/system/core/sh/ |
mktokens | 40 cat > /tmp/ka$$ <<\! 70 nl=`wc -l /tmp/ka$$` 72 awk '{print "#define " $1 " " NR-1}' /tmp/ka$$ 76 awk '{print "\t" $2 ","}' /tmp/ka$$ 82 /tmp/ka$$ 85 sed 's/"//g' /tmp/ka$$ | awk ' 92 rm /tmp/ka$$
|
/external/chromium_org/net/quic/crypto/ |
curve25519_key_exchange.cc | 23 Curve25519KeyExchange* ka; local 28 sizeof(ka->private_key_) == crypto::curve25519::kScalarBytes, 30 COMPILE_ASSERT(sizeof(ka->public_key_) == crypto::curve25519::kBytes, 37 ka = new Curve25519KeyExchange(); 38 memcpy(ka->private_key_, private_key.data(), 40 crypto::curve25519::ScalarBaseMult(ka->private_key_, ka->public_key_); 41 return ka;
|
crypto_server_config.cc | 850 scoped_ptr<KeyExchange> ka; local 853 ka.reset(Curve25519KeyExchange::New(private_key)); 854 if (!ka.get()) { 861 ka.reset(P256KeyExchange::New(private_key)); 862 if (!ka.get()) { 882 config->key_exchanges.push_back(ka.release()); [all...] |
/external/ipsec-tools/src/racoon/ |
nattraversal.c | 323 natt_keepalive_delete (struct natt_ka_addrs *ka) 325 TAILQ_REMOVE (&ka_tree, ka, chain); 326 racoon_free (ka->src); 327 racoon_free (ka->dst); 328 racoon_free (ka); 335 struct natt_ka_addrs *ka, *next = NULL; local 340 for (ka = TAILQ_FIRST(&ka_tree); ka; ka = next) { 341 next = TAILQ_NEXT(ka, chain) 373 struct natt_ka_addrs *ka = NULL, *new_addr; local 430 struct natt_ka_addrs *ka, *next = NULL; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
KeyAgreementThread.java | 55 KeyAgreement ka = KeyAgreement.getInstance("DH"); local 56 ka.init(privateKey); 57 ka.doPhase(pubKey, true); 59 return ka.generateSecret();
|
/external/kernel-headers/original/asm-mips/ |
signal.h | 102 #define sig_uses_siginfo(ka) ((ka)->sa.sa_flags & SA_SIGINFO) 104 #define sig_uses_siginfo(ka) (1)
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyAgreementTest.java | 102 KeyAgreement[] ka = new KeyAgreement[3]; local 103 ka[0] = KeyAgreement.getInstance(defaultAlgorithm); 104 ka[1] = KeyAgreement.getInstance(defaultAlgorithm, defaultProvider); 105 ka[2] = KeyAgreement.getInstance(defaultAlgorithm, 107 return ka; 617 KeyAgreement ka = KeyAgreement.getInstance("DH"); local 621 ka.generateSecret(bb1, 0); 626 ka.init(privKey); 627 ka.doPhase(publKey, true); 629 ka.generateSecret(bb1, 0) 643 KeyAgreement ka = KeyAgreement.getInstance("DH"); local 669 KeyAgreement ka = KeyAgreement.getInstance("DH"); local [all...] |
/external/jmonkeyengine/engine/src/networking/com/jme3/network/base/ |
DefaultServer.java | 157 for( KernelAdapter ka : channels ) { 158 ka.initialize(); 162 for( KernelAdapter ka : channels ) { 163 ka.start(); 181 for( KernelAdapter ka : channels ) { 182 ka.close(); 302 protected int getChannel( KernelAdapter ka ) 304 return channels.indexOf(ka); 307 protected void registerClient( KernelAdapter ka, Endpoint p, ClientRegistrationMessage m ) 328 int channel = getChannel(ka); [all...] |
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
safer.c | 114 unsigned char ka[SAFER_BLOCK_LEN + 1]; local 120 ka[SAFER_BLOCK_LEN] = (unsigned char)0; 124 ka[j] = ROL8(userkey_1[j], 5); 125 ka[SAFER_BLOCK_LEN] ^= ka[j]; 131 ka[j] = ROL8(ka[j], 6); 140 *key++ = (ka[k] 144 *key++ = (ka[j] + safer_ebox[(int)safer_ebox[(int)((18 * i + j + 1)&0xFF)]]) & 0xFF; 163 zeromem(ka, sizeof(ka)) [all...] |
/external/chromium_org/content/browser/indexed_db/leveldb/ |
leveldb_transaction.h | 67 int CompareKeyKey(const key& ka, const key& kb) { 68 return comparator_->Compare(ka, kb);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyAgreementTest.java | 100 KeyAgreement[] ka = new KeyAgreement[3]; local 101 ka[0] = KeyAgreement.getInstance(defaultAlgorithm); 102 ka[1] = KeyAgreement.getInstance(defaultAlgorithm, defaultProvider); 103 ka[2] = KeyAgreement.getInstance(defaultAlgorithm, 105 return ka;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 71 u8 ka[EAP_EKE_MAX_KA_LEN]; member in struct:eap_eke_session
|
eap_eke_common.c | 513 const char *label = "EAP-EKE Ka"; 517 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P | 519 * Ka = authentication key 539 data, data_len, sess->ka, sess->prf_len) < 0) { 545 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ka", sess->ka, sess->prf_len); 722 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ka for Auth", 723 sess->ka, sess->auth_len); 725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len [all...] |
/external/chromium_org/v8/test/webkit/fast/js/kde/ |
md5-1.js | 396 var l,s,k,ka,kb,kc,kd; 404 ka=kb=kc=kd=0; 405 for (i=0;i<4;i++) ka+=shl(digestBits[15-i], (i*8)); 409 s=hexa(kd)+hexa(kc)+hexa(kb)+hexa(ka);
|
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 1824 CacheRecord *cr, *NewAnswers, **na, **ka; \/\/ "new answer", "known answer" local [all...] |
/external/chromium_org/third_party/icu/source/data/rbnf/ |
rbnffiles.mk | 44 ja.txt ka.txt kl.txt ko.txt lt.txt\
|
/external/icu4c/data/rbnf/ |
rbnffiles.mk | 48 is.txt it.txt ja.txt ka.txt kl.txt\
|
/external/chromium_org/third_party/icu/source/data/lang/ |
reslocal.mk | 95 ka.txt\
|
resfiles.mk | 60 jmc.txt ka.txt kab.txt kam.txt kde.txt\
|
/external/chromium_org/third_party/icu/source/data/locales/ |
reslocal.mk | 96 ka.txt\
|
/external/chromium_org/third_party/icu/source/common/ |
locmap.c | 377 ILCID_POSIX_ELEMENT_ARRAY(0x0437, ka, ka_GE) 691 ILCID_POSIX_MAP(ka), /* ka Georgian 0x37 */ [all...] |
/external/chromium_org/third_party/icu/source/data/region/ |
resfiles.mk | 59 is.txt it.txt ja.txt jmc.txt ka.txt\
|
/external/chromium_org/third_party/icu/source/data/zone/ |
resfiles.mk | 60 it.txt ja.txt jmc.txt ka.txt kab.txt\
|
/external/chromium_org/third_party/icu/source/data/coll/ |
colfiles.mk | 71 ka.txt ka_GE.txt kk_KZ.txt kl_GL.txt kn_IN.txt\
|
/external/chromium_org/third_party/icu/source/data/curr/ |
resfiles.mk | 65 ka.txt kab.txt kam.txt kde.txt kea.txt\
|