Searched defs:key (Results 26 - 50 of 2296) sorted by relevance

1234567891011>>

/external/dropbear/libtomcrypt/src/mac/f9/
H A Df9_file.c23 @param key The secret key
24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
43 LTC_ARGCHK(key != NULL);
53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
H A Df9_init.c23 @param key [in] Secret key
24 @param keylen Length of secret key in octets
27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument
32 LTC_ARGCHK(key != NULL);
34 /* schedule the key */
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
49 /* make the second key */
51 f9->akey[x] = key[
[all...]
/external/dropbear/libtomcrypt/src/mac/hmac/
H A Dhmac_file.c24 @param key The secret key
25 @param keylen The length of the secret key
31 const unsigned char *key, unsigned long keylen,
44 LTC_ARGCHK(key != NULL);
52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) {
30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/mac/omac/
H A Domac_file.c23 @param key The secret key
24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
43 LTC_ARGCHK(key != NULL);
53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
30 omac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/mac/pmac/
H A Dpmac_file.c23 @param key The secret key
24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
44 LTC_ARGCHK(key != NULL);
54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
30 pmac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/mac/xcbc/
H A Dxcbc_file.c23 @param key The secret key
24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
43 LTC_ARGCHK(key != NULL);
53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
30 xcbc_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/modes/ecb/
H A Decb_start.c24 @param key The secret key
25 @param keylen The length of the secret key (octets)
30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument
33 LTC_ARGCHK(key != NULL);
41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
/external/dropbear/libtomcrypt/src/pk/dsa/
H A Ddsa_export.c15 DSA implementation, export key, Tom St Denis
21 Export a DSA key to a binary packet
24 @param type The type of key to export (PK_PRIVATE or PK_PUBLIC)
25 @param key The key to export
28 int dsa_export(unsigned char *out, unsigned long *outlen, int type, dsa_key *key) argument
34 LTC_ARGCHK(key != NULL);
37 if (type == PK_PRIVATE && key->type != PK_PRIVATE) {
50 LTC_ASN1_INTEGER, 1UL, key->g,
51 LTC_ASN1_INTEGER, 1UL, key
[all...]
H A Ddsa_import.c15 DSA implementation, import a DSA key, Tom St Denis
21 Import a DSA key
24 @param key [out] Where to store the imported key
27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key) argument
33 LTC_ARGCHK(key != NULL);
36 /* init key */
37 if (mp_init_multi(&key->p, &key->g, &key
[all...]
H A Ddsa_verify_key.c15 DSA implementation, verify a key, Tom St Denis
21 Verify a DSA key for validity
22 @param key The key to verify
26 int dsa_verify_key(dsa_key *key, int *stat) argument
31 LTC_ARGCHK(key != NULL);
34 /* default to an invalid key */
37 /* first make sure key->q and key->p are prime */
38 if ((err = mp_prime_is_prime(key
[all...]
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_ansi_x963_export.c27 @param key Key to export
32 int ecc_ansi_x963_export(ecc_key *key, unsigned char *out, unsigned long *outlen) argument
37 LTC_ARGCHK(key != NULL);
41 if (ltc_ecc_is_valid_idx(key->idx) == 0) {
44 numlen = key->dp->size;
56 mp_to_unsigned_bin(key->pubkey.x, buf + (numlen - mp_unsigned_bin_size(key->pubkey.x)));
61 mp_to_unsigned_bin(key->pubkey.y, buf + (numlen - mp_unsigned_bin_size(key->pubkey.y)));
/external/dropbear/libtomcrypt/src/pk/katja/
H A Dkatja_export.c24 @param type The type of exported key (PK_PRIVATE or PK_PUBLIC)
25 @param key The Katja key to export
28 int katja_export(unsigned char *out, unsigned long *outlen, int type, katja_key *key) argument
