/external/boringssl/src/tool/ |
H A D | pkcs12.cc | 52 "Dump the key and contents of the given file to stdout", 123 EVP_PKEY *key; local 126 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, password)) { 131 bssl::UniquePtr<EVP_PKEY> key_owned(key); 133 if (key != NULL) { 134 PEM_write_PrivateKey(stdout, key, NULL, NULL, 0, NULL, NULL);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/sec/ |
H A D | ECPrivateKeyStructure.java | 21 * the elliptic curve private key object from SEC 1 36 BigInteger key) 38 byte[] bytes = BigIntegers.asUnsignedByteArray(key); 49 BigInteger key, 52 this(key, null, parameters); 56 BigInteger key, 60 byte[] bytes = BigIntegers.asUnsignedByteArray(key); 35 ECPrivateKeyStructure( BigInteger key) argument 48 ECPrivateKeyStructure( BigInteger key, ASN1Encodable parameters) argument 55 ECPrivateKeyStructure( BigInteger key, DERBitString publicKey, ASN1Encodable parameters) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/agreement/ |
H A D | DHBasicAgreement.java | 14 * a Diffie-Hellman key agreement class. 25 private DHPrivateKeyParameters key; field in class:DHBasicAgreement 48 this.key = (DHPrivateKeyParameters)kParam; 49 this.dhParams = key.getParameters(); 54 return (key.getParameters().getP().bitLength() + 7) / 8; 58 * given a short term public key from a given party calculate the next 68 throw new IllegalArgumentException("Diffie-Hellman public key has wrong parameters."); 71 BigInteger result = pub.getY().modPow(key.getX(), dhParams.getP()); 74 throw new IllegalStateException("Shared key can't be 1");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
H A D | AEADParameters.java | 10 private KeyParameter key; field in class:AEADParameters 16 * @param key key to be used by underlying cipher 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) argument 22 this(key, macSize, nonce, null); 28 * @param key key to be used by underlying cipher 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) argument 35 this.key = key; [all...] |
H A D | DESParameters.java | 7 byte[] key) 9 super(key); 11 if (isWeakKey(key, 0)) 13 throw new IllegalArgumentException("attempt to create weak DES key"); 52 * if the given DES key material is weak or semi-weak. 58 * @return true if the given DES key material is weak or semi-weak, 62 byte[] key, 65 if (key.length - offset < DES_KEY_LENGTH) 67 throw new IllegalArgumentException("key material too short."); 74 if (key[ 6 DESParameters( byte[] key) argument 61 isWeakKey( byte[] key, int offset) argument [all...] |
H A D | DESedeParameters.java | 12 byte[] key) 14 super(key); 16 if (isWeakKey(key, 0, key.length)) 18 throw new IllegalArgumentException("attempt to create weak DESede key"); 23 * return true if the passed in key is a DES-EDE weak key. 25 * @param key bytes making up the key 26 * @param offset offset into the byte array the key start 11 DESedeParameters( byte[] key) argument 29 isWeakKey( byte[] key, int offset, int length) argument 51 isWeakKey( byte[] key, int offset) argument 64 isRealEDEKey(byte[] key, int offset) argument 75 isReal2Key(byte[] key, int offset) argument 95 isReal3Key(byte[] key, int offset) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
