/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) { 30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
H A D | f9_init.c | 23 @param key [in] Secret key 24 @param keylen Length of secret key in octets 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 32 LTC_ARGCHK(key != NULL); 34 /* schedule the key */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 49 /* make the second key */ 51 f9->akey[x] = key[ [all...] |
/external/dropbear/libtomcrypt/src/mac/hmac/ |
H A D | hmac_file.c | 24 @param key The secret key 25 @param keylen The length of the secret key 31 const unsigned char *key, unsigned long keylen, 44 LTC_ARGCHK(key != NULL); 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { 30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) { 30 omac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
H A D | pmac_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 44 LTC_ARGCHK(key != NULL); 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { 30 pmac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { 30 xcbc_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 24 @param key The secret key 25 @param keylen The length of the secret key (octets) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 33 LTC_ARGCHK(key != NULL); 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_export.c | 15 DSA implementation, export key, Tom St Denis 21 Export a DSA key to a binary packet 24 @param type The type of key to export (PK_PRIVATE or PK_PUBLIC) 25 @param key The key to export 28 int dsa_export(unsigned char *out, unsigned long *outlen, int type, dsa_key *key) argument 34 LTC_ARGCHK(key != NULL); 37 if (type == PK_PRIVATE && key->type != PK_PRIVATE) { 50 LTC_ASN1_INTEGER, 1UL, key->g, 51 LTC_ASN1_INTEGER, 1UL, key [all...] |
H A D | dsa_import.c | 15 DSA implementation, import a DSA key, Tom St Denis 21 Import a DSA key 24 @param key [out] Where to store the imported key 27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key) argument 33 LTC_ARGCHK(key != NULL); 36 /* init key */ 37 if (mp_init_multi(&key->p, &key->g, &key [all...] |
H A D | dsa_verify_key.c | 15 DSA implementation, verify a key, Tom St Denis 21 Verify a DSA key for validity 22 @param key The key to verify 26 int dsa_verify_key(dsa_key *key, int *stat) argument 31 LTC_ARGCHK(key != NULL); 34 /* default to an invalid key */ 37 /* first make sure key->q and key->p are prime */ 38 if ((err = mp_prime_is_prime(key [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_ansi_x963_export.c | 27 @param key Key to export 32 int ecc_ansi_x963_export(ecc_key *key, unsigned char *out, unsigned long *outlen) argument 37 LTC_ARGCHK(key != NULL); 41 if (ltc_ecc_is_valid_idx(key->idx) == 0) { 44 numlen = key->dp->size; 56 mp_to_unsigned_bin(key->pubkey.x, buf + (numlen - mp_unsigned_bin_size(key->pubkey.x))); 61 mp_to_unsigned_bin(key->pubkey.y, buf + (numlen - mp_unsigned_bin_size(key->pubkey.y)));
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
H A D | katja_export.c | 24 @param type The type of exported key (PK_PRIVATE or PK_PUBLIC) 25 @param key The Katja key to export 28 int katja_export(unsigned char *out, unsigned long *outlen, int type, katja_key *key) argument 35 LTC_ARGCHK(key != NULL); 38 if (!(key->type == PK_PRIVATE) && (type == PK_PRIVATE)) { 43 /* private key */ 49 LTC_ASN1_INTEGER, 1UL, key->N, 50 LTC_ASN1_INTEGER, 1UL, key->d, 51 LTC_ASN1_INTEGER, 1UL, key [all...] |
H A D | katja_import.c | 15 Import a PKCS-style Katja key, Tom St Denis 24 @param key [out] Destination for newly imported key 27 int katja_import(const unsigned char *in, unsigned long inlen, katja_key *key) argument 33 LTC_ARGCHK(key != NULL); 36 /* init key */ 37 if ((err = mp_init_multi(&zero, &key->d, &key->N, &key->dQ, 38 &key [all...] |
/external/dropbear/libtomcrypt/src/pk/rsa/ |
H A D | rsa_export.c | 24 @param type The type of exported key (PK_PRIVATE or PK_PUBLIC) 25 @param key The RSA key to export 28 int rsa_export(unsigned char *out, unsigned long *outlen, int type, rsa_key *key) argument 33 LTC_ARGCHK(key != NULL); 36 if (!(key->type == PK_PRIVATE) && (type == PK_PRIVATE)) { 41 /* private key */ 47 LTC_ASN1_INTEGER, 1UL, key->N, 48 LTC_ASN1_INTEGER, 1UL, key->e, 49 LTC_ASN1_INTEGER, 1UL, key [all...] |
/external/jmonkeyengine/engine/src/core/com/jme3/asset/ |
H A D | Asset.java | 45 * is called twice with the same asset key (equals() wise, not necessarily reference wise) 46 * then both assets will have the same asset key set (reference wise) via 47 * {@link Asset#setKey(com.jme3.asset.AssetKey) }, then this asset key 49 * are garbage collected, the shared asset key becomes unreachable and at that 58 * was loaded has this key set to null so that only the clones are tracked 61 * @param key The AssetKey to set 63 public void setKey(AssetKey key); argument 66 * Returns the asset key that is used to track this asset for garbage 69 * @return the asset key that is used to track this asset for garbage
|
/external/nist-sip/java/gov/nist/core/ |
H A D | MultiMap.java | 24 * So for example, you can put( key, new Integer(1) ); 25 * and then a Object get( key ); will return you a Collection 35 public Object remove( Object key, Object item ); argument
|
H A D | MultiValueMap.java | 8 public Object remove( K key, V item ); argument
|
/external/openssl/crypto/aes/ |
H A D | aes_cbc.c | 56 size_t len, const AES_KEY *key, 60 CRYPTO_cbc128_encrypt(in,out,len,key,ivec,(block128_f)AES_encrypt); 62 CRYPTO_cbc128_decrypt(in,out,len,key,ivec,(block128_f)AES_decrypt); 55 AES_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len, const AES_KEY *key, unsigned char *ivec, const int enc) argument
|
H A D | aes_ecb.c | 63 const AES_KEY *key, const int enc) { 65 assert(in && out && key); 69 AES_encrypt(in, out, key); 71 AES_decrypt(in, out, key); 62 AES_ecb_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key, const int enc) argument
|
H A D | aes_misc.c | 70 AES_KEY *key) 75 return private_AES_set_encrypt_key(userKey, bits, key); 79 AES_KEY *key) 84 return private_AES_set_decrypt_key(userKey, bits, key); 69 AES_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument 78 AES_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument
|
H A D | aes_ofb.c | 56 size_t length, const AES_KEY *key, 59 CRYPTO_ofb128_encrypt(in,out,length,key,ivec,num,(block128_f)AES_encrypt); 55 AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num) argument
|
/external/openssl/crypto/asn1/ |
H A D | p8_pkey.c | 64 /* Minor tweak to operation: zero private key data */ 70 PKCS8_PRIV_KEY_INFO *key = (PKCS8_PRIV_KEY_INFO *)*pval; local 71 if (key->pkey->value.octet_string) 72 OPENSSL_cleanse(key->pkey->value.octet_string->data, 73 key->pkey->value.octet_string->length);
|
/external/openssl/crypto/evp/ |
H A D | e_seed.c | 65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); 76 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 79 SEED_set_key(key, ctx->cipher_data);
|
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|