/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_init.c | 30 symmetric_key *skey; local 47 skey = XCALLOC(1, sizeof(*skey)); 48 if (skey == NULL) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 73 cipher_descriptor[cipher].done(skey); 75 zeromem(skey, sizeof(*skey)); 77 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_decrypt_key.c | 33 unsigned char *skey, *expt; local 69 skey = XMALLOC(MAXBLOCKSIZE); 70 if (expt == NULL || skey == NULL) { 74 if (skey != NULL) { 75 XFREE(skey); 82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 115 out[x] = expt[x] ^ skey[x]; 123 zeromem(skey, MAXBLOCKSIZE); 127 XFREE(skey);
|
dsa_encrypt_key.c | 37 unsigned char *expt, *skey; local 66 skey = XMALLOC(MAXBLOCKSIZE); 67 if (expt == NULL || skey == NULL) { 71 if (skey != NULL) { 72 XFREE(skey); 102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 121 zeromem(skey, MAXBLOCKSIZE); 124 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_encrypt_key.c | 43 unsigned char *pub_expt, *ecc_shared, *skey; local 73 skey = XMALLOC(MAXBLOCKSIZE); 74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 81 if (skey != NULL) { 82 XFREE(skey); 102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 122 zeromem(skey, MAXBLOCKSIZE); 125 XFREE(skey); [all...] |
ecc_decrypt_key.c | 39 unsigned char *ecc_shared, *skey, *pub_expt; local 72 skey = XMALLOC(MAXBLOCKSIZE); 73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 80 if (skey != NULL) { 81 XFREE(skey); 86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 126 out[x] = skey[x] ^ ecc_shared[x]; 135 zeromem(skey, MAXBLOCKSIZE); 140 XFREE(skey);
|
/external/openssh/ |
auth-skey.c | 1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 28 #ifdef SKEY 35 #include <skey.h> 57 struct skey skey; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 94 "skey", 102 "skey", 108 #endif /* SKEY */
|
monitor.c | 55 #ifdef SKEY 56 #include <skey.h> 243 #ifdef SKEY 291 #ifdef SKEY 936 #ifdef SKEY 940 struct skey skey; local 944 success = _compat_skeychallenge(&skey, authctxt->user, challenge, 979 auth_method = "skey"; [all...] |
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 49 symmetric_key *skey; local 127 skey = XMALLOC(sizeof(*skey)); 128 if (skey == NULL) { 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 134 XFREE(skey); 138 skey = uskey; 170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) [all...] |
/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 162 symmetric_key skey; local 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey); 218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 22 symmetric_key skey; member in struct:fortuna_prng
|
/frameworks/ml/bordeaux/service/src/android/bordeaux/services/ |
BordeauxSessionManager.java | 147 SessionKey skey = new SessionKey(); local 148 skey.value = session.getKey(); 149 saveSession(skey);
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 259 symmetric_key skey; local 267 #define DO1(k) func(k, kl, 0, &skey); 1288 symmetric_key skey; local [all...] |
/external/libxml2/ |
dict.c | 804 unsigned long skey; local 811 skey = xmlDictComputeKey(dict->subdict, name, len); 813 skey = okey; 815 key = skey % dict->subdict->size; 822 if ((tmp->okey == skey) && (tmp->len == len)) { 827 if ((tmp->okey == skey) && (tmp->len == len) && 834 if ((tmp->okey == skey) && (tmp->len == len)) { 839 if ((tmp->okey == skey) && (tmp->len == len) && 935 unsigned long skey; local 942 skey = xmlDictComputeKey(dict->subdict, name, len) 1029 unsigned long skey; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
/external/chromium/third_party/libevent/ |
http.c | 1493 char *skey, *svalue; local [all...] |