/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
EncodedKeySpecTest.java | 55 byte[] ek = meks.getEncoded(); 60 if (encodedKey[i] != ek[i]) { 83 byte[] ek = meks.getEncoded(); 86 assertTrue(ek[3] == (byte)4); 100 byte[] ek = meks.getEncoded(); 102 ek[3] = (byte)5;
|
PKCS8EncodedKeySpecTest.java | 70 byte[] ek = meks.getEncoded(); 72 assertTrue(Arrays.equals(encodedKey, ek)); 104 byte[] ek = meks.getEncoded(); 108 assertTrue(Arrays.equals(encodedKey, ek)); 124 byte[] ek = meks.getEncoded(); 127 ek[3] = (byte)5;
|
X509EncodedKeySpecTest.java | 70 byte[] ek = eks.getEncoded(); 72 assertTrue(Arrays.equals(encodedKey, ek)); 104 byte[] ek = meks.getEncoded(); 108 assertTrue(Arrays.equals(encodedKey, ek)); 124 byte[] ek = meks.getEncoded(); 127 ek[3] = (byte)5;
|
/external/wpa_supplicant_8/src/crypto/ |
des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[0]) [all...] |
crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon18433::__anon18437 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
/libcore/luni/src/test/java/tests/security/spec/ |
EncodedKeySpecTest.java | 67 byte[] ek = meks.getEncoded(); 72 if (encodedKey[i] != ek[i]) { 95 byte[] ek = meks.getEncoded(); 98 assertTrue(ek[3] == (byte) 4); 111 byte[] ek = meks.getEncoded(); 113 ek[3] = (byte) 5;
|
PKCS8EncodedKeySpecTest.java | 69 byte[] ek = meks.getEncoded(); 71 assertTrue(Arrays.equals(encodedKey, ek)); 103 byte[] ek = meks.getEncoded(); 107 assertTrue(Arrays.equals(encodedKey, ek)); 123 byte[] ek = meks.getEncoded(); 126 ek[3] = (byte)5;
|
X509EncodedKeySpecTest.java | 70 byte[] ek = eks.getEncoded(); 72 assertTrue(Arrays.equals(encodedKey, ek)); 104 byte[] ek = meks.getEncoded(); 108 assertTrue(Arrays.equals(encodedKey, ek)); 124 byte[] ek = meks.getEncoded(); 127 ek[3] = (byte)5;
|
/external/openssl/crypto/evp/ |
p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv);
|
p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, 90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
/external/openssh/ |
rijndael.h | 43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member in struct:__anon12453
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 146 unsigned char *ek = NULL; local 172 ek = OPENSSL_malloc(eklen); 174 if (ek == NULL) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); 184 ek = NULL; 193 if (ek) 194 OPENSSL_free(ek); 204 unsigned char *ek = NULL; local 227 ek = OPENSSL_malloc(eklen) 433 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
/external/openssl/crypto/pem/ |
pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 109 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 112 memcpy(ek[i],s,j+1);
|
pem.h | 440 EVP_MD *md_type, unsigned char **ek, int *ekl,
|
/external/linux-tools-perf/util/ |
parse-events.c | 738 int eu = 0, ek = 0, eh = 0, precise = 0; local 752 exclude = eu = ek = eh = 1; 756 exclude = eu = ek = eh = 1; 757 ek = 0; 760 exclude = eu = ek = eh = 1; 775 attr->exclude_kernel = ek;
|
/external/openssl/ssl/ |
s2_srvr.c | 366 int is_export,i,n,keya,ek; local 465 ek=8; 468 ek=5; 476 || (is_export && ((i != ek) || (s->s2->tmp.clear+(unsigned int)i != 481 i=ek; 495 || (is_export && ((i != ek) || (s->s2->tmp.clear+i !=
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 35 ulong32 eK[60], dK[60]; 92 ulong32 ek[32], dk[32]; member in struct:des_key 96 ulong32 ek[3][32], dk[3][32]; member in struct:des3_key
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 1201 u8 ek[32]; local 1440 u8 ek[32]; local [all...] |
/external/eigen/Eigen/src/Eigen2Support/ |
SVD.h | 377 Scalar ek = e[k]/scale; local 389 Scalar g = sk*ek;
|
/external/openssl/include/openssl/ |
pem.h | 440 EVP_MD *md_type, unsigned char **ek, int *ekl,
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 1327 u8 ek[32]; local [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
des.c | [all...] |