/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 39 unsigned char tkey[MAXBLOCKSIZE]; local 63 zeromem(tkey, sizeof(tkey)); 64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { 65 tkey[x] = key[x]; 67 for (x = 0; x < skeylen && x < (int)sizeof(tkey); x++) { 68 tkey[x] ^= salt_key[x]; 70 for (; x < keylen && x < (int)sizeof(tkey); x++) { 71 tkey[x] ^= 0x55; 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV * [all...] |
/external/icu4c/layout/ |
KernTable.cpp | 203 le_uint32 tkey = SWAP_KEY(tp); local 205 fprintf(stdout, " %.3d (%0.8x)\n", ((char*)tp - (char*)pairs)/KERN_PAIRINFO_SIZE, tkey); 207 if (tkey <= key) { 208 if (tkey == key) {
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
heap.h | 138 int tkey = key_[j]; local 140 pos_[key_[k] = tkey] = k;
|
/external/iproute2/tc/ |
m_pedit.c | 62 pedit_parse_nopopt (int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 122 pack_key(struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 129 if (tkey->off % 4) { 134 sel->keys[hwm].val = tkey->val; 135 sel->keys[hwm].mask = tkey->mask; 136 sel->keys[hwm].off = tkey->off; 137 sel->keys[hwm].at = tkey->at; 138 sel->keys[hwm].offmask = tkey->offmask; 139 sel->keys[hwm].shift = tkey->shift; 146 pack_key32(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) 417 struct tc_pedit_key tkey; local [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 1062 EC_KEY *tkey; local 1096 tkey = s->session->sess_cert->peer_ecdh_tmp; 1112 tkey = srvr_pub_pkey->pkey.ec; 1115 srvr_group = EC_KEY_get0_group(tkey); 1116 srvr_ecpoint = EC_KEY_get0_public_key(tkey); 1143 tkey = s->cert->key->privatekey->pkey.ec; 1144 priv_key = EC_KEY_get0_private_key(tkey); [all...] |
s3_clnt.c | 2362 EC_KEY *tkey; local [all...] |
s3_srvr.c | 2391 const EC_KEY *tkey; local [all...] |
/external/icu4c/test/intltest/ |
restsnew.cpp | 926 const char *tkey=NULL; local 927 UnicodeString value=tagelement.getNextString(&tkey, status); 928 UnicodeString key(tkey); [all...] |