Home
last modified time | relevance | path

Searched refs:ek (Results 1 – 25 of 61) sorted by relevance

123

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/
DEncodedKeySpecTest.java55 byte[] ek = meks.getEncoded(); in testGetEncoded()
60 if (encodedKey[i] != ek[i]) { in testGetEncoded()
83 byte[] ek = meks.getEncoded(); in testIsStatePreserved1()
86 assertTrue(ek[3] == (byte)4); in testIsStatePreserved1()
100 byte[] ek = meks.getEncoded(); in testIsStatePreserved2()
102 ek[3] = (byte)5; in testIsStatePreserved2()
DPKCS8EncodedKeySpecTest.java70 byte[] ek = meks.getEncoded(); in testGetEncoded()
72 assertTrue(Arrays.equals(encodedKey, ek)); in testGetEncoded()
104 byte[] ek = meks.getEncoded(); in testIsStatePreserved1()
108 assertTrue(Arrays.equals(encodedKey, ek)); in testIsStatePreserved1()
124 byte[] ek = meks.getEncoded(); in testIsStatePreserved2()
127 ek[3] = (byte)5; in testIsStatePreserved2()
DX509EncodedKeySpecTest.java70 byte[] ek = eks.getEncoded(); in testGetEncoded()
72 assertTrue(Arrays.equals(encodedKey, ek)); in testGetEncoded()
104 byte[] ek = meks.getEncoded(); in testIsStatePreserved1()
108 assertTrue(Arrays.equals(encodedKey, ek)); in testIsStatePreserved1()
124 byte[] ek = meks.getEncoded(); in testIsStatePreserved2()
127 ek[3] = (byte)5; in testIsStatePreserved2()
/external/wpa_supplicant_8/src/crypto/
Ddes-internal.c403 u32 ek[32], work[2]; in des_encrypt() local
414 deskey(pkey, 0, ek); in des_encrypt()
418 desfunc(work, ek); in des_encrypt()
423 os_memset(ek, 0, sizeof(ek)); in des_encrypt()
427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument
429 deskey(key, 0, ek); in des_key_setup()
434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument
439 desfunc(work, ek); in des_block_encrypt()
458 deskey(key, 0, dkey->ek[0]); in des3_key_setup()
459 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup()
[all …]
Ddes_i.h13 u32 ek[3][32]; member
17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk);
18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
Dcrypto_internal-cipher.c36 u32 ek[32]; member
97 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init()
158 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Ddes.c411 u32 ek[32], work[2]; in des_encrypt() local
422 deskey(pkey, 0, ek); in des_encrypt()
426 desfunc(work, ek); in des_encrypt()
431 os_memset(ek, 0, sizeof(ek)); in des_encrypt()
436 u32 ek[3][32]; member
442 deskey(key, 0, dkey->ek[0]); in des3_key_setup()
443 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup()
444 deskey(key + 16, 0, dkey->ek[2]); in des3_key_setup()
458 desfunc(work, key->ek[0]); in des3_encrypt()
459 desfunc(work, key->ek[1]); in des3_encrypt()
[all …]
/external/openssl/crypto/pkcs7/
Dpk7_doit.c146 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local
172 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo()
174 if (ek == NULL) in pkcs7_encode_rinfo()
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo()
183 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo()
184 ek = NULL; in pkcs7_encode_rinfo()
193 if (ek) in pkcs7_encode_rinfo()
194 OPENSSL_free(ek); in pkcs7_encode_rinfo()
204 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local
227 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo()
[all …]
/external/icu4c/data/region/
Dmfe.txt17 AG{"Antigua-ek-Barbuda"}
59 CS{"Serbi-ek-Montenegro"}
119 KN{"Saint-Christophe-ek-Niévès"}
176 PM{"Saint-Pierre-ek-Miquelon"}
202 ST{"São Tome-ek-Prínsip"}
206 TC{"Zil Tirk ek Caïcos"}
217 TT{"Trinite-ek-Tobago"}
227 VC{"Saint-Vincent-ek-Grenadines"}
233 WF{"Wallis-ek-Futuna"}
Dkab.txt63 CZ{"Čček"}
/external/openssl/crypto/pem/
Dpem_seal.c71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, in PEM_SealInit() argument
102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); in PEM_SealInit()
108 j=EVP_EncodeBlock((unsigned char *)s,ek[i], in PEM_SealInit()
111 memcpy(ek[i],s,j+1); in PEM_SealInit()
/external/openssl/crypto/evp/
Dp_enc.c69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, in EVP_PKEY_encrypt_old() argument
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
Dp_dec.c69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument
83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
Dp_seal.c69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, in EVP_SealInit() argument
90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx), in EVP_SealInit()
