/bionic/libc/kernel/arch-x86/asm/ |
ipcbuf.h | 24 __kernel_key_t key; member in struct:ipc64_perm
|
/bionic/libc/kernel/common/linux/ |
kmod.h | 27 struct key;
|
/development/ndk/platforms/android-3/arch-arm/include/asm/ |
ipcbuf.h | 17 __kernel_key_t key; member in struct:ipc64_perm
|
/development/ndk/platforms/android-9/arch-mips/include/asm/ |
ipcbuf.h | 24 __kernel_key_t key; member in struct:ipc64_perm
|
/development/ndk/platforms/android-9/arch-x86/include/asm/ |
ipcbuf.h | 24 __kernel_key_t key; member in struct:ipc64_perm
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEDHKeyAgreement.java | 6 import java.security.Key; 23 * Diffie-Hellman key agreement. There's actually a better way of doing this 68 protected Key engineDoPhase( 69 Key key, 78 if (!(key instanceof DHPublicKey)) 82 DHPublicKey pubKey = (DHPublicKey)key; 91 result = ((DHPublicKey)key).getY().modPow(x, p); 96 result = ((DHPublicKey)key).getY().modPow(x, p); 150 byte[] key = new byte[length.intValue() / 8] [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_tts_api_util.h | 23 const char* key,
|
/external/chromium/net/base/ |
platform_mime_util_win.cc | 16 // check windows registry for file extension's mime type (registry key 18 std::wstring value, key = L"." + ext; local 19 base::win::RegKey(HKEY_CLASSES_ROOT, key.c_str(), KEY_READ).ReadValue( 30 std::wstring key(L"MIME\\Database\\Content Type\\" + UTF8ToWide(mime_type)); 31 if (base::win::RegKey(HKEY_CLASSES_ROOT, key.c_str(), KEY_READ).ReadValue(
|
/external/dropbear/ |
keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase,
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_memory.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 39 LTC_ARGCHK(key != NULL); 51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen); 61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 39 LTC_ARGCHK(key != NULL); 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlockCipher.java | 15 public void init(boolean forEncryption, byte[] key);
|
/external/guava/guava/src/com/google/common/cache/ |
Weigher.java | 36 int weigh(K key, V value);
|
/external/guava/guava-tests/test/com/google/common/cache/ |
TestingWeighers.java | 32 * Returns a {@link Weigher} that uses the integer key as the weight. 53 public int weigh(Object key, Object value) { 60 public int weigh(Integer key, Object value) { 61 return key; 67 public int weigh(Object key, Integer value) {
|
/external/iproute2/ip/ |
routel | 35 key=$1 37 eval "$key=$val"
|
/external/kernel-headers/original/asm-arm/ |
ipcbuf.h | 16 __kernel_key_t key; member in struct:ipc64_perm
|
/external/kernel-headers/original/asm-mips/ |
ipcbuf.h | 16 __kernel_key_t key; member in struct:ipc64_perm
|
/external/kernel-headers/original/asm-x86/ |
ipcbuf.h | 16 __kernel_key_t key; member in struct:ipc64_perm
|
/external/libsepol/include/sepol/ |
boolean_record.h | 12 /* Key */ 14 const char *name, sepol_bool_key_t ** key); 16 extern void sepol_bool_key_unpack(const sepol_bool_key_t * key, 23 extern void sepol_bool_key_free(sepol_bool_key_t * key); 26 const sepol_bool_key_t * key);
|
/external/openssh/ |
auth-rsa.c | 8 * validity of the host key. 40 #include "key.h" 55 * Session identifier that is used to bind key exchange and authentication 71 auth_rsa_generate_challenge(Key *key) 83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) 98 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { 100 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE) 172 Key *key; local 298 Key *key; local [all...] |
ssh-ecdsa.c | 44 #include "key.h" 47 ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp, 57 if (key == NULL || key->ecdsa == NULL || 58 (key->type != KEY_ECDSA && key->type != KEY_ECDSA_CERT)) { 59 error("%s: no ECDSA key", __func__); 62 evp_md = key_ec_nid_to_evpmd(key->ecdsa_nid); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa) [all...] |
/external/openssl/crypto/rc4/asm/ |
rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 50 $key="%r2"; 71 llgc $XX[0],0($key) 72 llgc $YY,1($key) 77 llgc $TX[0],2($XX[0],$key) 92 llgc $acc,2($TY,$key) 96 ic $acc,2($TY,$key) 99 llgc $TY,2($YY,$key) 100 stc $TX[0],2($YY,$key) 101 llgc $TX[1],2($XX[1],$key) [all...] |
/external/openssl/crypto/rc4/ |
rc4_skey.c | 88 void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) 95 d= &(key->data[0]); 96 key->x = 0; 97 key->y = 0;
|
/external/qemu/distrib/sdl-1.2.12/src/ |
SDL_error_c.h | 38 /* This is a key used to index into a language hashtable containing 39 internationalized versions of the SDL error messages. If the key 40 is not in the hashtable, or no hashtable is available, the key is 43 char key[ERR_MAX_STRLEN]; member in struct:SDL_error
|
/external/qemu/hw/ |
fw_cfg.c | 70 static int fw_cfg_select(FWCfgState *s, uint16_t key) 75 if ((key & FW_CFG_ENTRY_MASK) >= FW_CFG_MAX_ENTRY) { 79 s->cur_entry = key; 83 FW_CFG_DPRINTF("select key %d (%sfound)\n", key, ret ? "" : "not "); 188 int fw_cfg_add_bytes(void *opaque, uint16_t key, uint8_t *data, uint16_t len) 191 int arch = !!(key & FW_CFG_ARCH_LOCAL); 193 key &= FW_CFG_ENTRY_MASK; 195 if (key >= FW_CFG_MAX_ENTRY) 198 s->entries[arch][key].data = data [all...] |