/packages/inputmethods/PinyinIME/src/com/android/inputmethod/pinyin/ |
SkbContainer.java | 311 private void responseKeyEvent(SoftKey sKey) { 312 if (null == sKey) return; 313 ((PinyinIME) mService).responseSoftKeyEvent(sKey);
|
PinyinIME.java | [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
t_x509a.c | 102 BIO_printf(out, "%*sKey Id: ", indent, "");
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 162 symmetric_key skey; local 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey); 218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 22 symmetric_key skey; member in struct:fortuna_prng
|
/external/openssh/ |
Android.mk | 114 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|
monitor.c | 55 #ifdef SKEY 56 #include <skey.h> 243 #ifdef SKEY 291 #ifdef SKEY 936 #ifdef SKEY 940 struct skey skey; local 944 success = _compat_skeychallenge(&skey, authctxt->user, challenge, 979 auth_method = "skey"; [all...] |
hostfile.c | 305 debug3("%s: found %skey type %s in file %s:%lu", __func__,
|
monitor_wrap.c | 1005 #ifdef SKEY 1064 #endif /* SKEY */ [all...] |
Makefile.in | 85 auth-skey.o auth-bsdauth.o auth2-hostbased.o auth2-kbdint.o \
|
configure.ac | [all...] |
config.h | [all...] |
config.h.in | [all...] |
ssh_config.0 | 408 and ``skey''. [all...] |
/external/openssl/crypto/asn1/ |
t_x509a.c | 102 BIO_printf(out, "%*sKey Id: ", indent, "");
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 259 symmetric_key skey; local 267 #define DO1(k) func(k, kl, 0, &skey); 1288 symmetric_key skey; local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 579 KeyStoreTestSupport.SKey secKey = new KeyStoreTestSupport.SKey("DSA", 581 KeyStore.SecretKeyEntry sKey = new KeyStore.SecretKeyEntry( 593 kss[i].setEntry(aliases[j], sKey, pPath); [all...] |
/external/chromium_org/third_party/usrsctp/overrides/usrsctplib/netinet/ |
sctp_auth.h | 145 extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
|
/external/antlr/antlr-3.4/runtime/C/include/ |
antlr3collections.h | 49 pANTLR3_UINT8 sKey; /**< Used if type is ANTLR3_HASH_TYPE_STR */ 354 struct ANTLR3_INT_TRIE_NODE_struct * leftN; /**< Pointer to the left node from here when sKey & bitNum = 0 */ 355 struct ANTLR3_INT_TRIE_NODE_struct * rightN; /**< Pointer to the right node from here when sKey & bitNum, = 1 */
|
/external/antlr/antlr-3.4/runtime/C/src/ |
antlr3collections.c | 238 if (entry->keybase.type == ANTLR3_HASH_TYPE_STR && entry->keybase.key.sKey != NULL) 240 ANTLR3_FREE(entry->keybase.key.sKey); 359 if (strcmp((const char *)key, (const char *)entry->keybase.key.sKey) == 0) 371 ANTLR3_FREE(entry->keybase.key.sKey); 373 entry->keybase.key.sKey = NULL; 505 if (strcmp((const char *)key, (const char *)entry->keybase.key.sKey) == 0) 624 if (strcmp((const char*) key, (const char *)(*newPointer)->keybase.key.sKey) == 0) 652 entry->keybase.key.sKey = ANTLR3_STRDUP(key); /* Record the key value */ 656 entry->keybase.key.sKey = key; /* Record the key value */ [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 418 symmetric_key *skey); 424 If the function returns successfully the variable \textit{skey} will have a scheduled key stored in it. It's important to note 437 symmetric_key *skey); 441 symmetric_key *skey); 489 void XXX_done(symmetric_key *skey); 505 symmetric_key skey; 515 &skey) /* where to put the scheduled key */ 524 &skey); /* our previously scheduled key */ 531 &skey); /* our previously scheduled key */ 536 blowfish_done(&skey); [all...] |
/prebuilts/devtools/tools/lib/ |
jobb.jar | |
/external/chromium/third_party/libevent/ |
http.c | 1493 char *skey, *svalue; local [all...] |
/external/chromium_org/third_party/libevent/ |
http.c | 1493 char *skey, *svalue; local [all...] |
/external/valgrind/main/exp-sgcheck/ |
sg_main.c | [all...] |