/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 42 symmetric_key skey; in des_encrypt() local 53 des_setup(pkey, 8, 0, &skey); in des_encrypt() 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt() 55 des_done(&skey); in des_encrypt() 88 symmetric_key *skey; in aes_encrypt_init() local 89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init() 90 if (skey == NULL) in aes_encrypt_init() 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init() 93 os_free(skey); in aes_encrypt_init() 96 return skey; in aes_encrypt_init() [all …]
|
D | tls_openssl_ocsp.c | 508 EVP_PKEY *skey; in check_ocsp_resp() local 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 628 if (!skey) { in check_ocsp_resp() 635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
|
/external/libxml2/ |
D | dict.c | 912 unsigned long skey; in xmlDictLookup() local 919 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictLookup() 921 skey = okey; in xmlDictLookup() 923 key = skey % dict->subdict->size; in xmlDictLookup() 930 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 935 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 942 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 947 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 1049 unsigned long skey; in xmlDictExists() local 1056 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictExists() [all …]
|
/external/javasqlite/src/main/java/SQLite/ |
D | Database.java | 827 public void key(String skey) throws SQLite.Exception { in key() argument 830 if (skey != null && skey.length() > 0) { in key() 831 ekey = new byte[skey.length()]; in key() 832 for (int i = 0; i< skey.length(); i++) { in key() 833 char c = skey.charAt(i); in key() 865 public void rekey(String skey) throws SQLite.Exception { in rekey() argument 868 if (skey != null && skey.length() > 0) { in rekey() 869 ekey = new byte[skey.length()]; in rekey() 870 for (int i = 0; i< skey.length(); i++) { in rekey() 871 char c = skey.charAt(i); in rekey()
|
/external/ltp/testcases/kernel/mem/hugetlb/hugeshmget/ |
D | hugeshmget02.c | 41 int *skey; member 61 if (*tcases[i].skey == -1) { in test_hugeshmget() 62 shm_id_2 = shmget(*(tcases[i].skey), 0, 0); in test_hugeshmget() 67 TEST(shmget(*(tcases[i].skey), tcases[i].size_coe * shm_size, in test_hugeshmget()
|
/external/openssh/ |
D | auth-skey.c | 57 struct skey skey; in skey_query() local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query()
|
D | INSTALL | 71 If you wish to use --with-skey then you will need the library below 74 http://www.sparc.spb.su/solaris/skey/ 182 --with-skey=PATH will enable S/Key one time password support. You will
|
D | TODO | 38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
|
D | monitor.c | 927 struct skey skey; in mm_answer_skeyquery() local 931 success = _compat_skeychallenge(&skey, authctxt->user, challenge, in mm_answer_skeyquery()
|
D | configure.ac | 1426 AC_ARG_WITH([skey], optwith 1427 [ --with-skey[[=PATH]] Enable S/Key support (optionally in PATH)], 1444 #include <skey.h> 1457 #include <skey.h>
|
D | sshd_config.0 | 109 followed by the device identifier bsdauth, pam, or skey,
|
D | ssh_config.0 | 594 skey.
|
/external/ltp/testcases/kernel/syscalls/ipc/shmget/ |
D | shmget02.c | 67 int *skey; member 110 TEST(shmget(*(TC[i].skey), TC[i].size, TC[i].flags)); in main()
|
/external/toybox/toys/pending/ |
D | ipcrm.c | 32 struct arg_list *skey; 84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
|
/external/icu/icu4c/source/test/intltest/ |
D | loctest.cpp | 1790 const UnicodeString* skey; in TestCreateUnicodeKeywords() local 1793 skey = keys->snext(status); in TestCreateUnicodeKeywords() 1795 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords() 1796 if (skey != nullptr) { in TestCreateUnicodeKeywords() 1797 assertEquals("calendar", "ca", *skey); in TestCreateUnicodeKeywords() 1800 skey = keys->snext(status); in TestCreateUnicodeKeywords() 1802 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords() 1803 if (skey != nullptr) { in TestCreateUnicodeKeywords() 1804 assertEquals("collation", "co", *skey); in TestCreateUnicodeKeywords() 1807 skey = keys->snext(status); in TestCreateUnicodeKeywords() [all …]
|
/external/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 1935 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 1971 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 1972 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2029 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
|
/external/f2fs-tools/tools/sg_write_buffer/ |
D | sg_pt_linux_nvme.c | 173 build_sense_buffer(bool desc, uint8_t *buf, uint8_t skey, uint8_t asc, in build_sense_buffer() argument 178 buf[1] = skey; in build_sense_buffer() 184 buf[2] = skey; in build_sense_buffer()
|
/external/toybox/generated/ |
D | globals.h | 665 struct arg_list *skey; member
|
/external/flatbuffers/include/flatbuffers/ |
D | flexbuffers.h | 785 auto skey = reinterpret_cast<const char *>(key); in KeyCompare() local 786 return strcmp(skey, str_elem); in KeyCompare()
|
/external/libevent/ |
D | http.c | 2060 char *skey, *svalue; in evhttp_parse_headers_() local 2086 skey = strsep(&svalue, ":"); in evhttp_parse_headers_() 2093 if (evhttp_add_header(headers, skey, svalue) == -1) in evhttp_parse_headers_()
|
/external/boringssl/src/include/openssl/ |
D | x509.h | 895 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);
|