/frameworks/native/opengl/libs/EGL/ |
egl_tls.cpp | 32 pthread_key_t egl_tls_t::sKey = TLS_KEY_NOT_INITIALIZED; 64 pthread_key_create(&sKey, (void (*)(void*))&eglReleaseThread); 98 egl_tls_t* tls = (egl_tls_t*)pthread_getspecific(sKey); 101 pthread_setspecific(sKey, tls); 107 if (sKey != TLS_KEY_NOT_INITIALIZED) { 108 egl_tls_t* tls = (egl_tls_t*)pthread_getspecific(sKey); 110 pthread_setspecific(sKey, 0); 123 if (sKey == TLS_KEY_NOT_INITIALIZED) { 126 egl_tls_t* tls = (egl_tls_t*)pthread_getspecific(sKey); 141 if (sKey == TLS_KEY_NOT_INITIALIZED) [all...] |
egl_tls.h | 34 static pthread_key_t sKey;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
tls_openssl_ocsp.c | 508 EVP_PKEY *skey; local 627 skey = X509_get_pubkey(signer); 628 if (!skey) { 635 basic->tbsResponseData, skey) <= 0) {
|
/external/pdfium/fpdfsdk/src/javascript/ |
global.cpp | 234 SetGlobalVariables(pData->data.sKey, JS_GLOBALDATA_TYPE_NUMBER, 238 pData->data.sKey.UTF8Decode().c_str(), 242 SetGlobalVariables(pData->data.sKey, JS_GLOBALDATA_TYPE_BOOLEAN, 0, 246 pData->data.sKey.UTF8Decode().c_str(), 250 SetGlobalVariables(pData->data.sKey, JS_GLOBALDATA_TYPE_STRING, 0, 254 pData->data.sKey.UTF8Decode().c_str(), 263 SetGlobalVariables(pData->data.sKey, JS_GLOBALDATA_TYPE_OBJECT, 0, 266 pData->data.sKey.UTF8Decode().c_str(), pObj); 270 SetGlobalVariables(pData->data.sKey, JS_GLOBALDATA_TYPE_NULL, 0, false, 274 pData->data.sKey.UTF8Decode().c_str()) [all...] |
JS_GlobalData.cpp | 29 pNewObjData->sKey = pOldObjData->sKey; 36 pNewObjData->sKey = pOldObjData->sKey; 43 pNewObjData->sKey = pOldObjData->sKey; 50 pNewObjData->sKey = pOldObjData->sKey; 57 pNewObjData->sKey = pOldObjData->sKey; [all...] |
JS_GlobalData.h | 42 CFX_ByteString sKey;
|
/libcore/ojluni/src/main/java/sun/net/www/protocol/http/ |
AuthCacheImpl.java | 56 String skey = value.getPath(); local 65 if (inf.path == null || inf.path.startsWith (skey)) { 75 public synchronized AuthCacheValue get (String pkey, String skey) { 81 if (skey == null) { 88 if (skey.startsWith (inf.path)) {
|
AuthCache.java | 60 * using a pathname (skey) and the cache must return an entry 61 * if skey is a sub-path of the AuthCacheValue.path field. 63 public AuthCacheValue get (String pkey, String skey);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 409 SecretKey sKey; 415 sKey = kgs[i].generateKey(); 416 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 419 sKey = kgs[i].generateKey(); 420 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 423 sKey = kgs[i].generateKey(); 424 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 427 sKey = kgs[i].generateKey(); 428 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
|
/external/libxml2/ |
dict.c | 883 unsigned long skey; local 890 skey = xmlDictComputeKey(dict->subdict, name, l); 892 skey = okey; 894 key = skey % dict->subdict->size; 901 if ((tmp->okey == skey) && (tmp->len == l)) { 906 if ((tmp->okey == skey) && (tmp->len == l) && 913 if ((tmp->okey == skey) && (tmp->len == l)) { 918 if ((tmp->okey == skey) && (tmp->len == l) && 1020 unsigned long skey; local 1027 skey = xmlDictComputeKey(dict->subdict, name, l) 1114 unsigned long skey; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 420 SecretKey sKey; 426 sKey = kgs[i].generateKey(); 427 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 430 sKey = kgs[i].generateKey(); 431 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 434 sKey = kgs[i].generateKey(); 435 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 438 sKey = kgs[i].generateKey(); 439 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
