/system/core/libmincrypt/tools/ |
H A D | DumpPublicKey.java | 36 * @param key to perform sanity checks on 37 * @throws Exception if the key has the wrong size or public exponent 39 static void check(RSAPublicKey key) throws Exception { argument 40 BigInteger pubexp = key.getPublicExponent(); 41 BigInteger modulus = key.getModulus(); 53 * @param key to output 54 * @return a C initializer representing this public key. 56 static String print(RSAPublicKey key) throws Exception { argument 57 check(key); 59 BigInteger N = key [all...] |
/system/core/toolbox/ |
H A D | getprop.c | 7 static void proplist(const char *key, const char *name, argument 10 printf("[%s]: [%s]\n", key, name);
|
H A D | readtty.c | 11 char key; member in struct:__anon156 26 char next_char(char key, char current) argument 31 if(key == map[i].key) { 38 return key; 41 char prev_char(char key, char current) argument 46 if(key == map[i].key) { 53 return key;
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
H A D | keyDeriveAes.c | 2 * \brief AES encryption key derivation implementation. 43 * MODULE: AES broadcast key derivation * 44 * PURPOSE: AES broadcast key derivation * 64 * AES broadcast key derivation configuration function: 90 * AES key derivation function: 91 * - Decodes the key material. 92 * - Distribute the decoded key material to the driver. 96 * I - p - Pointer to the encoded key material. 106 securityKeys_t key; local 118 ("KEY_DERIVE_AES: ERROR: wrong key lengt 171 securityKeys_t key; local [all...] |
H A D | keyDeriveTkip.c | 2 * \brief WEP broadcast key derivation implementation. 43 * MODULE: WEP broadcast key derivation * 44 * PURPOSE: WEP broadcast key derivation * 64 * TKIP key derivation init function: 66 * - Resets the key material in the system control block 92 * TKIP key derivation function: 93 * - Decodes the key material. 94 * - Distribute the decoded key material to the driver. 98 * I - p - Pointer to the encoded key material. 108 securityKeys_t key; local 180 securityKeys_t key; local [all...] |
H A D | keyDeriveWep.c | 2 * \brief WEP broadcast key derivation implementation. 43 * MODULE: WEP broadcast key derivation * 44 * PURPOSE: WEP broadcast key derivation * 64 * WEP broadcast key derivation init function: 66 * - Resets the key material in the system control block 92 * WEP broadcast key derivation function: 93 * - Decodes the key material. 94 * - Distribute the decoded key material to the driver. 98 * I - p - Pointer to the encoded key material. 108 securityKeys_t key; local 159 securityKeys_t key; local 189 securityKeys_t key; local [all...] |
H A D | rsn.c | 391 /* Set the WEP key to the HAL */ 394 /* Change key type to WEP-key before setting*/ 402 ("RSN: Setting key #%d failed \n", keyIndex)); 408 /* Now we configure default key ID to the HAL */ 418 ("RSN: default key ID =%d \n", pRsn->defaultKeyId)); 474 { /* remove previously WEP key for SHARED */ 507 /* Change key type to WEP-key before setting*/ 520 /* Set WEP transmit key mas 544 securityKeys_t key; local 590 securityKeys_t key; local [all...] |
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
H A D | keyDeriveAes.c | 35 * \brief AES encryption key derivation implementation. 42 * MODULE: AES broadcast key derivation * 43 * PURPOSE: AES broadcast key derivation * 63 * AES broadcast key derivation configuration function: 89 * AES key derivation function: 90 * - Decodes the key material. 91 * - Distribute the decoded key material to the driver. 95 * I - p - Pointer to the encoded key material. 105 TSecurityKeys key; local 118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key lengt 169 TSecurityKeys key; local [all...] |
H A D | keyDeriveTkip.c | 35 * \brief WEP broadcast key derivation implementation. 42 * MODULE: WEP broadcast key derivation * 43 * PURPOSE: WEP broadcast key derivation * 63 * TKIP key derivation init function: 65 * - Resets the key material in the system control block 91 * TKIP key derivation function: 92 * - Decodes the key material. 93 * - Distribute the decoded key material to the driver. 97 * I - p - Pointer to the encoded key material. 107 TSecurityKeys key; local 179 TSecurityKeys key; local [all...] |
