Home
last modified time | relevance | path

Searched refs:skey (Results 1 – 21 of 21) sorted by relevance

/external/wpa_supplicant_8/src/crypto/
Dcrypto_libtomcrypt.c42 symmetric_key skey; in des_encrypt() local
53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt()
55 des_done(&skey); in des_encrypt()
88 symmetric_key *skey; in aes_encrypt_init() local
89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init()
90 if (skey == NULL) in aes_encrypt_init()
92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init()
93 os_free(skey); in aes_encrypt_init()
96 return skey; in aes_encrypt_init()
[all …]
Dtls_openssl_ocsp.c508 EVP_PKEY *skey; in check_ocsp_resp() local
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
628 if (!skey) { in check_ocsp_resp()
635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
/external/libxml2/
Ddict.c912 unsigned long skey; in xmlDictLookup() local
919 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictLookup()
921 skey = okey; in xmlDictLookup()
923 key = skey % dict->subdict->size; in xmlDictLookup()
930 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup()
935 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup()
942 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup()
947 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup()
1049 unsigned long skey; in xmlDictExists() local
1056 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictExists()
[all …]
/external/javasqlite/src/main/java/SQLite/
DDatabase.java827 public void key(String skey) throws SQLite.Exception { in key() argument
830 if (skey != null && skey.length() > 0) { in key()
831 ekey = new byte[skey.length()]; in key()
832 for (int i = 0; i< skey.length(); i++) { in key()
833 char c = skey.charAt(i); in key()
865 public void rekey(String skey) throws SQLite.Exception { in rekey() argument
868 if (skey != null && skey.length() > 0) { in rekey()
869 ekey = new byte[skey.length()]; in rekey()
870 for (int i = 0; i< skey.length(); i++) { in rekey()
871 char c = skey.charAt(i); in rekey()
/external/ltp/testcases/kernel/mem/hugetlb/hugeshmget/
Dhugeshmget02.c41 int *skey; member
61 if (*tcases[i].skey == -1) { in test_hugeshmget()
62 shm_id_2 = shmget(*(tcases[i].skey), 0, 0); in test_hugeshmget()
67 TEST(shmget(*(tcases[i].skey), tcases[i].size_coe * shm_size, in test_hugeshmget()
/external/openssh/
Dauth-skey.c57 struct skey skey; in skey_query() local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query()
DINSTALL71 If you wish to use --with-skey then you will need the library below
74 http://www.sparc.spb.su/solaris/skey/
182 --with-skey=PATH will enable S/Key one time password support. You will
DTODO38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
Dmonitor.c927 struct skey skey; in mm_answer_skeyquery() local
931 success = _compat_skeychallenge(&skey, authctxt->user, challenge, in mm_answer_skeyquery()
Dconfigure.ac1426 AC_ARG_WITH([skey], optwith
1427 [ --with-skey[[=PATH]] Enable S/Key support (optionally in PATH)],
1444 #include <skey.h>
1457 #include <skey.h>
Dsshd_config.0109 followed by the device identifier bsdauth, pam, or skey,
Dssh_config.0594 skey.
/external/ltp/testcases/kernel/syscalls/ipc/shmget/
Dshmget02.c67 int *skey; member
110 TEST(shmget(*(TC[i].skey), TC[i].size, TC[i].flags)); in main()
/external/toybox/toys/pending/
Dipcrm.c32 struct arg_list *skey;
84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
/external/icu/icu4c/source/test/intltest/
Dloctest.cpp1790 const UnicodeString* skey; in TestCreateUnicodeKeywords() local
1793 skey = keys->snext(status); in TestCreateUnicodeKeywords()
1795 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords()
1796 if (skey != nullptr) { in TestCreateUnicodeKeywords()
1797 assertEquals("calendar", "ca", *skey); in TestCreateUnicodeKeywords()
1800 skey = keys->snext(status); in TestCreateUnicodeKeywords()
1802 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords()
1803 if (skey != nullptr) { in TestCreateUnicodeKeywords()
1804 assertEquals("collation", "co", *skey); in TestCreateUnicodeKeywords()
1807 skey = keys->snext(status); in TestCreateUnicodeKeywords()
[all …]
/external/boringssl/src/crypto/x509/
Dx509_vfy.c1935 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument
1971 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff()
1972 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff()
2029 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
/external/f2fs-tools/tools/sg_write_buffer/
Dsg_pt_linux_nvme.c173 build_sense_buffer(bool desc, uint8_t *buf, uint8_t skey, uint8_t asc, in build_sense_buffer() argument
178 buf[1] = skey; in build_sense_buffer()
184 buf[2] = skey; in build_sense_buffer()
/external/toybox/generated/
Dglobals.h665 struct arg_list *skey; member
/external/flatbuffers/include/flatbuffers/
Dflexbuffers.h785 auto skey = reinterpret_cast<const char *>(key); in KeyCompare() local
786 return strcmp(skey, str_elem); in KeyCompare()
/external/libevent/
Dhttp.c2060 char *skey, *svalue; in evhttp_parse_headers_() local
2086 skey = strsep(&svalue, ":"); in evhttp_parse_headers_()
2093 if (evhttp_add_header(headers, skey, svalue) == -1) in evhttp_parse_headers_()
/external/boringssl/src/include/openssl/
Dx509.h895 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);