Home
last modified time | relevance | path

Searched refs:skey (Results 1 – 14 of 14) sorted by relevance

/external/wpa_supplicant_8/src/crypto/
Dcrypto_libtomcrypt.c42 symmetric_key skey; in des_encrypt() local
53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt()
55 des_done(&skey); in des_encrypt()
87 symmetric_key *skey; in aes_encrypt_init() local
88 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init()
89 if (skey == NULL) in aes_encrypt_init()
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init()
92 os_free(skey); in aes_encrypt_init()
95 return skey; in aes_encrypt_init()
[all …]
/external/javasqlite/src/main/java/SQLite/
DDatabase.java827 public void key(String skey) throws SQLite.Exception { in key() argument
830 if (skey != null && skey.length() > 0) { in key()
831 ekey = new byte[skey.length()]; in key()
832 for (int i = 0; i< skey.length(); i++) { in key()
833 char c = skey.charAt(i); in key()
865 public void rekey(String skey) throws SQLite.Exception { in rekey() argument
868 if (skey != null && skey.length() > 0) { in rekey()
869 ekey = new byte[skey.length()]; in rekey()
870 for (int i = 0; i< skey.length(); i++) { in rekey()
871 char c = skey.charAt(i); in rekey()
/external/libxml2/
Ddict.c880 unsigned long skey; in xmlDictLookup() local
887 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictLookup()
889 skey = okey; in xmlDictLookup()
891 key = skey % dict->subdict->size; in xmlDictLookup()
898 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup()
903 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup()
910 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup()
915 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup()
1017 unsigned long skey; in xmlDictExists() local
1024 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictExists()
[all …]
/external/openssh/
Dauth-skey.c57 struct skey skey; in skey_query() local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query()
DINSTALL64 If you wish to use --with-skey then you will need the library below
67 http://www.sparc.spb.su/solaris/skey/
175 --with-skey=PATH will enable S/Key one time password support. You will
DTODO38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
DAndroid.mk218 auth-skey.c \
Dmonitor.c1009 struct skey skey; in mm_answer_skeyquery() local
1013 success = _compat_skeychallenge(&skey, authctxt->user, challenge, in mm_answer_skeyquery()
Dconfigure.ac1372 AC_ARG_WITH([skey], optwith
1373 [ --with-skey[[=PATH]] Enable S/Key support (optionally in PATH)],
1390 #include <skey.h>
1403 #include <skey.h>
DChangeLog8441 have included a style (e.g. "root:skey") when checking public key
/external/toybox/toys/pending/
Dipcrm.c32 struct arg_list *skey;
84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
/external/boringssl/src/crypto/x509/
Dx509_vfy.c1937 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument
1980 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff()
1981 X509_CRL_verify(newer, skey) <= 0)) in X509_CRL_diff()
2042 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
/external/toybox/generated/
Dglobals.h564 struct arg_list *skey; member
/external/boringssl/src/include/openssl/
Dx509.h904 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);