/external/srtp/crypto/rng/ |
ctr_prng.c | 54 uint8_t tmp_key[32]; local 64 status = random_source(tmp_key, 32); 69 status = aes_icm_context_init(&ctr_prng.state, tmp_key);
|
prng.c | 54 v128_t tmp_key; local 64 status = random_source((uint8_t *)&tmp_key, 16); 69 aes_expand_encryption_key(&tmp_key, x917_prng.key);
|
/external/selinux/libsepol/src/ |
boolean_record.c | 25 sepol_bool_key_t *tmp_key = local 28 if (!tmp_key) { 33 tmp_key->name = name; 35 *key_ptr = tmp_key;
|
iface_record.c | 31 sepol_iface_key_t *tmp_key = local 34 if (!tmp_key) { 39 tmp_key->name = name; 41 *key_ptr = tmp_key;
|
port_record.c | 33 sepol_port_key_t *tmp_key = local 36 if (!tmp_key) { 41 tmp_key->low = low; 42 tmp_key->high = high; 43 tmp_key->proto = proto; 45 *key_ptr = tmp_key;
|
user_record.c | 34 sepol_user_key_t *tmp_key = local 37 if (!tmp_key) { 43 tmp_key->name = name; 45 *key_ptr = tmp_key;
|
node_record.c | 238 sepol_node_key_t *tmp_key = local 240 if (!tmp_key) 243 if (node_alloc_addr(handle, proto, &tmp_key->addr, &tmp_key->addr_sz) < 246 if (node_parse_addr(handle, addr, proto, tmp_key->addr) < 0) 249 if (node_alloc_addr(handle, proto, &tmp_key->mask, &tmp_key->mask_sz) < 252 if (node_parse_addr(handle, mask, proto, tmp_key->mask) < 0) 255 tmp_key->proto = proto; 257 *key_ptr = tmp_key; 288 sepol_node_key_t *tmp_key = local [all...] |
assertion.c | 147 avtab_key_t tmp_key; local 157 memcpy(&tmp_key, k, sizeof(avtab_key_t)); 158 tmp_key.specified = AVTAB_XPERMS_ALLOWED; 166 tmp_key.source_type = i + 1; 167 tmp_key.target_type = j + 1; 168 for (node = avtab_search_node(avtab, &tmp_key); 170 node = avtab_search_node_next(node, tmp_key.specified)) { 328 avtab_key_t tmp_key; local 337 memcpy(&tmp_key, k, sizeof(avtab_key_t)); 338 tmp_key.specified = AVTAB_XPERMS_ALLOWED [all...] |
/external/selinux/libsemanage/src/ |
fcontext_record.c | 40 semanage_fcontext_key_t *tmp_key = local 43 if (!tmp_key) { 48 tmp_key->expr = strdup(expr); 49 if (!tmp_key->expr) { 51 free(tmp_key); 54 tmp_key->type = type; 56 *key_ptr = tmp_key;
|
seuser_record.c | 44 semanage_seuser_key_t *tmp_key = (semanage_seuser_key_t *) local 47 if (!tmp_key) { 51 tmp_key->name = name; 53 *key_ptr = tmp_key;
|
/external/srtp/crypto/cipher/ |
aes_cbc.c | 109 v128_t tmp_key; local 111 /* set tmp_key (for alignment) */ 112 v128_copy_octet_string(&tmp_key, key); 115 "key: %s", v128_hex_string(&tmp_key)); 120 aes_expand_encryption_key(&tmp_key, c->expanded_key); 123 aes_expand_decryption_key(&tmp_key, c->expanded_key);
|
aes_icm.c | 166 v128_t tmp_key; local 181 /* set tmp_key (for alignment) */ 182 v128_copy_octet_string(&tmp_key, key); 185 "key: %s", v128_hex_string(&tmp_key)); 190 aes_expand_encryption_key(&tmp_key, c->expanded_key);
|
/system/core/libcutils/ |
str_parms.c | 216 void *tmp_key = NULL; local 225 tmp_key = strdup(key); 226 if (tmp_key == NULL) { 235 old_val = hashmapPut(str_parms->map, tmp_key, tmp_val); 241 // For new keys, hashmap takes ownership of tmp_key and tmp_val. 242 RELEASE_OWNERSHIP(tmp_key); 244 tmp_key = tmp_val = NULL; 253 free(tmp_key);
|
/external/srtp/srtp/ |
srtp.c | 364 uint8_t tmp_key[MAX_SRTP_KEY_LEN]; local 371 tmp_key, cipher_get_key_length(srtp->rtp_cipher)); 385 tmp_key + base_key_len, salt_len); 388 octet_string_hex_string(tmp_key, 392 stat = cipher_init(srtp->rtp_cipher, tmp_key, direction_any); 395 octet_string_set_to_zero(tmp_key, MAX_SRTP_KEY_LEN); 401 tmp_key, auth_get_key_length(srtp->rtp_auth)); 403 octet_string_hex_string(tmp_key, 407 stat = auth_init(srtp->rtp_auth, tmp_key); 410 octet_string_set_to_zero(tmp_key, MAX_SRTP_KEY_LEN) [all...] |
/system/update_engine/payload_consumer/ |
delta_performer.cc | 1389 base::FilePath tmp_key; local 1589 base::FilePath tmp_key; local [all...] |