Searched defs:key (Results 226 - 250 of 2346) sorted by relevance

1234567891011>>

/external/smali/dexlib2/src/main/java/org/jf/dexlib2/writer/pool/
H A DTypePool.java62 @Override public int getItemIndex(@Nonnull TypeReference key) { argument
63 return getItemIndex(key.getType());
/external/srtp/crypto/cipher/
H A Dnull_cipher.c61 "allocating cipher with key length %d", key_len);
73 /* set key size */
102 null_cipher_init(null_cipher_ctx_t *ctx, const uint8_t *key) { argument
125 0, /* octets in key */
126 NULL, /* key */
/external/srtp/crypto/test/
H A Daes_calc.c16 key: 000102030405060708090a0b0c0d0e0f
27 printf("usage: %s <key> <plaintext> [-v]\n", prog_name);
35 v128_t data, key; local
56 /* read in key, checking length */
59 "error: too many digits in key "
64 len = hex_string_to_octet_string((char *)&key, argv[1], AES_KEY_LEN*2);
68 "error: too few digits in key "
98 aes_expand_encryption_key(&key, exp_key);
104 printf("key:\t\t%s\n", v128_hex_string(&key));
[all...]
H A Dstat_driver.c40 uint8_t key[30] = { local
73 err_check(cipher_init(c, key, direction_encrypt));
/external/toybox/kconfig/lxdialog/
H A Dyesno.c44 int i, x, y, key = 0, button = 0; local
78 while (key != KEY_ESC) {
79 key = wgetch(dialog);
80 switch (key) {
93 button = ((key == KEY_LEFT ? --button : ++button) < 0) ? 1 : (button > 1 ? 0 : button);
103 key = on_key_esc(dialog);
113 return key; /* ESC pressed */
/external/toybox/toys/pending/
H A Dipcrm.c38 static void do_ipcrm(int key, int ipc, char *name) argument
49 if (key) {
51 error_msg("illegal key (%s)", name);
57 perror_msg("key (%s)", name);
66 if (ret < 0) perror_msg("%s (%s)", ((key)? "key": "id"), name);
/external/vboot_reference/firmware/lib20/
H A Dapi.c44 struct vb2_public_key key; local
80 * Unpack the firmware data key to see which hashing algorithm we
91 rv = vb2_unpack_key(&key,
104 rv = vb2ex_hwcrypto_digest_init(key.hash_alg,
108 key.hash_alg);
109 dc->hash_alg = key.hash_alg;
116 key.hash_alg);
121 return vb2_digest_init(dc, key.hash_alg);
135 struct vb2_public_key key; local
176 /* Unpack the data key */
[all...]
H A Dpacked_key.c12 const uint8_t *vb2_packed_key_data(const struct vb2_packed_key *key) argument
14 return (const uint8_t *)key + key->key_offset;
19 const struct vb2_packed_key *key)
22 key, sizeof(*key),
23 key->key_offset, key->key_size);
26 int vb2_unpack_key(struct vb2_public_key *key, argument
36 /* Make sure passed buffer is big enough for the packed key */
17 vb2_verify_packed_key_inside(const void *parent, uint32_t parent_size, const struct vb2_packed_key *key) argument
[all...]
/external/vboot_reference/firmware/lib21/
H A Dpacked_key.c13 int vb2_unpack_key_data(struct vb2_public_key *key, argument
18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg);
22 VB2_DEBUG("Wrong key size for algorithm\n");
30 key->arrsize = buf32[0];
32 /* Sanity check key array size */
33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg))
36 key->n0inv = buf32[1];
38 /* Arrays point inside the key data */
39 key
45 vb2_unpack_key(struct vb2_public_key *key, const uint8_t *buf, uint32_t size) argument
[all...]
/external/vboot_reference/host/lib/
H A Dfile_keys.c5 * Utility functions for file and key handling.
54 RSAPublicKey* key = NULL; local
57 key = RSAPublicKeyFromBuf(buf, len);
59 return key;
/external/vboot_reference/host/lib21/
H A Dhost_keyblock.c34 struct vb2_packed_key *key = NULL; local
49 if (vb2_public_key_pack(&key, data_key))
52 kb.sig_offset = kb.key_offset + key->c.total_size;
55 /* Allocate buffer and copy header and data key */
58 free(key);
65 memcpy(buf + kb.key_offset, key, key->c.total_size);
66 free(key);
/external/vogar/src/vogar/
