/external/smali/dexlib2/src/main/java/org/jf/dexlib2/writer/pool/ |
H A D | TypePool.java | 62 @Override public int getItemIndex(@Nonnull TypeReference key) { argument 63 return getItemIndex(key.getType());
|
/external/srtp/crypto/cipher/ |
H A D | null_cipher.c | 61 "allocating cipher with key length %d", key_len); 73 /* set key size */ 102 null_cipher_init(null_cipher_ctx_t *ctx, const uint8_t *key) { argument 125 0, /* octets in key */ 126 NULL, /* key */
|
/external/srtp/crypto/test/ |
H A D | aes_calc.c | 16 key: 000102030405060708090a0b0c0d0e0f 27 printf("usage: %s <key> <plaintext> [-v]\n", prog_name); 35 v128_t data, key; local 56 /* read in key, checking length */ 59 "error: too many digits in key " 64 len = hex_string_to_octet_string((char *)&key, argv[1], AES_KEY_LEN*2); 68 "error: too few digits in key " 98 aes_expand_encryption_key(&key, exp_key); 104 printf("key:\t\t%s\n", v128_hex_string(&key)); [all...] |
H A D | stat_driver.c | 40 uint8_t key[30] = { local 73 err_check(cipher_init(c, key, direction_encrypt));
|
/external/toybox/kconfig/lxdialog/ |
H A D | yesno.c | 44 int i, x, y, key = 0, button = 0; local 78 while (key != KEY_ESC) { 79 key = wgetch(dialog); 80 switch (key) { 93 button = ((key == KEY_LEFT ? --button : ++button) < 0) ? 1 : (button > 1 ? 0 : button); 103 key = on_key_esc(dialog); 113 return key; /* ESC pressed */
|
/external/toybox/toys/pending/ |
H A D | ipcrm.c | 38 static void do_ipcrm(int key, int ipc, char *name) argument 49 if (key) { 51 error_msg("illegal key (%s)", name); 57 perror_msg("key (%s)", name); 66 if (ret < 0) perror_msg("%s (%s)", ((key)? "key": "id"), name);
|
/external/vboot_reference/firmware/lib20/ |
H A D | api.c | 44 struct vb2_public_key key; local 80 * Unpack the firmware data key to see which hashing algorithm we 91 rv = vb2_unpack_key(&key, 104 rv = vb2ex_hwcrypto_digest_init(key.hash_alg, 108 key.hash_alg); 109 dc->hash_alg = key.hash_alg; 116 key.hash_alg); 121 return vb2_digest_init(dc, key.hash_alg); 135 struct vb2_public_key key; local 176 /* Unpack the data key */ [all...] |
H A D | packed_key.c | 12 const uint8_t *vb2_packed_key_data(const struct vb2_packed_key *key) argument 14 return (const uint8_t *)key + key->key_offset; 19 const struct vb2_packed_key *key) 22 key, sizeof(*key), 23 key->key_offset, key->key_size); 26 int vb2_unpack_key(struct vb2_public_key *key, argument 36 /* Make sure passed buffer is big enough for the packed key */ 17 vb2_verify_packed_key_inside(const void *parent, uint32_t parent_size, const struct vb2_packed_key *key) argument [all...] |
/external/vboot_reference/firmware/lib21/ |
H A D | packed_key.c | 13 int vb2_unpack_key_data(struct vb2_public_key *key, argument 18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg); 22 VB2_DEBUG("Wrong key size for algorithm\n"); 30 key->arrsize = buf32[0]; 32 /* Sanity check key array size */ 33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) 36 key->n0inv = buf32[1]; 38 /* Arrays point inside the key data */ 39 key 45 vb2_unpack_key(struct vb2_public_key *key, const uint8_t *buf, uint32_t size) argument [all...] |
/external/vboot_reference/host/lib/ |
H A D | file_keys.c | 5 * Utility functions for file and key handling. 54 RSAPublicKey* key = NULL; local 57 key = RSAPublicKeyFromBuf(buf, len); 59 return key;
|
/external/vboot_reference/host/lib21/ |
H A D | host_keyblock.c | 34 struct vb2_packed_key *key = NULL; local 49 if (vb2_public_key_pack(&key, data_key)) 52 kb.sig_offset = kb.key_offset + key->c.total_size; 55 /* Allocate buffer and copy header and data key */ 58 free(key); 65 memcpy(buf + kb.key_offset, key, key->c.total_size); 66 free(key);
|
/external/vogar/src/vogar/ |
H A D | HostFileCache.java | 53 public void copyFromCache(String key, File destination) { argument 54 File cachedFile = new File(CACHE_ROOT, key); 58 public void copyToCache(File source, String key) { argument 59 File cachedFile = new File(CACHE_ROOT, key); 68 public boolean existsInCache(String key) { argument 69 return new File(CACHE_ROOT, key).exists();
|
H A D | Md5Cache.java | 42 public boolean getFromCache(File output, String key) { argument 43 if (fileCache.existsInCache(key)) { 44 fileCache.copyFromCache(key, output); 84 * Returns the appropriate key for a dex file corresponding to the contents of 'classpath'. 89 String key = keyPrefix; 95 key += "-" + md5(element); 97 return key; 101 * Returns a key corresponding to the MD5ed contents of {@code file}. 108 * Copy the file 'content' into the cache with the given 'key'. 109 * This method assumes you're using the appropriate key fo 115 insert(String key, File content) argument [all...] |
/external/vogar/src/vogar/android/ |
H A D | DeviceFileCache.java | 40 public boolean existsInCache(String key) { argument 51 File cachedFile = new File(cacheRoot, key); 55 public void copyFromCache(String key, File destination) { argument 56 File cachedFile = new File(cacheRoot, key); 60 public void copyToCache(File source, String key) { argument 61 File cachedFile = new File(cacheRoot, key);
|
/external/webp/src/utils/ |
H A D | color_cache.h | 33 const VP8LColorCache* const cc, uint32_t key) { 34 assert(key <= (~0U >> cc->hash_shift_)); 35 return cc->colors_[key]; 40 const uint32_t key = (kHashMul * argb) >> cc->hash_shift_; local 41 cc->colors_[key] = argb; 51 const uint32_t key = (kHashMul * argb) >> cc->hash_shift_; local 52 return cc->colors_[key] == argb; 32 VP8LColorCacheLookup( const VP8LColorCache* const cc, uint32_t key) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 31 ctx = aes_encrypt_init(key, 16); 51 * @key: Decryption key 57 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 64 ctx = aes_decrypt_init(key, 16);
|
H A D | aes-ctr.c | 18 * @key: Key for encryption (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 33 ctx = aes_encrypt_init(key, 16);
|
H A D | md5.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 29 j = (j + S[i] + key[kpos]) & 0xff;
|
H A D | sha1-prf.c | 18 * @key: Key for PRF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key (e.g., PMK in IEEE 802.11i). 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 17 * @key: Key for PRF 18 * @key_len: Length of the key in bytes 20 * @seed: Seed value to bind into the key 22 * @buf: Buffer for the generated pseudo-random key 23 * @buf_len: Number of bytes of key to generate 27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5. 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */ 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | sha256.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */ 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk; 54 * where K is an n byte key 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs8.c | 2 * PKCS #8 (Private-key information syntax) 62 "beginning of private key; not found; assume " 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 180 struct crypto_private_key *key; local 181 key = pkcs8_key_import(data, data_len); 183 return key;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 31 ctx = aes_encrypt_init(key, 16); 51 * @key: Decryption key 57 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 64 ctx = aes_decrypt_init(key, 16);
|