/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 409 SecretKey sKey; 415 sKey = kgs[i].generateKey(); 416 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 419 sKey = kgs[i].generateKey(); 420 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 423 sKey = kgs[i].generateKey(); 424 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 427 sKey = kgs[i].generateKey(); 428 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
|
/external/dropbear/libtomcrypt/src/ciphers/ |
kseed.c | 199 @param skey The key in as scheduled by this function. 202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); 223 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); 234 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0]; 235 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1]; 256 @param skey The key as scheduled 259 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) [all...] |
khazad.c | [all...] |
anubis.c | [all...] |
des.c | [all...] |
/external/chromium_org/third_party/libxml/src/ |
dict.c | 771 unsigned long skey; local 778 skey = xmlDictComputeKey(dict->subdict, name, len); 780 skey = okey; 782 key = skey % dict->subdict->size; 789 if ((tmp->okey == skey) && (tmp->len == len)) { 794 if ((tmp->okey == skey) && (tmp->len == len) && 801 if ((tmp->okey == skey) && (tmp->len == len)) { 806 if ((tmp->okey == skey) && (tmp->len == len) && 902 unsigned long skey; local 909 skey = xmlDictComputeKey(dict->subdict, name, len) 996 unsigned long skey; local [all...] |
/external/libxml2/ |
dict.c | 804 unsigned long skey; local 811 skey = xmlDictComputeKey(dict->subdict, name, len); 813 skey = okey; 815 key = skey % dict->subdict->size; 822 if ((tmp->okey == skey) && (tmp->len == len)) { 827 if ((tmp->okey == skey) && (tmp->len == len) && 834 if ((tmp->okey == skey) && (tmp->len == len)) { 839 if ((tmp->okey == skey) && (tmp->len == len) && 935 unsigned long skey; local 942 skey = xmlDictComputeKey(dict->subdict, name, len) 1029 unsigned long skey; local [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
fortuna.c | 107 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) { 151 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) { 251 rijndael_ecb_encrypt(prng->fortuna.IV, out, &prng->fortuna.skey); 259 rijndael_ecb_encrypt(prng->fortuna.IV, tmp, &prng->fortuna.skey); 265 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K , &prng->fortuna.skey); fortuna_update_iv(prng); 266 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K+16, &prng->fortuna.skey); fortuna_update_iv(prng); 267 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/external/openssh/ |
auth2-chall.c | 59 #ifdef SKEY 71 #ifdef SKEY 351 #if defined(BSD_AUTH) || defined(USE_PAM) || defined(SKEY) 360 #ifdef SKEY 370 #ifdef SKEY
|
TODO | 38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
|
monitor_wrap.h | 101 /* skey */
|
INSTALL | 69 If you wish to use --with-skey then you will need the library below 72 http://www.sparc.spb.su/solaris/skey/ 174 --with-skey=PATH will enable S/Key one time password support. You will
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyGeneratorTest.java | 420 SecretKey sKey; 426 sKey = kgs[i].generateKey(); 427 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 430 sKey = kgs[i].generateKey(); 431 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 434 sKey = kgs[i].generateKey(); 435 assertEquals("Incorrect algorithm", sKey.getAlgorithm() 438 sKey = kgs[i].generateKey(); 439 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
|
/external/javasqlite/src/main/java/SQLite/ |
Database.java | 824 * @param skey the key as String 827 public void key(String skey) throws SQLite.Exception { 830 if (skey != null && skey.length() > 0) { 831 ekey = new byte[skey.length()]; 832 for (int i = 0; i< skey.length(); i++) { 833 char c = skey.charAt(i); 862 * @param skey the key as String 865 public void rekey(String skey) throws SQLite.Exception { 868 if (skey != null && skey.length() > 0) [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 63 public static class SKey implements SecretKey { 68 public SKey(String type, byte[] encoded) {
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 63 public static class SKey implements SecretKey { 68 public SKey(String type, byte[] encoded) {
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_test.c | 119 symmetric_key skey; 131 if ((err = cipher_descriptor[idx].setup(tests[x].key, 16, 0, &skey)) != CRYPT_OK) { 137 &skey, 170 cipher_descriptor[idx].done(&skey);
|
/frameworks/ml/bordeaux/service/src/android/bordeaux/services/ |
BordeauxSessionManager.java | 147 SessionKey skey = new SessionKey(); local 148 skey.value = session.getKey(); 149 saveSession(skey);
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/ |
KerberosTicketTest.java | 324 SecretKey sKey = krbTicket.getSessionKey(); 325 byte[] keyBytes = sKey.getEncoded(); 329 assertNotSame(sessionKey, sKey.getEncoded()); 331 assertNotSame(sKey.getEncoded(), sKey.getEncoded()); 333 assertEquals("algorithm", "DES", sKey.getAlgorithm()); 334 assertEquals("format", "RAW", sKey.getFormat());
|
/external/chromium_org/third_party/openssl/openssl/crypto/rc4/asm/ |
rc4-ia64.pl | 258 &I(\$c, "SKEY [IPr[%u]] = SJ[%u]", $i2 % $NIP, $i1%$NSJ)if ($p & $pComT); 259 &I(\$c, "SKEY [JP[%u]] = SI[%u]", $i1 % $NJP, $i2%$NSI) if ($p & $pComT); 370 # define SKEY st1 374 # define SKEY st2 378 # define SKEY st4 382 # define SKEY st8 437 (pComputeT) SKEY [IPr[2]] = SJ[1]; \\ 438 (pComputeT) SKEY [JP[1]] = SI[2]; \\ 735 SKEY [KTable] = J,-SZ 741 SKEY [KTable] = IFina [all...] |
/external/openssl/crypto/rc4/asm/ |
rc4-ia64.pl | 258 &I(\$c, "SKEY [IPr[%u]] = SJ[%u]", $i2 % $NIP, $i1%$NSJ)if ($p & $pComT); 259 &I(\$c, "SKEY [JP[%u]] = SI[%u]", $i1 % $NJP, $i2%$NSI) if ($p & $pComT); 370 # define SKEY st1 374 # define SKEY st2 378 # define SKEY st4 382 # define SKEY st8 437 (pComputeT) SKEY [IPr[2]] = SJ[1]; \\ 438 (pComputeT) SKEY [JP[1]] = SI[2]; \\ 735 SKEY [KTable] = J,-SZ 741 SKEY [KTable] = IFina [all...] |
/external/dropbear/libtomcrypt/notes/ |
tech0006.txt | 86 skey OCTET STRING -- The encrypted text (which the hash was XOR'ed against)
|
/frameworks/native/opengl/libs/EGL/ |
egl_tls.h | 34 static pthread_key_t sKey;
|