Dp_open.c70 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument
98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv); in EVP_OpenInit()
/external/openssh/
Drijndael.h43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member
Drijndael.c1223 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key()
1229 memcpy(ctx->dk, ctx->ek, sizeof(ctx->dk)); in rijndael_set_key()
1243 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
/external/bluetooth/glib/po/
Dcs.po29 msgstr "Neočekávaný atribut \"%s\" prvku \"%s\""
41 msgstr "Neočekávaná značka \"%s\", byla očekávána značka \"%s\""
47 msgstr "Neočekávaná značka \"%s\" v \"%s\""
51 msgstr "V datových adresářích nebyl nalezen platný soubor záložek"
419 "Zvláštní znak \"%s\", byl očekáván znak \">\" k ukončení značky empty-"
427 "Zvláštní znak \"%s\", po názvu atributu \"%s\" prvku \"%s\" bylo očekáváno "
437 "Zvláštní znak \"%s\", bylo očekáváno \">\" nebo \"/\" k ukončení počáteční "
448 "prvku \"%s\" byly očekávány uvozovky"
484 msgstr "Dokument neočekávaně skončil ihned po otevírací značce \"<\""
492 "Dokument neočekávaně skončil, prvky jsou stále otevřeny - poslední otevřený "
[all …]
/external/linux-tools-perf/util/
Dparse-events.c738 int eu = 0, ek = 0, eh = 0, precise = 0; in parse_event_modifier() local
752 exclude = eu = ek = eh = 1; in parse_event_modifier()
756 exclude = eu = ek = eh = 1; in parse_event_modifier()
757 ek = 0; in parse_event_modifier()
760 exclude = eu = ek = eh = 1; in parse_event_modifier()
775 attr->exclude_kernel = ek; in parse_event_modifier()
/external/openssl/ssl/
Ds2_srvr.c366 int is_export,i,n,keya,ek; in get_client_master_key() local
465 ek=8; in get_client_master_key()
468 ek=5; in get_client_master_key()
476 || (is_export && ((i != ek) || (s->s2->tmp.clear+(unsigned int)i != in get_client_master_key()
481 i=ek; in get_client_master_key()
495 || (is_export && ((i != ek) || (s->s2->tmp.clear+i != in get_client_master_key()
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dwpa.c1102 u8 ek[32]; in wpa_supplicant_process_1_of_2_wpa() local
1130 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_process_1_of_2_wpa()
1131 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_process_1_of_2_wpa()
1139 rc4_skip(ek, 32, 256, gd->gtk, keydatalen); in wpa_supplicant_process_1_of_2_wpa()
1327 u8 ek[32]; in wpa_supplicant_decrypt_key_data() local
1328 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_decrypt_key_data()
1329 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_decrypt_key_data()
1330 rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen); in wpa_supplicant_decrypt_key_data()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.c1241 u8 ek[32]; in wpa_supplicant_process_1_of_2_wpa() local
1270 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_process_1_of_2_wpa()
1271 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_process_1_of_2_wpa()
1279 if (rc4_skip(ek, 32, 256, gd->gtk, keydatalen)) { in wpa_supplicant_process_1_of_2_wpa()
1480 u8 ek[32]; in wpa_supplicant_decrypt_key_data() local
1481 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_decrypt_key_data()
1482 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_decrypt_key_data()
1483 if (rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen)) { in wpa_supplicant_decrypt_key_data()
/external/dropbear/libtomcrypt/src/ciphers/
Ddes.c1545 deskey(key, EN0, skey->des.ek);
1573 deskey(key, EN0, skey->des3.ek[0]); in des3_setup()
1574 deskey(key+8, DE1, skey->des3.ek[1]); in des3_setup()
1575 deskey(key+16, EN0, skey->des3.ek[2]); in des3_setup()
1600 desfunc(work, skey->des.ek);
1644 desfunc(work, skey->des3.ek[0]); in des3_ecb_encrypt()
1645 desfunc(work, skey->des3.ek[1]); in des3_ecb_encrypt()
1646 desfunc(work, skey->des3.ek[2]); in des3_ecb_encrypt()
/external/dropbear/libtomcrypt/src/headers/
Dtomcrypt_cipher.h92 ulong32 ek[32], dk[32]; member
96 ulong32 ek[3][32], dk[3][32]; member
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/textana/es-ES/
Des-ES_lexpos.utf1327 N_F_SG "è" "'ek'onaT'entogr'abe"
1328 N_F_SG "è\/" "'ek'onaT'entogr'abe"
1329 N_F_SG "é" "'ek'onaT'entoag'udo"
1330 N_F_SG "é\/" "'ek'onaT'entoag'udo"
1332 N_F_SG "ê" "'ek'onaT'entoTirkunfl'exo"
1333 N_F_SG "ê\/" "'ek'onaT'entoTirkunfl'exo"
1334 N_F_SG "ë" "'ek'ondj'eresis"
1335 N_F_SG "ë\/" "'ek'ondj'eresis"
1611 N_M_SG "check" "t_S'ek"

123