H A D | DSAUtil.java | 59 PublicKey key) 62 if (key instanceof BCDSAPublicKey) 64 return ((BCDSAPublicKey)key).engineGetKeyParameters(); 67 if (key instanceof DSAPublicKey) 69 return new BCDSAPublicKey((DSAPublicKey)key).engineGetKeyParameters(); 74 byte[] bytes = key.getEncoded(); 82 throw new InvalidKeyException("can't identify DSA public key: " + key.getClass().getName()); 87 PrivateKey key) 90 if (key instanceo 58 generatePublicKeyParameter( PublicKey key) argument 86 generatePrivateKeyParameter( PrivateKey key) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | ECUtils.java | 22 PublicKey key) 25 return (key instanceof BCECPublicKey) ? ((BCECPublicKey)key).engineGetKeyParameters() : ECUtil.generatePublicKeyParameter(key); 21 generatePublicKeyParameter( PublicKey key) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
H A D | RSAUtil.java | 42 RSAPublicKey key) 44 return new RSAKeyParameters(false, key.getModulus(), key.getPublicExponent()); 49 RSAPrivateKey key) 51 if (key instanceof RSAPrivateCrtKey) 53 RSAPrivateCrtKey k = (RSAPrivateCrtKey)key; 61 RSAPrivateKey k = key; 41 generatePublicKeyParameter( RSAPublicKey key) argument 48 generatePrivateKeyParameter( RSAPrivateKey key) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | BaseKeyFactorySpi.java | 31 throw new InvalidKeySpecException("encoded key spec not recognized: " + e.getMessage()); 36 throw new InvalidKeySpecException("key spec not recognized"); 52 throw new InvalidKeySpecException("encoded key spec not recognized: " + e.getMessage()); 57 throw new InvalidKeySpecException("key spec not recognized"); 62 Key key, 66 if (spec.isAssignableFrom(PKCS8EncodedKeySpec.class) && key.getFormat().equals("PKCS#8")) 68 return new PKCS8EncodedKeySpec(key.getEncoded()); 70 else if (spec.isAssignableFrom(X509EncodedKeySpec.class) && key.getFormat().equals("X.509")) 72 return new X509EncodedKeySpec(key.getEncoded()); 75 throw new InvalidKeySpecException("not implemented yet " + key 61 engineGetKeySpec( Key key, Class spec) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | KeyFactory.java | 30 PrivateKey key = BouncyCastleProvider.getPrivateKey(info); 32 if (key != null) 34 return key; 57 PublicKey key = BouncyCastleProvider.getPublicKey(info); 59 if (key != null) 61 return key; 75 protected KeySpec engineGetKeySpec(Key key, Class keySpec) argument 78 if (keySpec.isAssignableFrom(PKCS8EncodedKeySpec.class) && key.getFormat().equals("PKCS#8")) 80 return new PKCS8EncodedKeySpec(key.getEncoded()); 82 else if (keySpec.isAssignableFrom(X509EncodedKeySpec.class) && key 90 engineTranslateKey(Key key) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | BaseSecretKeyFactory.java | 42 SecretKey key, 50 if (key == null) 52 throw new InvalidKeySpecException("key parameter is null"); 57 return new SecretKeySpec(key.getEncoded(), algName); 67 p[0] = key.getEncoded(); 78 SecretKey key) 81 if (key == null) 83 throw new InvalidKeyException("key parameter is null"); 86 if (!key.getAlgorithm().equalsIgnoreCase(algName)) 91 return new SecretKeySpec(key 41 engineGetKeySpec( SecretKey key, Class keySpec) argument 77 engineTranslateKey( SecretKey key) argument [all...] |
/external/cmockery/cmockery_0_1_2/src/example/ |
H A D | key_value.c | 21 unsigned int key; member in struct:KeyValue 34 // Compare two key members of KeyValue structures. 36 return (int)((KeyValue*)a)->key - (int)((KeyValue*)b)->key; 39 // Search an array of key value pairs for the item with the specified value. 50 // Sort an array of key value pairs by key.
