/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 479 sctp_free_sharedkey(sctp_sharedkey_t *skey) argument 481 if (skey == NULL) 484 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) { 485 if (skey->key != NULL) 486 sctp_free_key(skey->key); 487 SCTP_FREE(skey, SCTP_M_AUTH_KY); 494 sctp_sharedkey_t *skey; local 496 LIST_FOREACH(skey, shared_keys, next) { 497 if (skey->keyid == key_id) 498 return (skey); 507 sctp_sharedkey_t *skey; local 553 sctp_sharedkey_t *skey; local 574 sctp_sharedkey_t *skey; local 599 sctp_copy_sharedkey(const sctp_sharedkey_t *skey) argument 619 sctp_sharedkey_t *skey, *new_skey; local 1253 sctp_sharedkey_t *skey; local 1287 sctp_sharedkey_t *skey; local 1319 sctp_sharedkey_t *skey = NULL; local 1347 sctp_sharedkey_t *skey; local 1366 sctp_sharedkey_t *skey; local 1400 sctp_sharedkey_t *skey; local 1568 sctp_sharedkey_t *skey; local 1659 sctp_sharedkey_t *skey; local [all...] |
H A D | sctp_auth.h | 138 extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; local 53 des_setup(pkey, 8, 0, &skey); 54 des_ecb_encrypt(clear, cypher, &skey); 55 des_done(&skey); 87 symmetric_key *skey; local 88 skey = os_malloc(sizeof(*skey)); 89 if (skey == NULL) 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 92 os_free(skey); 101 symmetric_key *skey = ctx; local 108 symmetric_key *skey = ctx; local 116 symmetric_key *skey; local 130 symmetric_key *skey = ctx; local 137 symmetric_key *skey = ctx; local [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 if (skey) 96 ret = OCSP_BASICRESP_verify(bs, skey, 0); 97 EVP_PKEY_free(skey); 99 if(!skey || ret <= 0) 392 EVP_PKEY *skey; local 393 skey = X509_get_pubkey(signer); 394 ret = OCSP_REQUEST_verify(req, skey); 395 EVP_PKEY_free(skey); [all...] |
/external/javasqlite/src/main/java/SQLite/ |
H A D | Database.java | 824 * @param skey the key as String 827 public void key(String skey) throws SQLite.Exception { argument 830 if (skey != null && skey.length() > 0) { 831 ekey = new byte[skey.length()]; 832 for (int i = 0; i< skey.length(); i++) { 833 char c = skey.charAt(i); 862 * @param skey the key as String 865 public void rekey(String skey) throws SQLite.Exception { argument 868 if (skey ! [all...] |
/external/chromium_org/third_party/libxml/src/ |
H A D | dict.c | 771 unsigned long skey; local 778 skey = xmlDictComputeKey(dict->subdict, name, len); 780 skey = okey; 782 key = skey % dict->subdict->size; 789 if ((tmp->okey == skey) && (tmp->len == len)) { 794 if ((tmp->okey == skey) && (tmp->len == len) && 801 if ((tmp->okey == skey) && (tmp->len == len)) { 806 if ((tmp->okey == skey) && (tmp->len == len) && 902 unsigned long skey; local 909 skey 996 unsigned long skey; local [all...] |
/external/libxml2/ |
H A D | dict.c | 880 unsigned long skey; local 887 skey = xmlDictComputeKey(dict->subdict, name, l); 889 skey = okey; 891 key = skey % dict->subdict->size; 898 if ((tmp->okey == skey) && (tmp->len == l)) { 903 if ((tmp->okey == skey) && (tmp->len == l) && 910 if ((tmp->okey == skey) && (tmp->len == l)) { 915 if ((tmp->okey == skey) && (tmp->len == l) && 1017 unsigned long skey; local 1024 skey 1111 unsigned long skey; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_vfy.c | 1965 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) 2008 if (skey && (X509_CRL_verify(base, skey) <= 0 || 2009 X509_CRL_verify(newer, skey) <= 0)) 2070 if (skey && md && !X509_CRL_sign(crl, skey, md)) 1964 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) argument
|
/external/chromium_org/third_party/libevent/ |
H A D | http.c | 1493 char *skey, *svalue; local 1511 skey = strsep(&svalue, ":"); 1517 if (evhttp_add_header(headers, skey, svalue) == -1)
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509.h | 918 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);
|