inet6_timewait_sock *)(((u8 *)sk) [all...] |
netlink.h | 179 extern void netlink_kernel_release(struct sock *sk); 180 extern int __netlink_change_ngroups(struct sock *sk, unsigned int groups); 181 extern int netlink_change_ngroups(struct sock *sk, unsigned int groups); 182 extern void __netlink_clear_multicast_users(struct sock *sk, unsigned int group); 183 extern void netlink_clear_multicast_users(struct sock *sk, unsigned int group); 185 extern int netlink_has_listeners(struct sock *sk, unsigned int group); 199 int netlink_attachskb(struct sock *sk, struct sk_buff *skb, 201 void netlink_detachskb(struct sock *sk, struct sk_buff *skb); 202 int netlink_sendskb(struct sock *sk, struct sk_buff *skb);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 14 sk = Math.sin(k); 21 a4 += 1.0/(k3 * sk*sk);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
math-partial-sums.js | 9 var k2 = k3 = sk = ck = 0.0; 14 sk = Math.sin(k); 21 a4 += 1.0/(k3 * sk*sk);
|
/external/icu4c/test/cintltst/ |
ccolltst.c | 55 static char* dumpSk(uint8_t *sourceKey, char *sk) { 59 *sk = 0; 62 sprintf(sk+2*i, "%02X", sourceKey[i]); 64 return sk; 123 char sk[10000]; local 124 log_verbose("SortKey1: %s\n", dumpSk(sourceKey, sk)); 125 log_verbose("SortKey2: %s\n", dumpSk(targetKey, sk));
|
/external/openssl/crypto/x509/ |
x509_v3.c | 84 int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, ASN1_OBJECT *obj, 90 if (sk == NULL) return(-1); 94 n=sk_X509_EXTENSION_num(sk); 97 ex=sk_X509_EXTENSION_value(sk,lastpos); 104 int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, 110 if (sk == NULL) return(-1); 114 n=sk_X509_EXTENSION_num(sk); 117 ex=sk_X509_EXTENSION_value(sk,lastpos); 148 STACK_OF(X509_EXTENSION) *sk=NULL; 158 if ((sk=sk_X509_EXTENSION_new_null()) == NULL [all...] |
x509name.c | 113 STACK_OF(X509_NAME_ENTRY) *sk; 118 sk=name->entries; 119 n=sk_X509_NAME_ENTRY_num(sk); 122 ne=sk_X509_NAME_ENTRY_value(sk,lastpos); 142 STACK_OF(X509_NAME_ENTRY) *sk; 147 sk=name->entries; 148 ret=sk_X509_NAME_ENTRY_delete(sk,loc); 149 n=sk_X509_NAME_ENTRY_num(sk); 155 set_prev=(sk_X509_NAME_ENTRY_value(sk,loc-1))->set; 158 set_next=sk_X509_NAME_ENTRY_value(sk,loc)->set [all...] |
x509_att.c | 83 int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, ASN1_OBJECT *obj, 89 if (sk == NULL) return(-1); 93 n=sk_X509_ATTRIBUTE_num(sk); 96 ex=sk_X509_ATTRIBUTE_value(sk,lastpos); 125 STACK_OF(X509_ATTRIBUTE) *sk=NULL; 135 if ((sk=sk_X509_ATTRIBUTE_new_null()) == NULL) 139 sk= *x; 143 if (!sk_X509_ATTRIBUTE_push(sk,new_attr)) 146 *x=sk; 147 return(sk); [all...] |
/external/openssl/crypto/conf/ |
conf_api.c | 251 STACK_OF(CONF_VALUE) *sk; 256 sk=(STACK_OF(CONF_VALUE) *)a->value; 257 for (i=sk_CONF_VALUE_num(sk)-1; i>=0; i--) 259 vv=sk_CONF_VALUE_value(sk,i); 264 if (sk != NULL) sk_CONF_VALUE_free(sk); 272 STACK_OF(CONF_VALUE) *sk=NULL; 276 if ((sk=sk_CONF_VALUE_new_null()) == NULL) 286 v->value=(char *)sk; 294 if (sk != NULL) sk_CONF_VALUE_free(sk) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.c | 121 u8 *sk, size_t sk_len, 184 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 185 os_memcpy(sk, pos, sk_len); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 214 * SK = GKDF-160 (MK, inputString)[128..143] 227 msk, emsk, sk, *sk_len, 236 u8 *sk, size_t *sk_len) 250 * SK = GKDF-160 (MK, inputString)[128..159] 261 msk, emsk, sk, *sk_len, 281 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 112 u8 *sk, size_t sk_len, 175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 176 os_memcpy(sk, pos, sk_len); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 205 * SK = GKDF-160 (MK, inputString)[128..143] 218 msk, emsk, sk, *sk_len, 227 u8 *sk, size_t *sk_len) 241 * SK = GKDF-160 (MK, inputString)[128..159] 252 msk, emsk, sk, *sk_len, 272 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes [all...] |
/external/openssl/crypto/engine/ |
eng_table.c | 66 STACK_OF(ENGINE) *sk; 69 /* Zero if 'sk' is newer than the cached 'funct', non-zero otherwise */ 153 fnd->sk = sk_ENGINE_new_null(); 154 if(!fnd->sk) 163 (void)sk_ENGINE_delete_ptr(fnd->sk, e); 165 if(!sk_ENGINE_push(fnd->sk, e)) 192 /* Iterate the 'c->sk' stack removing any occurance of 'e' */ 193 while((n = sk_ENGINE_find(pile->sk, e)) >= 0) 195 (void)sk_ENGINE_delete(pile->sk, n); 218 sk_ENGINE_free(p->sk); [all...] |