/external/chromium_org/base/process/ |
process_handle_openbsd.cc | 31 struct kinfo_proc kp; local 39 if (sysctl(mib, arraysize(mib), &kp, &len, NULL, 0) < 0) 41 if ((kp.p_flag & P_SYSTEM) != 0) 43 if (strcmp(kp.p_comm, "chrome") == 0) 44 return FilePath(kp.p_comm);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGeneratorSpiTest.java | 76 KeyPair kp = keyPairGen.generateKeyPair(); local 77 assertNull("Not null KeyPair", kp);
|
KeyPairGenerator3Test.java | 97 KeyPair kp, kp1; local 101 kp = kpg[i].generateKeyPair(); 103 assertFalse("Incorrect private key", kp.getPrivate().equals( 105 assertFalse("Incorrect public key", kp.getPublic().equals( 123 KeyPair kp, kp1; local 125 kp = kpg[i].generateKeyPair(); 127 assertFalse("Incorrect private key", kp.getPrivate().equals( 129 assertFalse("Incorrect public key", kp.getPublic().equals(
|
SignerTest.java | 57 KeyPair kp = new KeyPair(new PublicKeyStub("public", "SignerTest.testToString", null), new PrivateKeyStub("private", "SignerTest.testToString", null)); local 58 s1.setKeyPair(kp); 61 s2.setKeyPair(kp); 103 KeyPair kp = new KeyPair(publicKey, privateKey); local 109 s.setKeyPair(kp);
|
KeyPairGenerator1Test.java | 321 KeyPair kp, kp1; local 324 kp = kpg[i].generateKeyPair(); 327 assertFalse("Incorrect private key", kp.getPrivate().equals( 329 assertFalse("Incorrect public key", kp.getPublic().equals(
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGeneratorSpiTest.java | 72 KeyPair kp = keyPairGen.generateKeyPair(); local 73 assertNull("Not null KeyPair", kp);
|
KeyPairGenerator3Test.java | 98 KeyPair kp, kp1; local 102 kp = kpg[i].generateKeyPair(); 104 assertFalse("Incorrect private key", kp.getPrivate().equals( 106 assertFalse("Incorrect public key", kp.getPublic().equals( 124 KeyPair kp, kp1; local 126 kp = kpg[i].generateKeyPair(); 128 assertFalse("Incorrect private key", kp.getPrivate().equals( 130 assertFalse("Incorrect public key", kp.getPublic().equals(
|
SignerTest.java | 65 KeyPair kp = new KeyPair(new PublicKeyStub("public", "SignerTest.testToString", null), local 67 s1.setKeyPair(kp); 70 s2.setKeyPair(kp); 129 KeyPair kp = new KeyPair(publicKey, privateKey); local 135 s.setKeyPair(kp); 153 KeyPair kp = new KeyPair(null, null); local 155 s.setKeyPair(kp);
|
KeyPairGenerator1Test.java | 320 KeyPair kp, kp1; local 323 kp = kpg[i].generateKeyPair(); 326 assertFalse("Incorrect private key", kp.getPrivate().equals( 328 assertFalse("Incorrect public key", kp.getPublic().equals(
|
/ndk/sources/cxx-stl/llvm-libc++/libcxx/test/numerics/rand/rand.dis/rand.dist.samp/rand.dist.samp.plinear/ |
eval.pass.cpp | 59 int kp = -1; local 78 if (k != kp) 86 kp = k; 109 int kp = -1; 128 if (k != kp) 136 kp = k; 159 int kp = -1; 178 if (k != kp) 186 kp = k; 209 int kp = -1 [all...] |
eval_param.pass.cpp | 58 int kp = -1; local 77 if (k != kp) 85 kp = k;
|
/external/chromium_org/third_party/smhasher/src/ |
DifferentialTest.h | 33 keytype kp = diffs[0]; local 37 if(diffs[i] == kp) 52 printbits((unsigned char*)&kp,sizeof(kp)); 61 kp = diffs[i]; 72 printbits((unsigned char*)&kp,sizeof(kp));
|
/libcore/crypto/src/test/java/org/conscrypt/ |
