/external/libxml2/ |
dict.c | 772 unsigned long skey; local 779 skey = xmlDictComputeKey(dict->subdict, name, len); 781 skey = okey; 783 key = skey % dict->subdict->size; 790 if ((tmp->okey == skey) && (tmp->len == len)) { 795 if ((tmp->okey == skey) && (tmp->len == len) && 802 if ((tmp->okey == skey) && (tmp->len == len)) { 807 if ((tmp->okey == skey) && (tmp->len == len) && 903 unsigned long skey; local 910 skey = xmlDictComputeKey(dict->subdict, name, len) 997 unsigned long skey; local [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
fortuna.c | 107 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) { 151 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) { 251 rijndael_ecb_encrypt(prng->fortuna.IV, out, &prng->fortuna.skey); 259 rijndael_ecb_encrypt(prng->fortuna.IV, tmp, &prng->fortuna.skey); 265 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K , &prng->fortuna.skey); fortuna_update_iv(prng); 266 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K+16, &prng->fortuna.skey); fortuna_update_iv(prng); 267 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/ciphers/ |
kseed.c | 199 @param skey The key in as scheduled by this function. 202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); 223 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); 234 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0]; 235 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1]; 256 @param skey The key as scheduled 259 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) [all...] |
khazad.c | [all...] |
anubis.c | [all...] |
des.c | [all...] |
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_test.c | 119 symmetric_key skey; 131 if ((err = cipher_descriptor[idx].setup(tests[x].key, 16, 0, &skey)) != CRYPT_OK) { 137 &skey, 170 cipher_descriptor[idx].done(&skey);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 22 symmetric_key skey; member in struct:fortuna_prng
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 162 symmetric_key skey; local 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey); 218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 259 symmetric_key skey; local 267 #define DO1(k) func(k, kl, 0, &skey); 1288 symmetric_key skey; local [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 418 symmetric_key *skey); 424 If the function returns successfully the variable \textit{skey} will have a scheduled key stored in it. It's important to note 437 symmetric_key *skey); 441 symmetric_key *skey); 489 void XXX_done(symmetric_key *skey); 505 symmetric_key skey; 515 &skey) /* where to put the scheduled key */ 524 &skey); /* our previously scheduled key */ 531 &skey); /* our previously scheduled key */ 536 blowfish_done(&skey); [all...] |
/external/chromium/third_party/libevent/ |
http.c | 1493 char *skey, *svalue; local [all...] |