/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
D | EncodedKeySpecTest.java | 55 byte[] ek = meks.getEncoded(); in testGetEncoded() 60 if (encodedKey[i] != ek[i]) { in testGetEncoded() 83 byte[] ek = meks.getEncoded(); in testIsStatePreserved1() 86 assertTrue(ek[3] == (byte)4); in testIsStatePreserved1() 100 byte[] ek = meks.getEncoded(); in testIsStatePreserved2() 102 ek[3] = (byte)5; in testIsStatePreserved2()
|
D | PKCS8EncodedKeySpecTest.java | 70 byte[] ek = meks.getEncoded(); in testGetEncoded() 72 assertTrue(Arrays.equals(encodedKey, ek)); in testGetEncoded() 104 byte[] ek = meks.getEncoded(); in testIsStatePreserved1() 108 assertTrue(Arrays.equals(encodedKey, ek)); in testIsStatePreserved1() 124 byte[] ek = meks.getEncoded(); in testIsStatePreserved2() 127 ek[3] = (byte)5; in testIsStatePreserved2()
|
D | X509EncodedKeySpecTest.java | 70 byte[] ek = eks.getEncoded(); in testGetEncoded() 72 assertTrue(Arrays.equals(encodedKey, ek)); in testGetEncoded() 104 byte[] ek = meks.getEncoded(); in testIsStatePreserved1() 108 assertTrue(Arrays.equals(encodedKey, ek)); in testIsStatePreserved1() 124 byte[] ek = meks.getEncoded(); in testIsStatePreserved2() 127 ek[3] = (byte)5; in testIsStatePreserved2()
|
/external/wpa_supplicant_8/src/crypto/ |
D | des-internal.c | 403 u32 ek[32], work[2]; in des_encrypt() local 414 deskey(pkey, 0, ek); in des_encrypt() 418 desfunc(work, ek); in des_encrypt() 423 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument 429 deskey(key, 0, ek); in des_key_setup() 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument 439 desfunc(work, ek); in des_block_encrypt() 458 deskey(key, 0, dkey->ek[0]); in des3_key_setup() 459 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup() [all …]
|
D | des_i.h | 13 u32 ek[3][32]; member 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
D | crypto_internal-cipher.c | 36 u32 ek[32]; member 97 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init() 158 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | des.c | 411 u32 ek[32], work[2]; in des_encrypt() local 422 deskey(pkey, 0, ek); in des_encrypt() 426 desfunc(work, ek); in des_encrypt() 431 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 436 u32 ek[3][32]; member 442 deskey(key, 0, dkey->ek[0]); in des3_key_setup() 443 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup() 444 deskey(key + 16, 0, dkey->ek[2]); in des3_key_setup() 458 desfunc(work, key->ek[0]); in des3_encrypt() 459 desfunc(work, key->ek[1]); in des3_encrypt() [all …]
|
/external/openssl/crypto/pkcs7/ |
D | pk7_doit.c | 146 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local 172 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo() 174 if (ek == NULL) in pkcs7_encode_rinfo() 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo() 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo() 184 ek = NULL; in pkcs7_encode_rinfo() 193 if (ek) in pkcs7_encode_rinfo() 194 OPENSSL_free(ek); in pkcs7_encode_rinfo() 204 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local 227 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo() [all …]
|
/external/icu4c/data/region/ |
D | mfe.txt | 17 AG{"Antigua-ek-Barbuda"} 59 CS{"Serbi-ek-Montenegro"} 119 KN{"Saint-Christophe-ek-Niévès"} 176 PM{"Saint-Pierre-ek-Miquelon"} 202 ST{"São Tome-ek-Prínsip"} 206 TC{"Zil Tirk ek Caïcos"} 217 TT{"Trinite-ek-Tobago"} 227 VC{"Saint-Vincent-ek-Grenadines"} 233 WF{"Wallis-ek-Futuna"}
|
D | kab.txt | 63 CZ{"Čček"}
|
/external/openssl/crypto/pem/ |
D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, in PEM_SealInit() argument 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); in PEM_SealInit() 108 j=EVP_EncodeBlock((unsigned char *)s,ek[i], in PEM_SealInit() 111 memcpy(ek[i],s,j+1); in PEM_SealInit()
|
/external/openssl/crypto/evp/ |
D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, in EVP_PKEY_encrypt_old() argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, in EVP_SealInit() argument 90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx), in EVP_SealInit()
|
D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument 98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv); in EVP_OpenInit()
|
/external/openssh/ |
