/external/javasqlite/src/main/java/SQLite/ |
Database.java | 810 * @param ekey the key as byte array 813 public void key(byte[] ekey) throws SQLite.Exception { 815 _key(ekey); 829 byte ekey[] = null; 831 ekey = new byte[skey.length()]; 834 ekey[i] = (byte) ((c & 0xff) ^ (c >> 8)); 837 _key(ekey); 841 private native void _key(byte[] ekey); 848 * @param ekey the key as byte array 851 public void rekey(byte[] ekey) throws SQLite.Exception [all...] |
/external/pdfium/core/fpdfapi/parser/ |
cpdf_security_handler.cpp | 352 ByteString ekey = m_pEncryptDict->GetStringFor(bOwner ? "OE" : "UE"); local 353 if (ekey.GetLength() < 32) 362 CRYPT_AESDecrypt(&aes, key, ekey.raw_str(), 32);
|
/system/keymaster/key_blob_utils/ |
ocb.c | 535 static void AES_set_decrypt_key_fast(AES_KEY* dkey, const AES_KEY* ekey) { 537 int i = ROUNDS(ekey); 541 dkey->rd_key[i--] = ekey->rd_key[j++]; 543 dkey->rd_key[i--] = _mm_aesimc_si128(ekey->rd_key[j++]); 544 dkey->rd_key[i] = ekey->rd_key[j]; [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 141 u8 *buf, *ekey; local 186 ekey = os_malloc(ekey_len); 187 if (ekey == NULL) { 192 os_memcpy(ekey, key->key_iv, sizeof(key->key_iv)); 193 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 194 rc4_skip(ekey, ekey_len, 0, (u8 *) (key + 1), key_len); 195 os_free(ekey); [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 682 u8 ekey[IEEE8021X_KEY_IV_LEN + IEEE8021X_ENCR_KEY_LEN]; local 784 os_memcpy(ekey, key->key_iv, IEEE8021X_KEY_IV_LEN); 785 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, 788 rc4_skip(ekey, IEEE8021X_KEY_IV_LEN + encr_key_len, 0, [all...] |
/prebuilts/tools/common/m2/repository/net/sourceforge/htmlunit/htmlunit-core-js/2.14/ |
htmlunit-core-js-2.14.jar | |
/prebuilts/tools/common/m2/repository/org/mozilla/rhino/1.7R3/ |
rhino-1.7R3.jar | |