SignatureTest.java | 95 KeyPair kp = new KeyPair(pubKey, privKey); local 101 test_Signature(sig1, kp);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSAThread.java | 38 KeyPair kp = kpg.generateKeyPair(); local 42 cip.init(Cipher.ENCRYPT_MODE, kp.getPublic()); 45 cip.init(Cipher.DECRYPT_MODE, kp.getPrivate());
|
/developers/samples/android/security/keystore/BasicAndroidKeyStore/BasicAndroidKeyStoreSample/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 189 KeyPair kp = kpGenerator.generateKeyPair(); local 190 Log.d(TAG, "Public Key is: " + kp.getPublic().toString());
|
/development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 189 KeyPair kp = kpGenerator.generateKeyPair(); local 190 Log.d(TAG, "Public Key is: " + kp.getPublic().toString());
|
/external/dropbear/libtomcrypt/src/ciphers/ |
skipjack.c | 91 tmp = g_func(w1, &kp, skey->skipjack.key); \ 97 tmp = g_func(w1, &kp, skey->skipjack.key); \ 104 w1 = ig_func(w2, &kp, skey->skipjack.key); \ 108 tmp = ig_func(w2, &kp, skey->skipjack.key); \ 112 static unsigned g_func(unsigned w, int *kp, unsigned char *key) 117 g1 ^= sbox[g2^key[*kp]]; *kp = keystep[*kp]; 118 g2 ^= sbox[g1^key[*kp]]; *kp = keystep[*kp] 150 int x, kp; local 214 int x, kp; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
PacketKexInit.java | 23 KexParameters kp = new KexParameters(); field in class:PacketKexInit 27 kp.cookie = new byte[16]; 28 rnd.nextBytes(kp.cookie); 30 kp.kex_algorithms = cwl.kexAlgorithms; 31 kp.server_host_key_algorithms = cwl.serverHostKeyAlgorithms; 32 kp.encryption_algorithms_client_to_server = cwl.c2s_enc_algos; 33 kp.encryption_algorithms_server_to_client = cwl.s2c_enc_algos; 34 kp.mac_algorithms_client_to_server = cwl.c2s_mac_algos; 35 kp.mac_algorithms_server_to_client = cwl.s2c_mac_algos; 36 kp.compression_algorithms_client_to_server = new String[] { "none" } [all...] |
/external/jpeg/ |
ansi2knr.c | 514 char *kp; local 517 while ( (kp = *key) != 0 ) 518 { if ( strlen(kp) == len && !strncmp(kp, buf, len) )
|
/external/qemu/distrib/jpeg-6b/ |
ansi2knr.c | 514 char *kp; local 517 while ( (kp = *key) != 0 ) 518 { if ( strlen(kp) == len && !strncmp(kp, buf, len) )
|
/external/tcpdump/ |
print-krb.c | 155 register const struct krb *kp; local 161 #define IS_LENDIAN(kp) (((kp)->type & 0x01) != 0) 162 #define KTOHSP(kp, cp) (IS_LENDIAN(kp) ? EXTRACT_LE_16BITS(cp) : EXTRACT_16BITS(cp)) 164 kp = (struct krb *)cp; 166 if ((&kp->type) >= snapend) { 171 type = kp->type & (0xFF << 1); 174 IS_LENDIAN(kp) ? "le" : "be", tok2str(type2str, NULL, type)); 205 len = KTOHSP(kp, cp) 232 register const struct krb *kp; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
KexManager.java | 257 PacketKexInit kp = new PacketKexInit(nextKEXcryptoWishList, rnd); local 258 kxs.localKEX = kp; 259 tm.sendKexMessage(kp.getPayload()); 464 PacketKexDHInit kp = new PacketKexDHInit(kxs.dhx.getE()); local 465 tm.sendKexMessage(kp.getPayload());
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/ |
KerberosKeyTest.java | 151 KerberosPrincipal kp = new KerberosPrincipal( local 154 key = new KerberosKey(kp, ((String) element[1]).toCharArray(),
|
/external/clang/test/FixIt/ |
fixit-cxx0x.cpp | 91 int *ip; char *kp; member in namespace:TestMisplacedEllipsisRecovery 97 int e = me.e(&ip, &kp);
|
/ndk/sources/host-tools/make-3.81/ |
ansi2knr.c | 512 char *kp; local 515 while ( (kp = *key) != 0 ) 516 { if ( strlen(kp) == len && !strncmp(kp, buf, len) )
|