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
H A D | sanitizer_posix_test.cc | 25 static pthread_key_t key; member in namespace:__sanitizer 32 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void *>(iter - 1))); 40 return reinterpret_cast<void*>(pthread_setspecific(key, arg)); 54 ASSERT_EQ(0, pthread_key_create(&key, &destructor)); 59 ASSERT_EQ(0, pthread_key_delete(key));
|
/external/curl/lib/ |
H A D | hmac.c | 52 const unsigned char *key, 73 /* If the key is too long, replace it by its hash digest. */ 76 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); 79 key = hkey; 83 /* Prime the two hash contexts with the modified key. */ 88 b = (unsigned char)(*key ^ hmac_ipad); 90 b = (unsigned char)(*key++ ^ hmac_opad); 51 Curl_HMAC_init(const HMAC_params * hashparams, const unsigned char *key, unsigned int keylen) argument
|
/external/curl/tests/unit/ |
H A D | unit1602.c | 56 int key = 20; variable 63 nodep = Curl_hash_add(&hash_static, &key, klen, value); 69 /* Attempt to add another key/value pair */
|
/external/dagger2/core/src/main/java/dagger/internal/ |
H A D | MapProviderFactory.java | 78 public Builder<K, V> put(K key, Provider<V> providerOfValue) { argument 79 if (key == null) { 80 throw new NullPointerException("The key is null"); 86 this.mapBuilder.put(key, providerOfValue);
|
/external/deqp/framework/delibs/depool/ |
H A D | dePoolHash.c | 102 deInt16 key = deTestHashIter_getKey(&testIter); local 104 DE_TEST_ASSERT(deInBounds32(key, 1000, 5000) || deInBounds32(key, 10000, 12000)); 105 DE_TEST_ASSERT(*deTestHash_find(hash, key) == -key); 106 DE_TEST_ASSERT(val == -key); 134 deInt16 key = deTestInt16Array_get(keyArray, ndx); local 137 DE_TEST_ASSERT(val == -key); 138 DE_TEST_ASSERT(*deTestHash_find(hash, key) == val);
|
/external/deqp/framework/egl/ |
H A D | egluGLFunctionLoader.cpp | 63 const deUint32 key = apiType.getPacked(); local 64 LibraryMap::iterator iter = m_libraries.find(key); 71 m_libraries.insert(std::make_pair(key, library));
|
/external/dhcpcd-6.8.2/crypt/ |
H A D | hmac_md5.c | 49 const uint8_t *key, size_t key_len, 57 /* Ensure key is no bigger than HMAC_PAD_LEN */ 60 MD5Update(&context, key, (unsigned int)key_len); 62 key = tk; 66 /* store key in pads */ 67 memcpy(k_ipad, key, key_len); 68 memcpy(k_opad, key, key_len); 72 /* XOR key with ipad and opad values */ 48 hmac_md5(const uint8_t *text, size_t text_len, const uint8_t *key, size_t key_len, uint8_t *digest) argument
|
/external/dhcpcd-6.8.2/test/ |
H A D | test_hmac_md5.c | 52 uint8_t key[16]; local 57 key[i] = 0x0b; 58 hmac_md5(text, 8, key, 16, hmac); 68 const uint8_t key[] = "Jefe"; local 71 hmac_md5(text, 28, key, 4, hmac); 81 uint8_t key[16]; local 88 key[i] = 0xaa; 89 hmac_md5(text, 50, key, 16, hmac); 99 uint8_t key[25]; local 106 key[ 117 uint8_t key[16]; local 133 uint8_t key[80]; local 149 uint8_t key[80]; local [all...] |
/external/e2fsprogs/lib/ext2fs/ |
H A D | hashmap.h | 9 uint32_t(*hash)(const void *key, size_t len); 15 const void *key; member in struct:ext2fs_hashmap::ext2fs_hashmap_entry 26 void ext2fs_hashmap_add(struct ext2fs_hashmap *h, void *data, const void *key, 28 void *ext2fs_hashmap_lookup(struct ext2fs_hashmap *h, const void *key,
|
/external/easymock/src/org/easymock/internal/ |
H A D | EasyMockProperties.java | 86 * Searches for the property with the specified key. If the key is not
89 * @param key
90 * key leading to the property
92 * the value to be returned if the key isn't found
93 * @return the value found for the key or the default value
95 public String getProperty(String key, String defaultValue) {
argument 96 return properties.getProperty(key, defaultValue);
100 * Searches for the property with the specified key. Return null if the key
107 getProperty(String key) argument 121 setProperty(String key, String value) argument [all...] |
/external/elfutils/src/ |
H A D | arlib-argp.c | 40 parse_opt (int key, char *arg __attribute__ ((unused)), argument 43 switch (key) 60 help_filter (int key, const char *text, void *input __attribute__ ((unused))) argument 70 switch (key)
|
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/ |
H A D | CacheLoader.java | 20 public <Z> Resource<Z> load(Key key, ResourceDecoder<File, Z> decoder, int width, int height) { argument 21 File fromCache = diskCache.get(key); 38 diskCache.delete(key);
|