/external/zlib/contrib/minizip/ |
crypt.h | 35 static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab) 41 temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; 48 static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int c) 50 (*(pkeys+0)) = CRC32((*(pkeys+0)), c); 51 (*(pkeys+1)) += (*(pkeys+0)) & 0xff; 52 (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; 54 register int keyshift = (int)((*(pkeys+1)) >> 24) [all...] |
/external/openssl/ssl/ |
ssl_rsa.c | 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 209 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 211 X509_free(c->pkeys[i].x509); 212 c->pkeys[i].x509 = NULL; 217 if (c->pkeys[i].privatekey != NULL) 218 EVP_PKEY_free(c->pkeys[i].privatekey); 220 c->pkeys[i].privatekey=pkey; 221 c->key= &(c->pkeys[i]); 414 if (c->pkeys[i].privatekey != NULL [all...] |
ssl_cert.c | 167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_dss1(); 170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_ecdsa(); 190 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 210 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 211 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 277 if (cert->pkeys[i].x509 != NULL [all...] |
s3_lib.c | [all...] |
s2_srvr.c | 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 774 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 776 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); 1067 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 1075 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); 1118 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) 1123 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) 1128 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
|
t1_lib.c | [all...] |
ssl_lib.c | [all...] |
s3_srvr.c | 482 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 484 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
d1_srvr.c | 478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
ssl_locl.h | 483 CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array 508 CERT_PKEY pkeys[SSL_PKEY_NUM]; member in struct:cert_st [all...] |
/bootable/recovery/ |
verifier.h | 25 int verify_file(const char* path, const RSAPublicKey *pKeys, unsigned int numKeys);
|
verifier.cpp | 37 int verify_file(const char* path, const RSAPublicKey *pKeys, unsigned int numKeys) { 177 if (RSA_verify(pKeys+i, eocd + eocd_size - 6 - RSANUMBYTES,
|
/dalvik/tools/dmtracedump/ |
TraceDump.c | 567 void freeDataKeys(DataKeys* pKeys) 569 if (pKeys == NULL) 572 free(pKeys->fileData); 573 free(pKeys->threads); 574 free(pKeys->methods); 575 free(pKeys); 654 long parseVersion(DataKeys* pKeys, long offset, int verbose) 663 data = pKeys->fileData + offset; 664 dataEnd = pKeys->fileData + pKeys->fileLen [all...] |
/external/openssl/patches/ |
jsse.patch | 390 + if (ssl->cert->pkeys[i].x509 == x) 391 + return ssl->cert->pkeys[i].cert_chain;
|
/dalvik/hit/samples/ |
android.hprof | [all...] |