/external/iproute2/ip/ |
link_vti.c | 58 unsigned ikey = 0; local 100 ikey = *(__u32 *)RTA_DATA(vtiinfo[IFLA_VTI_IKEY]); 131 ikey = okey = uval; 132 } else if (!matches(*argv, "ikey")) { 140 fprintf(stderr, "invalid value for \"ikey\": \"%s\"; it should be an unsigned integer\n", *argv); 145 ikey = uval; 189 addattr32(n, 1024, IFLA_VTI_IKEY, ikey); 239 fprintf(f, "ikey %s ", s2);
|
link_vti6.c | 56 unsigned ikey = 0; local 96 ikey = rta_getattr_u32(vtiinfo[IFLA_VTI_IKEY]); 127 ikey = okey = uval; 128 } else if (!matches(*argv, "ikey")) { 136 fprintf(stderr, "invalid value for \"ikey\": \"%s\"; it should be an unsigned integer\n", *argv); 141 ikey = uval; 186 addattr32(n, 1024, IFLA_VTI_IKEY, ikey); 236 fprintf(f, "ikey %s ", s2);
|
link_gre6.c | 74 unsigned ikey = 0; local 120 ikey = rta_getattr_u32(greinfo[IFLA_GRE_IKEY]); 171 ikey = okey = uval; 172 } else if (!matches(*argv, "ikey")) { 181 fprintf(stderr, "invalid value of \"ikey\"\n"); 186 ikey = uval; 282 addattr32(n, 1024, IFLA_GRE_IKEY, ikey); 376 fprintf(f, "ikey %s ", s2);
|
link_gre.c | 64 unsigned ikey = 0; local 114 ikey = rta_getattr_u32(greinfo[IFLA_GRE_IKEY]); 175 ikey = okey = uval; 176 } else if (!matches(*argv, "ikey")) { 185 fprintf(stderr, "invalid value for \"ikey\": \"%s\"; it should be an unsigned integer\n", *argv); 190 ikey = uval; 305 if (!ikey && IN_MULTICAST(ntohl(daddr))) { 306 ikey = daddr; 318 addattr32(n, 1024, IFLA_GRE_IKEY, ikey); 407 fprintf(f, "ikey %s ", s2) [all...] |
/external/mesa3d/src/mesa/program/ |
prog_cache.c | 60 const GLuint *ikey = (const GLuint *) key; local 67 for (i = 0; i < key_size / sizeof(*ikey); i++) 69 hash += ikey[i];
|
/external/mesa3d/src/gallium/auxiliary/cso_cache/ |
cso_cache.c | 50 unsigned *ikey = (unsigned *)key; local 58 hash ^= ikey[i];
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 56 GLuint *ikey = (GLuint *)item->key; local 64 hash ^= ikey[i];
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl_ocsp.c | 398 ASN1_BIT_STRING *ikey; local 435 ikey = X509_get0_pubkey_bitstr(issuer); 436 if (!ikey || 437 !EVP_Digest(ikey->data, ikey->length, md, &len, dgst, NULL) ||
|
/external/boringssl/src/crypto/x509/ |
x509_vfy.c | 1487 EVP_PKEY *ikey = NULL; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 238 u8 *ikey; local 239 ikey = os_malloc(hapd->conf->individual_wep_key_len); 240 if (ikey == NULL || 241 random_get_bytes(ikey, hapd->conf->individual_wep_key_len)) 245 os_free(ikey); 250 ikey, hapd->conf->individual_wep_key_len); 252 ieee802_1x_tx_key_one(hapd, sta, 0, 0, ikey, 258 sta->addr, 0, 1, NULL, 0, ikey, 264 os_free(ikey); [all...] |
/system/vold/ |
cryptfs.c | 1333 unsigned char ikey[32+32] = { 0 }; \/* Big enough to hold a 256 bit key and 256 bit IV *\/ local 1418 unsigned char ikey[32+32] = { 0 }; \/* Big enough to hold a 256 bit key and 256 bit IV *\/ local [all...] |
/external/clang/lib/Serialization/ |
ASTReader.cpp | 1516 internal_key_type ikey = {FE->getSize(), local [all...] |
/prebuilts/tools/common/m2/repository/net/sourceforge/htmlunit/htmlunit-core-js/2.14/ |
htmlunit-core-js-2.14.jar | |
/prebuilts/tools/common/m2/repository/org/mozilla/rhino/1.7R3/ |
rhino-1.7R3.jar | |