/external/ImageMagick/MagickCore/ |
H A D | distribute-cache-private.h | 34 session_key; member in struct:_DistributeCacheInfo
|
H A D | distribute-cache.c | 180 size_t *session_key,ExceptionInfo *exception) 206 *session_key=0; 257 *session_key=GetMagickSignature(nonce); 260 if (*session_key == 0) 339 session_key; 351 session_key=0; 353 &session_key,exception); 358 server_info->session_key=session_key; 431 const size_t session_key) 176 ConnectPixelCacheServer(const char *hostname,const int port, size_t *session_key,ExceptionInfo *exception) argument 336 session_key; local 425 DestroyDistributeCache(SplayTreeInfo *registry, const size_t session_key) argument 466 OpenDistributeCache(SplayTreeInfo *registry,int file, const size_t session_key,ExceptionInfo *exception) argument 532 ReadDistributeCacheMetacontent(SplayTreeInfo *registry, int file,const size_t session_key,ExceptionInfo *exception) argument 592 ReadDistributeCachePixels(SplayTreeInfo *registry, int file,const size_t session_key,ExceptionInfo *exception) argument 653 WriteDistributeCacheMetacontent( SplayTreeInfo *registry,int file,const size_t session_key, ExceptionInfo *exception) argument 712 WriteDistributeCachePixels(SplayTreeInfo *registry, int file,const size_t session_key,ExceptionInfo *exception) argument 790 session_key; local [all...] |
/external/openssh/ |
H A D | sshconnect1.c | 501 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 567 session_key[i] = rnd & 0xff; 584 if (BN_add_word(key, session_key[i] ^ session_id[i]) 588 if (BN_add_word(key, session_key[i]) == 0) 667 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); 673 explicit_bzero(session_key, sizeof(session_key));
|
H A D | sshd.c | 2360 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 2471 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8); 2473 if (len < 0 || (u_int)len > sizeof(session_key)) { 2475 "session_key_int %d > sizeof(session_key) %lu", 2476 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); 2479 explicit_bzero(session_key, sizeof(session_key)); 2481 session_key + sizeof(session_key) - len); 2492 session_key[ [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 347 * @session_key: 8-to-16 octet SessionKey (OUT) 348 * @session_key_len: SessionKeyLength (Length of session_key) (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 410 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 347 * @session_key: 8-to-16 octet SessionKey (OUT) 348 * @session_key_len: SessionKeyLength (Length of session_key) (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 410 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 347 * @session_key: 8-to-16 octet SessionKey (OUT) 348 * @session_key_len: SessionKeyLength (Length of session_key) (IN) 353 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 410 os_memcpy(session_key, digest, session_key_len);
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 554 u_char session_key[16]; local 583 session_key, 585 mppe_set_keys(challenge, session_key); 604 u_char session_key[MD4_SIGNATURE_SIZE]; local 623 session_key, 626 GenerateAuthenticatorResponse(session_key, 630 mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP],
|
/external/curl/lib/ |
H A D | smb.h | 38 unsigned int session_key; member in struct:smb_conn 121 unsigned int session_key; member in struct:smb_negotiate_response 143 unsigned int session_key; member in struct:smb_setup
|