/external/chromium_org/third_party/zlib/contrib/minizip/ |
crypt.h | 35 static int decrypt_byte(unsigned long* pkeys, const unsigned long* pcrc_32_tab) 41 temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; 48 static int update_keys(unsigned long* pkeys,const unsigned long* pcrc_32_tab,int c) 50 (*(pkeys+0)) = CRC32((*(pkeys+0)), c); 51 (*(pkeys+1)) += (*(pkeys+0)) & 0xff; 52 (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; 54 register int keyshift = (int)((*(pkeys+1)) >> 24) [all...] |
/external/zlib/src/contrib/minizip/ |
crypt.h | 35 static int decrypt_byte(unsigned long* pkeys, const z_crc_t* pcrc_32_tab) 41 temp = ((unsigned)(*(pkeys+2)) & 0xffff) | 2; 48 static int update_keys(unsigned long* pkeys,const z_crc_t* pcrc_32_tab,int c) 50 (*(pkeys+0)) = CRC32((*(pkeys+0)), c); 51 (*(pkeys+1)) += (*(pkeys+0)) & 0xff; 52 (*(pkeys+1)) = (*(pkeys+1)) * 134775813L + 1; 54 register int keyshift = (int)((*(pkeys+1)) >> 24) [all...] |
/external/openssl/patches/ |
tls12_digests.patch | 104 - cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1(); 107 - cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 108 - cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 111 - cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1(); 120 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 156 - (c->pkeys[SSL_PKEY_DSA_SIGN].privatekey != NULL)) 158 + (c->pkeys[SSL_PKEY_DSA_SIGN].privatekey != NULL)) 162 + return c->pkeys[SSL_PKEY_DSA_SIGN].privatekey; 168 if (c->pkeys[SSL_PKEY_RSA_SIGN].privatekey != NULL) 170 - else if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey != NULL [all...] |
jsse.patch | 392 + if (ssl->cert->pkeys[i].x509 == x) 393 + return ssl->cert->pkeys[i].cert_chain;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_rsa.c | 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 209 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 211 X509_free(c->pkeys[i].x509); 212 c->pkeys[i].x509 = NULL; 217 if (c->pkeys[i].privatekey != NULL) 218 EVP_PKEY_free(c->pkeys[i].privatekey); 220 c->pkeys[i].privatekey=pkey; 221 c->key= &(c->pkeys[i]); 414 if (c->pkeys[i].privatekey != NULL [all...] |
ssl_cert.c | 167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1(); 170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1(); 190 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 210 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 211 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 277 if (cert->pkeys[i].x509 != NULL [all...] |
s3_lib.c | [all...] |
s2_srvr.c | 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 774 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 776 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); 1069 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 1077 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); 1124 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) 1129 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) 1134 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
|
t1_lib.c | [all...] |
ssl_lib.c | [all...] |
s3_srvr.c | 487 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 489 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
d1_srvr.c | 478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
ssl_locl.h | 508 CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array 533 CERT_PKEY pkeys[SSL_PKEY_NUM]; member in struct:cert_st [all...] |
/external/openssl/ssl/ |
ssl_rsa.c | 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 209 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 211 X509_free(c->pkeys[i].x509); 212 c->pkeys[i].x509 = NULL; 217 if (c->pkeys[i].privatekey != NULL) 218 EVP_PKEY_free(c->pkeys[i].privatekey); 220 c->pkeys[i].privatekey=pkey; 221 c->key= &(c->pkeys[i]); 414 if (c->pkeys[i].privatekey != NULL [all...] |
ssl_cert.c | 175 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); 194 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 195 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 261 if (cert->pkeys[i].x509 != NULL) 263 ret->pkeys[i].x509 = cert->pkeys[i].x509; 264 CRYPTO_add(&ret->pkeys[i].x509->references, 1, 268 if (cert->pkeys[i].privatekey != NULL [all...] |
s3_lib.c | [all...] |
s2_srvr.c | 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 774 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 776 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); 1069 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); 1077 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); 1124 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) 1129 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) 1134 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
|
ssl_lib.c | [all...] |
s3_srvr.c | 487 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 489 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
d1_srvr.c | 478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) [all...] |
ssl_locl.h | 491 CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array 516 CERT_PKEY pkeys[SSL_PKEY_NUM]; member in struct:cert_st [all...] |
/dalvik/tools/dmtracedump/ |
TraceDump.c | 567 void freeDataKeys(DataKeys* pKeys) 569 if (pKeys == NULL) 572 free(pKeys->fileData); 573 free(pKeys->threads); 574 free(pKeys->methods); 575 free(pKeys); 654 long parseVersion(DataKeys* pKeys, long offset, int verbose) 663 data = pKeys->fileData + offset; 664 dataEnd = pKeys->fileData + pKeys->fileLen [all...] |
/bootable/recovery/ |
verifier.h | 30 int verify_file(const char* path, const Certificate *pKeys, unsigned int numKeys);
|
verifier.cpp | 38 int verify_file(const char* path, const Certificate* pKeys, unsigned int numKeys) { 147 switch (pKeys[i].hash_len) { 192 switch (pKeys[i].hash_len) { 200 if (RSA_verify(pKeys[i].public_key, eocd + eocd_size - 6 - RSANUMBYTES, 201 RSANUMBYTES, hash, pKeys[i].hash_len)) {
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
jsse.patch | 390 + if (ssl->cert->pkeys[i].x509 == x) 391 + return ssl->cert->pkeys[i].cert_chain;
|