H A D | keyDerive.h | 35 * \brief station unicast key SM API 42 * MODULE: station unicast key SM * 43 * PURPOSE: station unicast key SM API * 71 encodedKeyMaterial_t key; member in struct:_keyDerive_t
|
H A D | keyDeriveCkip.c | 35 * \brief WEP broadcast key derivation implementation. 42 * MODULE: WEP broadcast key derivation * 43 * PURPOSE: WEP broadcast key derivation * 67 * CKIP key derivation init function: 69 * - Resets the key material in the system control block 95 * CKIP key derivation function: 96 * - Decodes the key material. 97 * - Distribute the decoded key material to the driver. 101 * I - p - Pointer to the encoded key material. 111 TSecurityKeys key; local 191 TSecurityKeys key; local [all...] |
H A D | keyDeriveWep.c | 35 * \brief WEP broadcast key derivation implementation. 42 * MODULE: WEP broadcast key derivation * 43 * PURPOSE: WEP broadcast key derivation * 63 * WEP broadcast key derivation init function: 65 * - Resets the key material in the system control block 91 * WEP broadcast key derivation function: 92 * - Decodes the key material. 93 * - Distribute the decoded key material to the driver. 97 * I - p - Pointer to the encoded key material. 107 TSecurityKeys key; local 157 TSecurityKeys key; local 187 TSecurityKeys key; local [all...] |
/system/core/include/cutils/ |
H A D | sockets.h | 48 char key[64] = ANDROID_SOCKET_ENV_PREFIX; local 54 strlcpy(key + sizeof(ANDROID_SOCKET_ENV_PREFIX) - 1, 56 sizeof(key) - sizeof(ANDROID_SOCKET_ENV_PREFIX)); 58 strncpy(key + sizeof(ANDROID_SOCKET_ENV_PREFIX) - 1, 60 sizeof(key) - sizeof(ANDROID_SOCKET_ENV_PREFIX)); 61 key[sizeof(key)-1] = '\0'; 64 val = getenv(key);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/ |
H A D | keyDerive.h | 2 * \brief station unicast key SM API 43 * MODULE: station unicast key SM * 44 * PURPOSE: station unicast key SM API * 72 encodedKeyMaterial_t key; member in struct:_keyDerive_t
|
/system/core/libmincrypt/ |
H A D | rsa.c | 32 static void subM(const RSAPublicKey *key, uint32_t *a) { argument 35 for (i = 0; i < key->len; ++i) { 36 A += (uint64_t)a[i] - key->n[i]; 43 static int geM(const RSAPublicKey *key, const uint32_t *a) { argument 45 for (i = key->len; i;) { 47 if (a[i] < key->n[i]) return 0; 48 if (a[i] > key->n[i]) return 1; 54 static void montMulAdd(const RSAPublicKey *key, argument 59 uint32_t d0 = (uint32_t)A * key->n0inv; 60 uint64_t B = (uint64_t)d0 * key 79 montMul(const RSAPublicKey *key, uint32_t* c, const uint32_t* a, const uint32_t* b) argument 95 modpow3(const RSAPublicKey *key, uint8_t* inout) argument 162 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *sha) argument [all...] |
/system/core/libcutils/ |
H A D | properties.c | 59 int property_set(const char *key, const char *value) argument 64 if(key == 0) return -1; 67 if(strlen(key) >= PROP_NAME_MAX) return -1; 71 strcpy((char*) msg.name, key); 77 int property_get(const char *key, char *value, const char *default_value) argument 81 len = __system_property_get(key, value); 93 int property_list(void (*propfn)(const char *key, const char *value, void *cookie), argument 175 int property_get(const char *key, char *value, const char *default_value) argument 181 //LOGV("PROPERTY GET [%s]\n", key); 193 if (strlen(key) > 242 property_set(const char *key, const char *value) argument 279 property_list(void (*propfn)(const char *key, const char *value, void *cookie), void *cookie) argument 298 property_get(const char *key, char *value, const char *default_value) argument 332 property_set(const char *key, const char *value) argument 362 property_list(void (*propfn)(const char *key, const char *value, void *cookie), void *cookie) argument [all...] |
