/external/chromium_org/third_party/openssl/openssl/crypto/aes/ |
H A D | aes_misc.c | 70 AES_KEY *key) 75 return private_AES_set_encrypt_key(userKey, bits, key); 79 AES_KEY *key) 84 return private_AES_set_decrypt_key(userKey, bits, key); 69 AES_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument 78 AES_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key) argument
|
H A D | aes_ofb.c | 56 size_t length, const AES_KEY *key, 59 CRYPTO_ofb128_encrypt(in,out,length,key,ivec,num,(block128_f)AES_encrypt); 55 AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, size_t length, const AES_KEY *key, unsigned char *ivec, int *num) argument
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | p8_pkey.c | 64 /* Minor tweak to operation: zero private key data */ 70 PKCS8_PRIV_KEY_INFO *key = (PKCS8_PRIV_KEY_INFO *)*pval; local 71 if (key->pkey->value.octet_string) 72 OPENSSL_cleanse(key->pkey->value.octet_string->data, 73 key->pkey->value.octet_string->length);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | e_seed.c | 65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); 76 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, argument 79 SEED_set_key(key, ctx->cipher_data);
|
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
H A D | maybe_threads.cc | 74 int perftools_pthread_key_create(pthread_key_t *key, argument 77 return pthread_key_create(key, destr_function); 80 *key = (pthread_key_t)(next_key++); 85 void *perftools_pthread_getspecific(pthread_key_t key) { 87 return pthread_getspecific(key); 89 return perftools_pthread_specific_vals[(int)key]; 93 int perftools_pthread_setspecific(pthread_key_t key, void *val) { 95 return pthread_setspecific(key, val); 97 perftools_pthread_specific_vals[(int)key] = val;
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
H A D | maybe_threads.cc | 74 int perftools_pthread_key_create(pthread_key_t *key, argument 77 return pthread_key_create(key, destr_function); 80 *key = (pthread_key_t)(next_key++); 85 void *perftools_pthread_getspecific(pthread_key_t key) { 87 return pthread_getspecific(key); 89 return perftools_pthread_specific_vals[(int)key]; 93 int perftools_pthread_setspecific(pthread_key_t key, void *val) { 95 return pthread_setspecific(key, val); 97 perftools_pthread_specific_vals[(int)key] = val;
|
/external/chromium_org/ui/base/ |
H A D | ui_base_paths.cc | 19 bool PathProvider(int key, base::FilePath* result) { argument 25 switch (key) {
|
/external/chromium_org/ui/gfx/ |
H A D | gfx_paths.cc | 14 bool PathProvider(int key, base::FilePath* result) { argument 16 switch (key) {
|
/external/clang/test/CodeGen/ |
H A D | 2007-02-04-AddrLValue.c | 6 char *key; member in struct:__anon15798
|
/external/clang/test/PCH/ |
H A D | objc_container.h | 9 - (id)objectForKeyedSubscript:(id)key; 10 - (void)setObject:(id)object forKeyedSubscript:(id)key; 20 id key; local 22 oldObject = dictionary[key]; 24 dictionary[key] = newObject;
|
/external/compiler-rt/lib/lsan/lit_tests/TestCases/ |
H A D | use_tls_pthread_specific_dynamic.cc | 24 pthread_key_t key; local 25 res = pthread_key_create(&key, NULL); 26 assert(key >= PTHREAD_KEY_2NDLEVEL_SIZE); 29 res = pthread_setspecific(key, p);
|
/external/dropbear/libtomcrypt/demos/ |
H A D | multi.c | 6 unsigned char key[16], buf[2][MAXBLOCKSIZE]; local 38 hmac_memory(find_hash("sha256"), key, 16, (unsigned char*)"hello", 5, buf[0], &len); 40 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"hello", 5UL, NULL); 46 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL); 52 hmac_memory_multi(find_hash("sha256"), key, 16, buf[1], &len2, (unsigned char*)"h", 1UL, "e", 1UL, "l", 1UL, "l", 1UL, "o", 1UL, NULL); 60 omac_memory(find_cipher("aes"), key, 16, (unsigned char*)"hello", 5, buf[0], &len); 62 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"hello", 5UL, NULL); 68 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"he", 2UL, "llo", 3UL, NULL); 74 omac_memory_multi(find_cipher("aes"), key, 16, buf[1], &len2, (unsigned char*)"h", 1UL, "e", 1UL, "l", 1UL, "l", 1UL, "o", 1UL, NULL); 82 pmac_memory(find_cipher("aes"), key, 1 [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) { 30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
H A D | f9_init.c | 23 @param key [in] Secret key 24 @param keylen Length of secret key in octets 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 32 LTC_ARGCHK(key != NULL); 34 /* schedule the key */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 49 /* make the second key */ 51 f9->akey[x] = key[ [all...] |
/external/dropbear/libtomcrypt/src/mac/hmac/ |
H A D | hmac_file.c | 24 @param key The secret key 25 @param keylen The length of the secret key 31 const unsigned char *key, unsigned long keylen, 44 LTC_ARGCHK(key != NULL); 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { 30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) { 30 omac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
H A D | pmac_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 44 LTC_ARGCHK(key != NULL); 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { 30 pmac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_file.c | 23 @param key The secret key 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 43 LTC_ARGCHK(key != NULL); 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { 30 xcbc_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 24 @param key The secret key 25 @param keylen The length of the secret key (octets) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 33 LTC_ARGCHK(key != NULL); 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_export.c | 15 DSA implementation, export key, Tom St Denis 21 Export a DSA key to a binary packet 24 @param type The type of key to export (PK_PRIVATE or PK_PUBLIC) 25 @param key The key to export 28 int dsa_export(unsigned char *out, unsigned long *outlen, int type, dsa_key *key) argument 34 LTC_ARGCHK(key != NULL); 37 if (type == PK_PRIVATE && key->type != PK_PRIVATE) { 50 LTC_ASN1_INTEGER, 1UL, key->g, 51 LTC_ASN1_INTEGER, 1UL, key [all...] |
H A D | dsa_import.c | 15 DSA implementation, import a DSA key, Tom St Denis 21 Import a DSA key 24 @param key [out] Where to store the imported key 27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key) argument 33 LTC_ARGCHK(key != NULL); 36 /* init key */ 37 if (mp_init_multi(&key->p, &key->g, &key [all...] |
H A D | dsa_verify_key.c | 15 DSA implementation, verify a key, Tom St Denis 21 Verify a DSA key for validity 22 @param key The key to verify 26 int dsa_verify_key(dsa_key *key, int *stat) argument 31 LTC_ARGCHK(key != NULL); 34 /* default to an invalid key */ 37 /* first make sure key->q and key->p are prime */ 38 if ((err = mp_prime_is_prime(key [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_ansi_x963_export.c | 27 @param key Key to export 32 int ecc_ansi_x963_export(ecc_key *key, unsigned char *out, unsigned long *outlen) argument 37 LTC_ARGCHK(key != NULL); 41 if (ltc_ecc_is_valid_idx(key->idx) == 0) { 44 numlen = key->dp->size; 56 mp_to_unsigned_bin(key->pubkey.x, buf + (numlen - mp_unsigned_bin_size(key->pubkey.x))); 61 mp_to_unsigned_bin(key->pubkey.y, buf + (numlen - mp_unsigned_bin_size(key->pubkey.y)));
|