/external/chromium/crypto/ |
hmac_mac.cc | 23 bool HMAC::Init(const unsigned char *key, int key_length) { 30 plat_->key_.assign(reinterpret_cast<const char*>(key), key_length); local
|
/external/chromium_org/third_party/openssl/openssl/crypto/hmac/ |
hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
x509.h | 500 int key_length; member in struct:private_key_st [all...] |
/external/marisa-trie/tests/ |
c-test.c | 61 marisa_uint32 key_id, size_t key_length) { 64 ASSERT(key_length == 3); 70 marisa_uint32 key_id, const char *key, size_t key_length) { 75 ASSERT(key_length == 3); 81 ASSERT(key_length == 5); 96 size_t key_length; local 138 key_ids[i], key_buf, sizeof(key_buf), &key_length) == MARISA_OK); 139 ASSERT(key_length == strlen(keys[i]));
|
trie-test.cc | 17 bool operator()(marisa::UInt32 key_id, std::size_t key_length) const { 19 key_lengths_->push_back(key_length); 90 std::size_t key_length; local 92 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 96 ASSERT(key_length == keys[i].length()); 200 std::size_t key_length; local 202 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 206 ASSERT(key_length == keys[i].length()); 210 key_length = trie.restore(key_ids[0], NULL, 0); 212 ASSERT(key_length == keys[0].length()) 432 std::size_t key_length; local 588 std::size_t key_length; local [all...] |
/external/marisa-trie/v0_1_5/tests/ |
c-test.c | 66 marisa_alpha_uint32 key_id, size_t key_length) { 69 ASSERT(key_length == 3); 75 marisa_alpha_uint32 key_id, const char *key, size_t key_length) { 80 ASSERT(key_length == 3); 86 ASSERT(key_length == 5); 101 size_t key_length; local 146 key_ids[i], key_buf, sizeof(key_buf), &key_length) == MARISA_ALPHA_OK); 147 ASSERT(key_length == strlen(keys[i]));
|
trie-test.cc | 17 bool operator()(marisa_alpha::UInt32 key_id, std::size_t key_length) const { 19 key_lengths_->push_back(key_length); 91 std::size_t key_length; local 93 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 97 ASSERT(key_length == keys[i].length()); 202 std::size_t key_length; local 204 key_length = trie.restore(key_ids[i], key_buf, sizeof(key_buf)); 208 ASSERT(key_length == keys[i].length()); 212 key_length = trie.restore(key_ids[0], NULL, 0); 214 ASSERT(key_length == keys[0].length()) 450 std::size_t key_length; local 606 std::size_t key_length; local [all...] |
/external/openssl/crypto/hmac/ |
hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/openssl/include/openssl/ |
hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
x509.h | 500 int key_length; member in struct:private_key_st [all...] |
/external/chromium_org/net/disk_cache/simple/ |
simple_entry_format.h | 39 uint32 key_length; member in struct:disk_cache::SimpleFileHeader
|
/external/chromium_org/ui/base/accelerators/ |
accelerator.cc | 251 int key_length = static_cast<int>(shortcut_rtl.length()); local 252 DCHECK_GT(key_length, 0); 256 shortcut_rtl.append(shortcut, 0, shortcut.length() - key_length - 1);
|
/external/wpa_supplicant_8/src/common/ |
eapol_common.h | 55 /* Note: key_length is unaligned */ 56 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 70 * key field (of key_length bytes) contains the key in encrypted form; 71 * if packet body length = 44, key field is absent and key_length
|
wpa_common.h | 166 /* Note: key_info, key_length, and key_data_length are unaligned */ 168 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
memtable.cc | 123 uint32_t key_length; local 124 const char* key_ptr = GetVarint32Ptr(entry, entry+5, &key_length); 126 Slice(key_ptr, key_length - 8), 129 const uint64_t tag = DecodeFixed64(key_ptr + key_length - 8); 132 Slice v = GetLengthPrefixedSlice(key_ptr + key_length);
|
/external/chromium_org/media/cdm/ |
aes_decryptor.cc | 166 int key_length, 171 CHECK_GT(key_length, 0); 175 if (key_length != DecryptConfig::kDecryptionKeySize) { 176 DVLOG(1) << "Invalid key length: " << key_length; 193 std::string key_string(reinterpret_cast<const char*>(key) , key_length); local
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
cache.cc | 32 size_t key_length; member in struct:leveldb::__anon13680::LRUHandle 43 return Slice(key_data, key_length); 235 e->key_length = key.size();
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509.h | 500 int key_length; member in struct:private_key_st [all...] |
/external/openssl/crypto/x509/ |
x509.h | 500 int key_length; member in struct:private_key_st [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
bt_amp_hci.h | 94 uint8 key_length; member in struct:phy_link_cmd_parms
|
802.11.h | 1982 uint8 key_length; member in struct:dot11_wnm_sleep_subelem_gtk [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
reiserfs_fs.h | 419 int key_length; /* 3 in all cases but direct2indirect and member in struct:cpu_key [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
reiserfs_fs.h | 419 int key_length; /* 3 in all cases but direct2indirect and member in struct:cpu_key [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
reiserfs_fs.h | 419 int key_length; /* 3 in all cases but direct2indirect and member in struct:cpu_key [all...] |