D | rijndael.h | 43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member
|
D | rijndael.c | 1223 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key() 1229 memcpy(ctx->dk, ctx->ek, sizeof(ctx->dk)); in rijndael_set_key() 1243 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
|
/external/bluetooth/glib/po/ |
D | cs.po | 29 msgstr "Neočekávaný atribut \"%s\" prvku \"%s\"" 41 msgstr "Neočekávaná značka \"%s\", byla očekávána značka \"%s\"" 47 msgstr "Neočekávaná značka \"%s\" v \"%s\"" 51 msgstr "V datových adresářích nebyl nalezen platný soubor záložek" 419 "Zvláštní znak \"%s\", byl očekáván znak \">\" k ukončení značky empty-" 427 "Zvláštní znak \"%s\", po názvu atributu \"%s\" prvku \"%s\" bylo očekáváno " 437 "Zvláštní znak \"%s\", bylo očekáváno \">\" nebo \"/\" k ukončení počáteční " 448 "prvku \"%s\" byly očekávány uvozovky" 484 msgstr "Dokument neočekávaně skončil ihned po otevírací značce \"<\"" 492 "Dokument neočekávaně skončil, prvky jsou stále otevřeny - poslední otevřený " [all …]
|
/external/linux-tools-perf/util/ |
D | parse-events.c | 738 int eu = 0, ek = 0, eh = 0, precise = 0; in parse_event_modifier() local 752 exclude = eu = ek = eh = 1; in parse_event_modifier() 756 exclude = eu = ek = eh = 1; in parse_event_modifier() 757 ek = 0; in parse_event_modifier() 760 exclude = eu = ek = eh = 1; in parse_event_modifier() 775 attr->exclude_kernel = ek; in parse_event_modifier()
|
/external/openssl/ssl/ |
D | s2_srvr.c | 366 int is_export,i,n,keya,ek; in get_client_master_key() local 465 ek=8; in get_client_master_key() 468 ek=5; in get_client_master_key() 476 || (is_export && ((i != ek) || (s->s2->tmp.clear+(unsigned int)i != in get_client_master_key() 481 i=ek; in get_client_master_key() 495 || (is_export && ((i != ek) || (s->s2->tmp.clear+i != in get_client_master_key()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 1102 u8 ek[32]; in wpa_supplicant_process_1_of_2_wpa() local 1130 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_process_1_of_2_wpa() 1131 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_process_1_of_2_wpa() 1139 rc4_skip(ek, 32, 256, gd->gtk, keydatalen); in wpa_supplicant_process_1_of_2_wpa() 1327 u8 ek[32]; in wpa_supplicant_decrypt_key_data() local 1328 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_decrypt_key_data() 1329 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_decrypt_key_data() 1330 rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen); in wpa_supplicant_decrypt_key_data()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 1241 u8 ek[32]; in wpa_supplicant_process_1_of_2_wpa() local 1270 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_process_1_of_2_wpa() 1271 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_process_1_of_2_wpa() 1279 if (rc4_skip(ek, 32, 256, gd->gtk, keydatalen)) { in wpa_supplicant_process_1_of_2_wpa() 1480 u8 ek[32]; in wpa_supplicant_decrypt_key_data() local 1481 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_decrypt_key_data() 1482 os_memcpy(ek + 16, sm->ptk.kek, 16); in wpa_supplicant_decrypt_key_data() 1483 if (rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen)) { in wpa_supplicant_decrypt_key_data()
|
/external/dropbear/libtomcrypt/src/ciphers/ |
D | des.c | 1545 deskey(key, EN0, skey->des.ek); 1573 deskey(key, EN0, skey->des3.ek[0]); in des3_setup() 1574 deskey(key+8, DE1, skey->des3.ek[1]); in des3_setup() 1575 deskey(key+16, EN0, skey->des3.ek[2]); in des3_setup() 1600 desfunc(work, skey->des.ek); 1644 desfunc(work, skey->des3.ek[0]); in des3_ecb_encrypt() 1645 desfunc(work, skey->des3.ek[1]); in des3_ecb_encrypt() 1646 desfunc(work, skey->des3.ek[2]); in des3_ecb_encrypt()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_cipher.h | 92 ulong32 ek[32], dk[32]; member 96 ulong32 ek[3][32], dk[3][32]; member
|
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/textana/es-ES/ |
D | es-ES_lexpos.utf | 1327 N_F_SG "è" "'ek'onaT'entogr'abe" 1328 N_F_SG "è\/" "'ek'onaT'entogr'abe" 1329 N_F_SG "é" "'ek'onaT'entoag'udo" 1330 N_F_SG "é\/" "'ek'onaT'entoag'udo" 1332 N_F_SG "ê" "'ek'onaT'entoTirkunfl'exo" 1333 N_F_SG "ê\/" "'ek'onaT'entoTirkunfl'exo" 1334 N_F_SG "ë" "'ek'ondj'eresis" 1335 N_F_SG "ë\/" "'ek'ondj'eresis" 1611 N_M_SG "check" "t_S'ek"
|