35 LTC_ARGCHK(key != NULL);
38 if (!(key->type == PK_PRIVATE) && (type == PK_PRIVATE)) {
43 /* private key */
49 LTC_ASN1_INTEGER, 1UL, key->N,
50 LTC_ASN1_INTEGER, 1UL, key->d,
51 LTC_ASN1_INTEGER, 1UL, key
[all...]
H A Dkatja_import.c15 Import a PKCS-style Katja key, Tom St Denis
24 @param key [out] Destination for newly imported key
27 int katja_import(const unsigned char *in, unsigned long inlen, katja_key *key) argument
33 LTC_ARGCHK(key != NULL);
36 /* init key */
37 if ((err = mp_init_multi(&zero, &key->d, &key->N, &key->dQ,
38 &key
[all...]
/external/dropbear/libtomcrypt/src/pk/rsa/
H A Drsa_export.c24 @param type The type of exported key (PK_PRIVATE or PK_PUBLIC)
25 @param key The RSA key to export
28 int rsa_export(unsigned char *out, unsigned long *outlen, int type, rsa_key *key) argument
33 LTC_ARGCHK(key != NULL);
36 if (!(key->type == PK_PRIVATE) && (type == PK_PRIVATE)) {
41 /* private key */
47 LTC_ASN1_INTEGER, 1UL, key->N,
48 LTC_ASN1_INTEGER, 1UL, key->e,
49 LTC_ASN1_INTEGER, 1UL, key
[all...]
/external/jmonkeyengine/engine/src/core/com/jme3/asset/
H A DAsset.java45 * is called twice with the same asset key (equals() wise, not necessarily reference wise)
46 * then both assets will have the same asset key set (reference wise) via
47 * {@link Asset#setKey(com.jme3.asset.AssetKey) }, then this asset key
49 * are garbage collected, the shared asset key becomes unreachable and at that
58 * was loaded has this key set to null so that only the clones are tracked
61 * @param key The AssetKey to set
63 public void setKey(AssetKey key); argument
66 * Returns the asset key that is used to track this asset for garbage
69 * @return the asset key that is used to track this asset for garbage
/external/nist-sip/java/gov/nist/core/
H A DMultiMap.java24 * So for example, you can put( key, new Integer(1) );
25 * and then a Object get( key ); will return you a Collection
35 public Object remove( Object key, Object item ); argument
H A DMultiValueMap.java8 public Object remove( K key, V item ); argument
/external/openssl/crypto/aes/
H A Daes_cbc.c56 size_t len, const AES_KEY *key,
60 CRYPTO_cbc128_encrypt(in,out,len,key,ivec,(block128_f)AES_encrypt);
62 CRYPTO_cbc128_decrypt(in,out,len,key,ivec,(block128_f)AES_decrypt);
55 AES_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len, const AES_KEY *key, unsigned char *ivec, const int enc) argument
H A Daes_ecb.c63 const AES_KEY *key, const int enc) {
65 assert(in && out && key);
69 AES_encrypt(in, out, key);
71 AES_decrypt(in, out, key);
62 AES_ecb_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key, const int enc) argument
H A Daes_misc.c70 AES_KEY *key)
75 return private_AES_set_encrypt_key(userKey, bits, key);
79 AES_KEY *key)
84 return private_AES_set_decrypt_key(userKey, bits, key);
69 AES_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument
78 AES_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument
H A Daes_ofb.c56 size_t length, const AES_KEY *key,
59 CRYPTO_ofb128_encrypt(in,out,length,key,ivec,num,(block128_f)AES_encrypt);
55 AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num) argument
/external/openssl/crypto/asn1/
H A Dp8_pkey.c64 /* Minor tweak to operation: zero private key data */
70 PKCS8_PRIV_KEY_INFO *key = (PKCS8_PRIV_KEY_INFO *)*pval; local
71 if (key->pkey->value.octet_string)
72 OPENSSL_cleanse(key->pkey->value.octet_string->data,
73 key->pkey->value.octet_string->length);
/external/openssl/crypto/evp/
H A De_seed.c65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc);
76 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument
79 SEED_set_key(key, ctx->cipher_data);
H A Dp_dec.c69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument
83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
H A Dp_enc.c69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);

Completed in 201 milliseconds

1234567891011>>