HomeSort by relevance Sort by last modified time
    Searched full:skey (Results 26 - 50 of 81) sorted by null

12 3 4

  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
KeyGeneratorTest.java 409 SecretKey sKey;
415 sKey = kgs[i].generateKey();
416 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
419 sKey = kgs[i].generateKey();
420 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
423 sKey = kgs[i].generateKey();
424 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
427 sKey = kgs[i].generateKey();
428 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
  /external/dropbear/libtomcrypt/src/ciphers/
kseed.c 199 @param skey The key in as scheduled by this function.
202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]);
223 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]);
234 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0];
235 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1];
256 @param skey The key as scheduled
259 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
    [all...]
khazad.c     [all...]
anubis.c     [all...]
des.c     [all...]
  /external/chromium_org/third_party/libxml/src/
dict.c 771 unsigned long skey; local
778 skey = xmlDictComputeKey(dict->subdict, name, len);
780 skey = okey;
782 key = skey % dict->subdict->size;
789 if ((tmp->okey == skey) && (tmp->len == len)) {
794 if ((tmp->okey == skey) && (tmp->len == len) &&
801 if ((tmp->okey == skey) && (tmp->len == len)) {
806 if ((tmp->okey == skey) && (tmp->len == len) &&
902 unsigned long skey; local
909 skey = xmlDictComputeKey(dict->subdict, name, len)
996 unsigned long skey; local
    [all...]
  /external/libxml2/
dict.c 804 unsigned long skey; local
811 skey = xmlDictComputeKey(dict->subdict, name, len);
813 skey = okey;
815 key = skey % dict->subdict->size;
822 if ((tmp->okey == skey) && (tmp->len == len)) {
827 if ((tmp->okey == skey) && (tmp->len == len) &&
834 if ((tmp->okey == skey) && (tmp->len == len)) {
839 if ((tmp->okey == skey) && (tmp->len == len) &&
935 unsigned long skey; local
942 skey = xmlDictComputeKey(dict->subdict, name, len)
1029 unsigned long skey; local
    [all...]
  /external/dropbear/libtomcrypt/src/prngs/
fortuna.c 107 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) {
151 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) {
251 rijndael_ecb_encrypt(prng->fortuna.IV, out, &prng->fortuna.skey);
259 rijndael_ecb_encrypt(prng->fortuna.IV, tmp, &prng->fortuna.skey);
265 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K , &prng->fortuna.skey); fortuna_update_iv(prng);
266 rijndael_ecb_encrypt(prng->fortuna.IV, prng->fortuna.K+16, &prng->fortuna.skey); fortuna_update_iv(prng);
267 if ((err = rijndael_setup(prng->fortuna.K, 32, 0, &prng->fortuna.skey)) != CRYPT_OK) {
  /external/chromium_org/third_party/openssl/openssl/crypto/ocsp/
ocsp_vfy.c 92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
    [all...]
  /external/openssl/crypto/ocsp/
ocsp_vfy.c 92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
    [all...]
  /external/openssh/
auth2-chall.c 59 #ifdef SKEY
71 #ifdef SKEY
351 #if defined(BSD_AUTH) || defined(USE_PAM) || defined(SKEY)
360 #ifdef SKEY
370 #ifdef SKEY
TODO 38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
monitor_wrap.h 101 /* skey */
INSTALL 69 If you wish to use --with-skey then you will need the library below
72 http://www.sparc.spb.su/solaris/skey/
174 --with-skey=PATH will enable S/Key one time password support. You will
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
KeyGeneratorTest.java 420 SecretKey sKey;
426 sKey = kgs[i].generateKey();
427 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
430 sKey = kgs[i].generateKey();
431 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
434 sKey = kgs[i].generateKey();
435 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
438 sKey = kgs[i].generateKey();
439 assertEquals("Incorrect algorithm", sKey.getAlgorithm()
  /external/javasqlite/src/main/java/SQLite/
Database.java 824 * @param skey the key as String
827 public void key(String skey) throws SQLite.Exception {
830 if (skey != null && skey.length() > 0) {
831 ekey = new byte[skey.length()];
832 for (int i = 0; i< skey.length(); i++) {
833 char c = skey.charAt(i);
862 * @param skey the key as String
865 public void rekey(String skey) throws SQLite.Exception {
868 if (skey != null && skey.length() > 0)
    [all...]
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
KeyStoreTestSupport.java 63 public static class SKey implements SecretKey {
68 public SKey(String type, byte[] encoded) {
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
KeyStoreTestSupport.java 63 public static class SKey implements SecretKey {
68 public SKey(String type, byte[] encoded) {
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_test.c 119 symmetric_key skey;
131 if ((err = cipher_descriptor[idx].setup(tests[x].key, 16, 0, &skey)) != CRYPT_OK) {
137 &skey,
170 cipher_descriptor[idx].done(&skey);
  /frameworks/ml/bordeaux/service/src/android/bordeaux/services/
BordeauxSessionManager.java 147 SessionKey skey = new SessionKey(); local
148 skey.value = session.getKey();
149 saveSession(skey);
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/
KerberosTicketTest.java 324 SecretKey sKey = krbTicket.getSessionKey();
325 byte[] keyBytes = sKey.getEncoded();
329 assertNotSame(sessionKey, sKey.getEncoded());
331 assertNotSame(sKey.getEncoded(), sKey.getEncoded());
333 assertEquals("algorithm", "DES", sKey.getAlgorithm());
334 assertEquals("format", "RAW", sKey.getFormat());
  /external/chromium_org/third_party/openssl/openssl/crypto/rc4/asm/
rc4-ia64.pl 258 &I(\$c, "SKEY [IPr[%u]] = SJ[%u]", $i2 % $NIP, $i1%$NSJ)if ($p & $pComT);
259 &I(\$c, "SKEY [JP[%u]] = SI[%u]", $i1 % $NJP, $i2%$NSI) if ($p & $pComT);
370 # define SKEY st1
374 # define SKEY st2
378 # define SKEY st4
382 # define SKEY st8
437 (pComputeT) SKEY [IPr[2]] = SJ[1]; \\
438 (pComputeT) SKEY [JP[1]] = SI[2]; \\
735 SKEY [KTable] = J,-SZ
741 SKEY [KTable] = IFina
    [all...]
  /external/openssl/crypto/rc4/asm/
rc4-ia64.pl 258 &I(\$c, "SKEY [IPr[%u]] = SJ[%u]", $i2 % $NIP, $i1%$NSJ)if ($p & $pComT);
259 &I(\$c, "SKEY [JP[%u]] = SI[%u]", $i1 % $NJP, $i2%$NSI) if ($p & $pComT);
370 # define SKEY st1
374 # define SKEY st2
378 # define SKEY st4
382 # define SKEY st8
437 (pComputeT) SKEY [IPr[2]] = SJ[1]; \\
438 (pComputeT) SKEY [JP[1]] = SI[2]; \\
735 SKEY [KTable] = J,-SZ
741 SKEY [KTable] = IFina
    [all...]
  /external/dropbear/libtomcrypt/notes/
tech0006.txt 86 skey OCTET STRING -- The encrypted text (which the hash was XOR'ed against)
  /frameworks/native/opengl/libs/EGL/
egl_tls.h 34 static pthread_key_t sKey;

Completed in 2975 milliseconds

12 3 4