/hardware/qcom/msm8996/kernel-headers/linux/ |
qcedev.h | 110 uint8_t enckey[QCEDEV_MAX_KEY_SIZE]; member in struct:qcedev_cipher_op_req
|
/external/tcpdump/ |
print-esp.c | 352 char *enckey; local 358 enckey = strsep(&line, " \t"); 361 if(!init || !icookie || !rcookie || !authkey || !enckey) { 393 if(!espprint_decode_encalgo(ndo, enckey, &sa1)) return;
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
qcedev.h | 145 * @enckey (IN): 128 bits of confidentiality key 146 * enckey[0] bit 127-120, enckey[1] bit 119-112,.. 147 * enckey[15] bit 7-0 176 * key paramters (encklen, enckey) to use the hardware key. 177 * In order to use the hardware key, set encklen to 0 and set the enckey 189 uint8_t enckey[QCEDEV_MAX_KEY_SIZE]; member in struct:qcedev_cipher_op_req
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
fpdf_parser_encrypt.cpp | 481 uint8_t enckey[32]; 482 FXSYS_memset(enckey, 0, sizeof(enckey)); 487 FXSYS_memcpy(enckey, digest, copy_len); 496 CRYPT_ArcFourCryptBlock(okeybuf, okeylen, enckey, key_len); 502 tempkey[j] = enckey[j] ^ i; 580 uint8_t enckey[32]; 581 FXSYS_memcpy(enckey, digest, key_len); 585 CRYPT_ArcFourCryptBlock(passcode, 32, enckey, key_len); 590 tempkey[j] = enckey[j] ^ (uint8_t)i [all...] |
/external/boringssl/src/crypto/aes/asm/ |
aes-586.pl | 2635 sub enckey() subroutine [all...] |
aes-x86_64.pl | 1254 sub enckey() subroutine 1354 &enckey (); 1389 &enckey (); 1434 &enckey (); [all...] |