|
/external/javasqlite/src/main/java/SQLite/ |
Database.java | 824 * @param skey the key as String 827 public void key(String skey) throws SQLite.Exception { 830 if (skey != null && skey.length() > 0) { 831 ekey = new byte[skey.length()]; 832 for (int i = 0; i< skey.length(); i++) { 833 char c = skey.charAt(i); 862 * @param skey the key as String 865 public void rekey(String skey) throws SQLite.Exception { 868 if (skey != null && skey.length() > 0) [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 62 public static class SKey implements SecretKey { 67 public SKey(String type, byte[] encoded) {
|
/external/toybox/toys/pending/ |
ipcrm.c | 32 struct arg_list *skey; 84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 63 public static class SKey implements SecretKey { 68 public SKey(String type, byte[] encoded) {
|
/frameworks/ml/bordeaux/service/src/android/bordeaux/services/ |
BordeauxSessionManager.java | 147 SessionKey skey = new SessionKey(); local 148 skey.value = session.getKey(); 149 saveSession(skey);
|
/external/boringssl/src/crypto/x509/ |
t_x509a.c | 101 BIO_printf(out, "%*sKey Id: ", indent, "");
|
x509_vfy.c | [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 576 KeyStoreTestSupport.SKey secKey = new KeyStoreTestSupport.SKey("DSA", 578 KeyStore.SecretKeyEntry sKey = new KeyStore.SecretKeyEntry( 590 kss[i].setEntry(aliases[j], sKey, pPath); [all...] |
/external/antlr/antlr-3.4/runtime/C/include/ |
antlr3collections.h | 49 pANTLR3_UINT8 sKey; /**< Used if type is ANTLR3_HASH_TYPE_STR */ 354 struct ANTLR3_INT_TRIE_NODE_struct * leftN; /**< Pointer to the left node from here when sKey & bitNum = 0 */ 355 struct ANTLR3_INT_TRIE_NODE_struct * rightN; /**< Pointer to the right node from here when sKey & bitNum, = 1 */
|
/external/antlr/antlr-3.4/runtime/C/src/ |
antlr3collections.c | 238 if (entry->keybase.type == ANTLR3_HASH_TYPE_STR && entry->keybase.key.sKey != NULL) 240 ANTLR3_FREE(entry->keybase.key.sKey); 359 if (strcmp((const char *)key, (const char *)entry->keybase.key.sKey) == 0) 371 ANTLR3_FREE(entry->keybase.key.sKey); 373 entry->keybase.key.sKey = NULL; 505 if (strcmp((const char *)key, (const char *)entry->keybase.key.sKey) == 0) 624 if (strcmp((const char*) key, (const char *)(*newPointer)->keybase.key.sKey) == 0) 652 entry->keybase.key.sKey = ANTLR3_STRDUP(key); /* Record the key value */ 656 entry->keybase.key.sKey = key; /* Record the key value */ [all...] |
/external/jetty/src/java/org/eclipse/jetty/io/nio/ |
SelectorManager.java | 359 * @param sKey the selection key 363 protected abstract SelectChannelEndPoint newEndPoint(SocketChannel channel, SelectorManager.SelectSet selectSet, SelectionKey sKey) throws IOException; 840 private SelectChannelEndPoint createEndPoint(SocketChannel channel, SelectionKey sKey) throws IOException 842 SelectChannelEndPoint endp = newEndPoint(channel,this,sKey); [all...] |
/external/jetty/src/java/org/eclipse/jetty/server/nio/ |
SelectChannelConnector.java | 329 protected SelectChannelEndPoint newEndPoint(SocketChannel channel, SelectSet selectSet, SelectionKey sKey) throws IOException 331 return SelectChannelConnector.this.newEndPoint(channel,selectSet,sKey);
|
/external/vboot_reference/futility/ |
cmd_show.c | 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); 53 printf("%sKey sha1sum: ", sp);
|