/external/openssh/ |
kexecdhc.c | 52 EC_KEY *client_key; local 64 if ((client_key = EC_KEY_new_by_curve_name(curve_nid)) == NULL) 66 if (EC_KEY_generate_key(client_key) != 1) 68 group = EC_KEY_get0_group(client_key); 71 packet_put_ecpoint(group, EC_KEY_get0_public_key(client_key)); 77 key_dump_ec_key(client_key); 115 client_key, NULL) != (int)klen) 137 EC_KEY_get0_public_key(client_key), 144 EC_KEY_free(client_key);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateSSLv3.java | 101 byte[] client_key = new byte[key_size]; 109 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 122 md5.update(client_key); 125 client_key = md5.digest(); 163 logger.println("client_key"); 164 logger.print(client_key, 0, key_size); 185 new SecretKeySpec(client_key, 0, key_size, algName), 195 new SecretKeySpec(client_key, 0, key_size, algName),
|
ConnectionStateTLS.java | 124 byte[] client_key = new byte[key_size]; 132 System.arraycopy(key_block, 2*hash_size, client_key, 0, key_size); 148 PRF.computePRF(final_client_key, client_key, 152 client_key = final_client_key; 181 logger.println("client_key"); 182 logger.print(client_key); 203 new SecretKeySpec(client_key, algName), clientIV); 210 new SecretKeySpec(client_key, algName), clientIV);
|
/external/chromium/chrome/browser/safe_browsing/ |
protocol_parser.h | 102 std::string* client_key,
|
protocol_manager.cc | 48 const std::string& client_key, 55 sb_service, client_name, client_key, wrapped_key, 72 const std::string& client_key, 81 return factory_->CreateProtocolManager(sb_service, client_name, client_key, 90 const std::string& client_key, 106 client_key_(client_key), 435 << ", client_key: " << client_key_ 456 std::string client_key, wrapped_key; local 457 if (!parser.ParseNewKey(data, length, &client_key, &wrapped_key)) 460 client_key_ = client_key; [all...] |
protocol_manager.h | 56 const std::string& client_key, 94 const std::string& client_key, 205 const std::string& client_key,
|
protocol_parser.cc | 459 std::string* client_key, 461 DCHECK(client_key && wrapped_key); 462 client_key->clear(); 482 client_key->assign(cmd_parts[2]); 493 if (client_key->empty() || wrapped_key->empty())
|
safe_browsing_service.h | 214 void OnNewMacKeys(const std::string& client_key, 287 void OnIOInitialize(const std::string& client_key,
|
safe_browsing_service.cc | 468 void SafeBrowsingService::OnNewMacKeys(const std::string& client_key, 472 prefs->SetString(prefs::kSafeBrowsingClientKey, client_key); 539 const std::string& client_key, 577 client_key, 869 std::string client_key, wrapped_key; local 871 client_key = 902 this, &SafeBrowsingService::OnIOInitialize, client_key, wrapped_key, [all...] |
safe_browsing_service_browsertest.cc | 177 const std::string& client_key, 183 : SafeBrowsingProtocolManager(sb_service, client_name, client_key, 233 const std::string& client_key, 240 sb_service, client_name, client_key, wrapped_key,
|
protocol_parser_unittest.cc | 619 std::string client_key, wrapped_key; local 622 &client_key, 625 EXPECT_EQ(client_key, "0123456789"); [all...] |
/external/openssl/ssl/ |
ssltest.c | 522 char *client_key=NULL; local 716 client_key= *(++argv); 1028 (client_key?client_key:client_cert), [all...] |