/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/hx509/ |
H A D | ks_mem.c | 48 hx509_private_key *keys; member in struct:mem_data 80 for (i = 0; mem->keys && mem->keys[i]; i++) 81 _hx509_private_key_free(&mem->keys[i]); 82 free(mem->keys); 158 hx509_private_key **keys) 163 for (i = 0; mem->keys && mem->keys[i]; i++) 165 *keys = calloc(i + 1, sizeof(**keys)); 155 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/hx509/ |
H A D | ks_mem.c | 48 hx509_private_key *keys; member in struct:mem_data 80 for (i = 0; mem->keys && mem->keys[i]; i++) 81 _hx509_private_key_free(&mem->keys[i]); 82 free(mem->keys); 158 hx509_private_key **keys) 163 for (i = 0; mem->keys && mem->keys[i]; i++) 165 *keys = calloc(i + 1, sizeof(**keys)); 155 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/hx509/ |
H A D | ks_mem.c | 48 hx509_private_key *keys; member in struct:mem_data 80 for (i = 0; mem->keys && mem->keys[i]; i++) 81 _hx509_private_key_free(&mem->keys[i]); 82 free(mem->keys); 158 hx509_private_key **keys) 163 for (i = 0; mem->keys && mem->keys[i]; i++) 165 *keys = calloc(i + 1, sizeof(**keys)); 155 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/ffmpeg/libavformat/ |
H A D | asfcrypt.c | 48 * \brief read keys from keybuf into keys 49 * \param keybuf buffer containing the keys 50 * \param keys output key array containing the keys for encryption in 53 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) { argument 56 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; 60 * \brief invert the keys so that encryption become decryption keys and 62 * \param keys ke 64 multiswap_invert_keys(uint32_t keys[12]) argument 72 multiswap_step(const uint32_t keys[12], uint32_t v) argument 83 multiswap_inv_step(const uint32_t keys[12], uint32_t v) argument 102 multiswap_enc(const uint32_t keys[12], uint64_t key, uint64_t data) argument 124 multiswap_dec(const uint32_t keys[12], uint64_t key, uint64_t data) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/ffmpeg/libavformat/ |
H A D | asfcrypt.c | 48 * \brief read keys from keybuf into keys 49 * \param keybuf buffer containing the keys 50 * \param keys output key array containing the keys for encryption in 53 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) { argument 56 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; 60 * \brief invert the keys so that encryption become decryption keys and 62 * \param keys ke 64 multiswap_invert_keys(uint32_t keys[12]) argument 72 multiswap_step(const uint32_t keys[12], uint32_t v) argument 83 multiswap_inv_step(const uint32_t keys[12], uint32_t v) argument 102 multiswap_enc(const uint32_t keys[12], uint64_t key, uint64_t data) argument 124 multiswap_dec(const uint32_t keys[12], uint64_t key, uint64_t data) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/ffmpeg/libavformat/ |
H A D | asfcrypt.c | 48 * \brief read keys from keybuf into keys 49 * \param keybuf buffer containing the keys 50 * \param keys output key array containing the keys for encryption in 53 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) { argument 56 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; 60 * \brief invert the keys so that encryption become decryption keys and 62 * \param keys ke 64 multiswap_invert_keys(uint32_t keys[12]) argument 72 multiswap_step(const uint32_t keys[12], uint32_t v) argument 83 multiswap_inv_step(const uint32_t keys[12], uint32_t v) argument 102 multiswap_enc(const uint32_t keys[12], uint64_t key, uint64_t data) argument 124 multiswap_dec(const uint32_t keys[12], uint64_t key, uint64_t data) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/db-4.8.30/test/ |
H A D | test073.tcl | 80 # Number of outstanding keys. 81 set keys 0 100 incr keys 103 puts "\tTest$tnum.a.2: Initializing cursor get loop; $keys dups." 109 for { set i 0 } { $i < $keys } { incr i } { 124 # !!! keys contains the number of the next dup 127 set datum [makedatum_t73 $keys 0] 131 error_check_good "c_put(DB_KEYLAST, $keys)"\ 134 set dbc($keys) $curs 135 set is_long($keys) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/db-4.8.30/test/ |
H A D | test073.tcl | 80 # Number of outstanding keys. 81 set keys 0 100 incr keys 103 puts "\tTest$tnum.a.2: Initializing cursor get loop; $keys dups." 109 for { set i 0 } { $i < $keys } { incr i } { 124 # !!! keys contains the number of the next dup 127 set datum [makedatum_t73 $keys 0] 131 error_check_good "c_put(DB_KEYLAST, $keys)"\ 134 set dbc($keys) $curs 135 set is_long($keys) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/db-4.8.30/test/ |
H A D | test073.tcl | 80 # Number of outstanding keys. 81 set keys 0 100 incr keys 103 puts "\tTest$tnum.a.2: Initializing cursor get loop; $keys dups." 109 for { set i 0 } { $i < $keys } { incr i } { 124 # !!! keys contains the number of the next dup 127 set datum [makedatum_t73 $keys 0] 131 error_check_good "c_put(DB_KEYLAST, $keys)"\ 134 set dbc($keys) $curs 135 set is_long($keys) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/input/misc/ |
H A D | dm355evm_keys.c | 107 struct dm355evm_keys *keys = _keys; local 120 dev_dbg(keys->dev, "input high err %d\n", 128 dev_dbg(keys->dev, "input low err %d\n", 157 ke = sparse_keymap_entry_from_scancode(keys->input, event); 159 dev_dbg(keys->dev, 164 input_report_key(keys->input, keycode, 1); 165 input_sync(keys->input); 166 input_report_key(keys->input, keycode, 0); 167 input_sync(keys->input); 177 struct dm355evm_keys *keys; local 242 struct dm355evm_keys *keys = platform_get_drvdata(pdev); local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/input/misc/ |
