/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 42 symmetric_key skey; in des_encrypt() local 53 des_setup(pkey, 8, 0, &skey); in des_encrypt() 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt() 55 des_done(&skey); in des_encrypt() 87 symmetric_key *skey; in aes_encrypt_init() local 88 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init() 89 if (skey == NULL) in aes_encrypt_init() 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init() 92 os_free(skey); in aes_encrypt_init() 95 return skey; in aes_encrypt_init() [all …]
|
/external/javasqlite/src/main/java/SQLite/ |
D | Database.java | 827 public void key(String skey) throws SQLite.Exception { in key() argument 830 if (skey != null && skey.length() > 0) { in key() 831 ekey = new byte[skey.length()]; in key() 832 for (int i = 0; i< skey.length(); i++) { in key() 833 char c = skey.charAt(i); in key() 865 public void rekey(String skey) throws SQLite.Exception { in rekey() argument 868 if (skey != null && skey.length() > 0) { in rekey() 869 ekey = new byte[skey.length()]; in rekey() 870 for (int i = 0; i< skey.length(); i++) { in rekey() 871 char c = skey.charAt(i); in rekey()
|
/external/libxml2/ |
D | dict.c | 880 unsigned long skey; in xmlDictLookup() local 887 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictLookup() 889 skey = okey; in xmlDictLookup() 891 key = skey % dict->subdict->size; in xmlDictLookup() 898 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 903 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 910 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 915 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 1017 unsigned long skey; in xmlDictExists() local 1024 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictExists() [all …]
|
/external/openssh/ |
D | auth-skey.c | 57 struct skey skey; in skey_query() local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query()
|
D | INSTALL | 64 If you wish to use --with-skey then you will need the library below 67 http://www.sparc.spb.su/solaris/skey/ 175 --with-skey=PATH will enable S/Key one time password support. You will
|
D | TODO | 38 and order to try them in e.g. "ChallengeResponseAuthentication skey, pam"
|
D | Android.mk | 218 auth-skey.c \
|
D | monitor.c | 1009 struct skey skey; in mm_answer_skeyquery() local 1013 success = _compat_skeychallenge(&skey, authctxt->user, challenge, in mm_answer_skeyquery()
|
D | configure.ac | 1372 AC_ARG_WITH([skey], optwith 1373 [ --with-skey[[=PATH]] Enable S/Key support (optionally in PATH)], 1390 #include <skey.h> 1403 #include <skey.h>
|
D | ChangeLog | 8441 have included a style (e.g. "root:skey") when checking public key
|
/external/toybox/toys/pending/ |
D | ipcrm.c | 32 struct arg_list *skey; 84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
|
/external/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 1937 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 1980 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 1981 X509_CRL_verify(newer, skey) <= 0)) in X509_CRL_diff() 2042 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
|
/external/toybox/generated/ |
D | globals.h | 564 struct arg_list *skey; member
|
/external/boringssl/src/include/openssl/ |
D | x509.h | 904 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);
|