H A D | hashmap.c | 28 void* key; member in struct:Entry 37 int (*hash)(void* key); 44 int (*hash)(void* key), bool (*equals)(void* keyA, void* keyB)) { 78 * Hashes the given key. 80 static inline int hashKey(Hashmap* map, void* key) { argument 81 int h = map->hash(key); 155 int hashmapHash(void* key, size_t keySize) { argument 157 char* data = (char*) key; 166 static Entry* createEntry(void* key, int hash, void* value) { argument 171 entry->key 43 hashmapCreate(size_t initialCapacity, int (*hash)(void* key), bool (*equals)(void* keyA, void* keyB)) argument 189 hashmapPut(Hashmap* map, void* key, void* value) argument 221 hashmapGet(Hashmap* map, void* key) argument 236 hashmapContainsKey(Hashmap* map, void* key) argument 251 hashmapMemoize(Hashmap* map, void* key, void* (*initialValue)(void* key, void* context), void* context) argument 284 hashmapRemove(Hashmap* map, void* key) argument 306 hashmapForEach(Hashmap* map, bool (*callback)(void* key, void* value, void* context), void* context) argument 341 hashmapIntHash(void* key) argument [all...] |
/system/core/libpixelflinger/tinyutils/ |
H A D | KeyedVector.h | 55 const VALUE& valueFor(const KEY& key) const; 58 ssize_t indexOfKey(const KEY& key) const; 64 VALUE& editValueFor(const KEY& key); 71 ssize_t add(const KEY& key, const VALUE& item); 72 ssize_t replaceValueFor(const KEY& key, const VALUE& item); 79 ssize_t removeItem(const KEY& key); 90 * valueFor() is called with a key that doesn't exist. 97 const VALUE& valueFor(const KEY& key) const; 111 ssize_t KeyedVector<KEY,VALUE>::indexOfKey(const KEY& key) const { 112 return mVector.indexOf( key_value_pair_t<KEY,VALUE>(key) ); 133 editValueFor(const KEY& key) argument 145 add(const KEY& key, const VALUE& value) argument 150 replaceValueFor(const KEY& key, const VALUE& value) argument 166 removeItem(const KEY& key) argument [all...] |
H A D | TypeHelpers.h | 206 * a key/value pair 211 KEY key; member in struct:android::key_value_pair_t 214 key_value_pair_t(const key_value_pair_t& o) : key(o.key), value(o.value) { } 215 key_value_pair_t(const KEY& k, const VALUE& v) : key(k), value(v) { } 216 key_value_pair_t(const KEY& k) : key(k) { } 218 return strictly_order_type(key, o.key);
|
/system/vold/ |
H A D | Devmapper.cpp | 160 int Devmapper::create(const char *name, const char *loopFile, const char *key, argument 228 sprintf(cryptParams, "twofish %s 0 %s 0", key, loopFile);
|
H A D | VolumeManager.cpp | 212 const char *fstype, const char *key, int ownerUid) { 274 if (strcmp(key, "none")) { 277 if (Devmapper::create(idHash, loopDevice, key, numImgSectors, dmDevice, 570 int VolumeManager::mountAsec(const char *id, const char *key, int ownerUid) { argument 653 if (strcmp(key, "none")) { 655 if (Devmapper::create(idHash, loopDevice, key, nr_sec, 211 createAsec(const char *id, unsigned int numSectors, const char *fstype, const char *key, int ownerUid) argument
|
/system/extras/showslab/ |
H A D | showslab.c | 243 * set_sort_func - return the slab_sort_func that matches the given key. 244 * On unrecognizable key, the call returns NULL. 246 static void * set_sort_func(char key) argument 248 switch (tolower(key)) {
|
/system/wlan/ti/wilink_6_1/CUDK/configurationutility/src/ |
H A D | cu_common.c | 309 OS_802_11_KEY key; local 311 os_memset(&key, 0, sizeof(OS_802_11_KEY)); 313 key.Length = pKey->Length; 314 key.KeyIndex = (pKey->KeyIndex & 0x80000000) | (pKey->KeyIndex & 0x3FFFFFFF); 315 key.KeyLength = pKey->KeyLength; 316 os_memcpy(key.KeyMaterial, pKey->KeyMaterial, pKey->KeyLength); 318 res = IPC_STA_Private_Send(pCuCommon->hIpcSta, RSN_ADD_KEY_PARAM, &key, sizeof(OS_802_11_KEY), 331 OS_802_11_KEY key; local 333 os_memset(&key, 0, sizeof(OS_802_11_KEY)); 334 key [all...] |
/system/core/init/ |
H A D | property_service.c | 332 static int property_list(void (*propfn)(const char *key, const char *value, void *cookie), argument 412 char *key, *value, *eol, *sol, *tmp; local 416 key = sol; 420 value = strchr(key, '='); 424 while(isspace(*key)) key++; 425 if(*key == '#') continue; 427 while((tmp > key) && isspace(*tmp)) *tmp-- = 0; 433 property_set(key, value);
|
/system/core/nexus/ |
H A D | WifiNetwork.cpp | 298 int WifiNetwork::setWepKey(int idx, const char *key) { argument 302 int rc = mSuppl->setNetworkVar(mNetid, name, key); 310 mWepKeys[idx] = strdup(key); 736 const char *key = mWn->getWepKey(idx); local 738 strncpy(buffer, (key ? key : "none"), max);
|