H A DHostFileCache.java53 public void copyFromCache(String key, File destination) { argument
54 File cachedFile = new File(CACHE_ROOT, key);
58 public void copyToCache(File source, String key) { argument
59 File cachedFile = new File(CACHE_ROOT, key);
68 public boolean existsInCache(String key) { argument
69 return new File(CACHE_ROOT, key).exists();
H A DMd5Cache.java42 public boolean getFromCache(File output, String key) { argument
43 if (fileCache.existsInCache(key)) {
44 fileCache.copyFromCache(key, output);
84 * Returns the appropriate key for a dex file corresponding to the contents of 'classpath'.
89 String key = keyPrefix;
95 key += "-" + md5(element);
97 return key;
101 * Returns a key corresponding to the MD5ed contents of {@code file}.
108 * Copy the file 'content' into the cache with the given 'key'.
109 * This method assumes you're using the appropriate key fo
115 insert(String key, File content) argument
[all...]
/external/vogar/src/vogar/android/
H A DDeviceFileCache.java40 public boolean existsInCache(String key) { argument
51 File cachedFile = new File(cacheRoot, key);
55 public void copyFromCache(String key, File destination) { argument
56 File cachedFile = new File(cacheRoot, key);
60 public void copyToCache(File source, String key) { argument
61 File cachedFile = new File(cacheRoot, key);
/external/webp/src/utils/
H A Dcolor_cache.h33 const VP8LColorCache* const cc, uint32_t key) {
34 assert(key <= (~0U >> cc->hash_shift_));
35 return cc->colors_[key];
40 const uint32_t key = (kHashMul * argb) >> cc->hash_shift_; local
41 cc->colors_[key] = argb;
51 const uint32_t key = (kHashMul * argb) >> cc->hash_shift_; local
52 return cc->colors_[key] == argb;
32 VP8LColorCacheLookup( const VP8LColorCache* const cc, uint32_t key) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
31 ctx = aes_encrypt_init(key, 16);
51 * @key: Decryption key
57 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
64 ctx = aes_decrypt_init(key, 16);
H A Daes-ctr.c18 * @key: Key for encryption (16 bytes)
24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
33 ctx = aes_encrypt_init(key, 16);
H A Dmd5.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = MD5(key) */
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
29 j = (j + S[i] + key[kpos]) & 0xff;
H A Dsha1-prf.c18 * @key: Key for PRF
19 * @key_len: Length of the key in bytes
21 * @data: Extra data to bind into the key
23 * @buf: Buffer for the generated pseudo-random key
24 * @buf_len: Number of bytes of key to generate
28 * given key (e.g., PMK in IEEE 802.11i).
30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
H A Dsha1-tprf.c17 * @key: Key for PRF
18 * @key_len: Length of the key in bytes
20 * @seed: Seed value to bind into the key
22 * @buf: Buffer for the generated pseudo-random key
23 * @buf_len: Number of bytes of key to generate
27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5.
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Dsha1.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Dsha256.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
54 * where K is an n byte key
100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs8.c2 * PKCS #8 (Private-key information syntax)
62 "beginning of private key; not found; assume "
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
180 struct crypto_private_key *key; local
181 key = pkcs8_key_import(data, data_len);
183 return key;
/external/wpa_supplicant_8/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
31 ctx = aes_encrypt_init(key, 16);
51 * @key: Decryption key
57 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
64 ctx = aes_decrypt_init(key, 16);

Completed in 266 milliseconds

1234567891011>>