/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_init.c | 30 symmetric_key *skey; local 47 skey = XCALLOC(1, sizeof(*skey)); 48 if (skey == NULL) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 73 cipher_descriptor[cipher].done(skey); 75 zeromem(skey, sizeof(*skey)); 77 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_decrypt_key.c | 33 unsigned char *skey, *expt; local 69 skey = XMALLOC(MAXBLOCKSIZE); 70 if (expt == NULL || skey == NULL) { 74 if (skey != NULL) { 75 XFREE(skey); 82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 115 out[x] = expt[x] ^ skey[x]; 123 zeromem(skey, MAXBLOCKSIZE); 127 XFREE(skey);
|
dsa_encrypt_key.c | 37 unsigned char *expt, *skey; local 66 skey = XMALLOC(MAXBLOCKSIZE); 67 if (expt == NULL || skey == NULL) { 71 if (skey != NULL) { 72 XFREE(skey); 102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 121 zeromem(skey, MAXBLOCKSIZE); 124 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_encrypt_key.c | 43 unsigned char *pub_expt, *ecc_shared, *skey; local 73 skey = XMALLOC(MAXBLOCKSIZE); 74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 81 if (skey != NULL) { 82 XFREE(skey); 102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 122 zeromem(skey, MAXBLOCKSIZE); 125 XFREE(skey); [all...] |
ecc_decrypt_key.c | 39 unsigned char *ecc_shared, *skey, *pub_expt; local 72 skey = XMALLOC(MAXBLOCKSIZE); 73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 80 if (skey != NULL) { 81 XFREE(skey); 86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 126 out[x] = skey[x] ^ ecc_shared[x]; 135 zeromem(skey, MAXBLOCKSIZE); 140 XFREE(skey);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 49 symmetric_key *skey; local 127 skey = XMALLOC(sizeof(*skey)); 128 if (skey == NULL) { 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 134 XFREE(skey); 138 skey = uskey; 170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) [all...] |
/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 ret = OCSP_BASICRESP_verify(bs, skey, 0); 95 EVP_PKEY_free(skey); 388 EVP_PKEY *skey; local 389 skey = X509_get_pubkey(signer); 390 ret = OCSP_REQUEST_verify(req, skey); 391 EVP_PKEY_free(skey);
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 162 symmetric_key skey; local 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey); 218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 22 symmetric_key skey; member in struct:fortuna_prng
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 259 symmetric_key skey; local 267 #define DO1(k) func(k, kl, 0, &skey); 1288 symmetric_key skey; local [all...] |
/external/libxml2/ |
dict.c | 772 unsigned long skey; local 779 skey = xmlDictComputeKey(dict->subdict, name, len); 781 skey = okey; 783 key = skey % dict->subdict->size; 790 if ((tmp->okey == skey) && (tmp->len == len)) { 795 if ((tmp->okey == skey) && (tmp->len == len) && 802 if ((tmp->okey == skey) && (tmp->len == len)) { 807 if ((tmp->okey == skey) && (tmp->len == len) && 903 unsigned long skey; local 910 skey = xmlDictComputeKey(dict->subdict, name, len) 997 unsigned long skey; local [all...] |
/external/wpa_supplicant/ |
crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 92 symmetric_key *skey; local 93 skey = os_malloc(sizeof(*skey)); 94 if (skey == NULL) 96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 97 os_free(skey); 106 symmetric_key *skey = ctx; local 113 symmetric_key *skey = ctx; local 121 symmetric_key *skey; local 135 symmetric_key *skey = ctx; local 142 symmetric_key *skey = ctx; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 92 symmetric_key *skey; local 93 skey = os_malloc(sizeof(*skey)); 94 if (skey == NULL) 96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 97 os_free(skey); 106 symmetric_key *skey = ctx; local 113 symmetric_key *skey = ctx; local 121 symmetric_key *skey; local 135 symmetric_key *skey = ctx; local 142 symmetric_key *skey = ctx; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 93 symmetric_key *skey; local 94 skey = os_malloc(sizeof(*skey)); 95 if (skey == NULL) 97 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 98 os_free(skey); 107 symmetric_key *skey = ctx; local 114 symmetric_key *skey = ctx; local 122 symmetric_key *skey; local 136 symmetric_key *skey = ctx; local 143 symmetric_key *skey = ctx; local [all...] |
/external/chromium/third_party/libevent/ |
http.c | 1493 char *skey, *svalue; local [all...] |