/external/chromium_org/net/quic/crypto/ |
channel_id_nss.cc | 45 unsigned char key_buf[65]; local 46 key_buf[0] = 0x04; 47 memcpy(&key_buf[1], key.data(), key.size()); 49 public_key.u.ec.publicValue.data = key_buf; 50 public_key.u.ec.publicValue.len = sizeof(key_buf);
|
/external/marisa-trie/tests/ |
c-test.c | 95 char key_buf[16]; local 138 key_ids[i], key_buf, sizeof(key_buf), &key_length) == MARISA_OK); 140 ASSERT(strcmp(key_buf, keys[i]) == 0);
|
trie-test.cc | 89 char key_buf[256]; local 92 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 97 ASSERT(keys[i] == key_buf); 199 char key_buf[256]; local 202 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 207 ASSERT(keys[i] == key_buf); 215 key_length = trie.restore(key_ids[0], key_buf, 5); 219 key_length = trie.restore(key_ids[0], key_buf, 6) 431 char key_buf[256]; local 587 char key_buf[256]; local [all...] |
/external/marisa-trie/v0_1_5/tests/ |
c-test.c | 100 char key_buf[16]; local 146 key_ids[i], key_buf, sizeof(key_buf), &key_length) == MARISA_ALPHA_OK); 148 ASSERT(strcmp(key_buf, keys[i]) == 0);
|
trie-test.cc | 90 char key_buf[256]; local 93 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 98 ASSERT(keys[i] == key_buf); 201 char key_buf[256]; local 204 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 209 ASSERT(keys[i] == key_buf); 217 key_length = trie.restore(key_ids[0], key_buf, 5); 221 key_length = trie.restore(key_ids[0], key_buf, 6) 449 char key_buf[256]; local 605 char key_buf[256]; local [all...] |
/external/chromium_org/remoting/base/ |
rsa_key_pair.cc | 47 std::vector<uint8> key_buf(key_str.begin(), key_str.end()); 49 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_buf)); 62 std::vector<uint8> key_buf; local 63 CHECK(key_->ExportPrivateKey(&key_buf)); 64 std::string key_str(key_buf.begin(), key_buf.end());
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 265 u8 key_buf[EAP_MSK_LEN + EAP_EMSK_LEN]; local 293 key_buf, sizeof(key_buf)); 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
|
/external/marisa-trie/lib/marisa/ |
trie-search.cc | 57 std::size_t Trie::restore(UInt32 key_id, char *key_buf, 61 MARISA_THROW_IF((key_buf == NULL) && (key_buf_size != 0), 63 return restore_(key_id, key_buf, key_buf_size); 295 std::size_t Trie::restore_(UInt32 key_id, char *key_buf, 303 trie_->trie_restore(get_link(node), key_buf, key_buf_size, pos); local 305 tail_restore(node, key_buf, key_buf_size, pos); 308 std::reverse(key_buf + prev_pos, key_buf + pos); 312 key_buf[pos] = labels_[node]; 319 key_buf[pos] = '\0' 330 trie_->trie_restore(get_link(node), key_buf, key_buf_size, pos); local [all...] |
/external/marisa-trie/v0_1_5/lib/marisa_alpha/ |
trie-search.cc | 57 std::size_t Trie::restore(UInt32 key_id, char *key_buf, 61 MARISA_ALPHA_THROW_IF((key_buf == NULL) && (key_buf_size != 0), 63 return restore_(key_id, key_buf, key_buf_size); 314 std::size_t Trie::restore_(UInt32 key_id, char *key_buf, 322 trie_->trie_restore(get_link(node), key_buf, key_buf_size, pos); local 324 tail_restore(node, key_buf, key_buf_size, pos); 327 std::reverse(key_buf + prev_pos, key_buf + pos); 331 key_buf[pos] = labels_[node]; 338 key_buf[pos] = '\0' 349 trie_->trie_restore(get_link(node), key_buf, key_buf_size, pos); local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 824 u8 key_buf[32], rsc[6]; local 873 os_memcpy(key_buf, _key, 16); 874 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 875 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8); 876 _key = key_buf; [all...] |
/system/vold/ |
cryptfs.c | 992 unsigned char key_buf[KEY_LEN_BYTES]; local 998 read(fd, key_buf, sizeof(key_buf)); 1003 return encrypt_master_key(passwd, salt, key_buf, master_key, crypt_ftr); [all...] |