H A D | dm355evm_keys.c | 107 struct dm355evm_keys *keys = _keys; local 120 dev_dbg(keys->dev, "input high err %d\n", 128 dev_dbg(keys->dev, "input low err %d\n", 157 ke = sparse_keymap_entry_from_scancode(keys->input, event); 159 dev_dbg(keys->dev, 164 input_report_key(keys->input, keycode, 1); 165 input_sync(keys->input); 166 input_report_key(keys->input, keycode, 0); 167 input_sync(keys->input); 177 struct dm355evm_keys *keys; local 242 struct dm355evm_keys *keys = platform_get_drvdata(pdev); local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument 675 ikev2_keys_set(struct ikev2_keys *keys) argument 682 ikev2_free_keys(struct ikev2_keys *keys) argument 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/keys/ |
H A D | keyring-type.h | 19 * the keyring payload contains a list of the keys to which the keyring is 24 unsigned short maxkeys; /* max keys this list can hold */ 25 unsigned short nkeys; /* number of keys currently held */ 27 struct key *keys[0]; member in struct:keyring_list
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/keys/ |
H A D | keyring-type.h | 19 * the keyring payload contains a list of the keys to which the keyring is 24 unsigned short maxkeys; /* max keys this list can hold */ 25 unsigned short nkeys; /* number of keys currently held */ 27 struct key *keys[0]; member in struct:keyring_list
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/swat2/style/qooxdoo/widgets/widgets/ |
H A D | QxBarSelectorButton.js | 2 function QxBarSelectorButton(vText,vIcon,vIconWidth,vIconHeight,vChecked){QxTab.call(this,vText,vIcon,vIconWidth,vIconHeight,vChecked);this.setIconPosition("top");this.setHorizontalBlockAlign("center");this.setVerticalBlockAlign("middle");};QxBarSelectorButton.extend(QxTab,"QxBarSelectorButton");proto._g5=function(e){switch(this.getParent().getState()){case "top":case "bottom":switch(e.getKeyCode()){case QxKeyEvent.keys.left:var vPrevious=true;break;case QxKeyEvent.keys.right:var vPrevious=false;break;default:return;};break;case "left":case "right":switch(e.getKeyCode()){case QxKeyEvent.keys.up:var vPrevious=true;break;case QxKeyEvent.keys.down:var vPrevious=false;break;default:return;};break;default:return;};var vChild=vPrevious?this.i (…)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/swat2/style/qooxdoo/widgets/widgets/ |
H A D | QxBarSelectorButton.js | 2 function QxBarSelectorButton(vText,vIcon,vIconWidth,vIconHeight,vChecked){QxTab.call(this,vText,vIcon,vIconWidth,vIconHeight,vChecked);this.setIconPosition("top");this.setHorizontalBlockAlign("center");this.setVerticalBlockAlign("middle");};QxBarSelectorButton.extend(QxTab,"QxBarSelectorButton");proto._g5=function(e){switch(this.getParent().getState()){case "top":case "bottom":switch(e.getKeyCode()){case QxKeyEvent.keys.left:var vPrevious=true;break;case QxKeyEvent.keys.right:var vPrevious=false;break;default:return;};break;case "left":case "right":switch(e.getKeyCode()){case QxKeyEvent.keys.up:var vPrevious=true;break;case QxKeyEvent.keys.down:var vPrevious=false;break;default:return;};break;default:return;};var vChild=vPrevious?this.i (…)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/swat2/style/qooxdoo/widgets/widgets/ |
H A D | QxBarSelectorButton.js | 2 function QxBarSelectorButton(vText,vIcon,vIconWidth,vIconHeight,vChecked){QxTab.call(this,vText,vIcon,vIconWidth,vIconHeight,vChecked);this.setIconPosition("top");this.setHorizontalBlockAlign("center");this.setVerticalBlockAlign("middle");};QxBarSelectorButton.extend(QxTab,"QxBarSelectorButton");proto._g5=function(e){switch(this.getParent().getState()){case "top":case "bottom":switch(e.getKeyCode()){case QxKeyEvent.keys.left:var vPrevious=true;break;case QxKeyEvent.keys.right:var vPrevious=false;break;default:return;};break;case "left":case "right":switch(e.getKeyCode()){case QxKeyEvent.keys.up:var vPrevious=true;break;case QxKeyEvent.keys.down:var vPrevious=false;break;default:return;};break;default:return;};var vChild=vPrevious?this.i (…)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
H A D | Core.py | 35 keys = flag_fields[event_name][field_name]['values'].keys() 36 keys.sort() 37 for idx in keys: 54 keys = symbolic_fields[event_name][field_name]['values'].keys() 55 keys.sort() 56 for idx in keys: 77 keys = trace_flags.keys() [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
H A D | Core.py | 35 keys = flag_fields[event_name][field_name]['values'].keys() 36 keys.sort() 37 for idx in keys: 54 keys = symbolic_fields[event_name][field_name]['values'].keys() 55 keys.sort() 56 for idx in keys: 77 keys = trace_flags.keys() [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/db-4.8.30/java/src/com/sleepycat/collections/ |
H A D | BlockIterator.java | 33 * Slots for a block of record keys and values. The priKeys array is only 34 * used for secondary databases; otherwise it is set to the keys array. 36 private byte[][] keys; field in class:BlockIterator 43 * available, then nextIndex is equal to keys.length or keys[nextIndex] is 82 keys = new byte[blockSize][]; 83 priKeys = coll.isSecondary() ? (new byte[blockSize][]) : keys; 99 keys = copyArray(o.keys); 100 priKeys = coll.isSecondary() ? copyArray(o.priKeys) : keys; [all...] |