/third_party/mesa3d/src/vulkan/runtime/ |
D | vk_pipeline_cache.c | 49 const void *key_data, size_t key_size, 66 const void *key_data, in raw_data_object_deserialize() argument 80 raw_data_object_create(device, key_data, key_size, data, data_size); in raw_data_object_deserialize() 102 const void *key_data, size_t key_size, in raw_data_object_create() argument 120 memcpy(obj_key_data, key_data, key_size); in raw_data_object_create() 133 return memcmp(a->key_data, b->key_data, a->key_size) == 0; in object_keys_equal() 140 return _mesa_hash_data(object->key_data, object->key_size); in object_key_hash() 270 const void *key_data, uint32_t key_size, in vk_pipeline_cache_object_deserialize() argument 287 ops->deserialize(cache->base.device, key_data, key_size, &reader); in vk_pipeline_cache_object_deserialize() 300 assert(memcmp(object->key_data, key_data, key_size) == 0); in vk_pipeline_cache_object_deserialize() [all …]
|
D | vk_pipeline_cache.h | 81 const void *key_data, 113 const void *key_data; member 121 const void *key_data, uint32_t key_size) in vk_pipeline_cache_object_init() argument 128 object->key_data = key_data; in vk_pipeline_cache_object_init() 213 const void *key_data, size_t key_size, 246 const void *key_data, size_t key_size, 251 const void *key_data, size_t key_size,
|
/third_party/mbedtls/library/ |
D | psa_crypto_storage.c | 247 uint8_t key_data[]; member 267 memcpy( storage_format->key_data, data, data_length ); in psa_format_key_data_for_storage() 280 uint8_t **key_data, in psa_parse_key_data_from_storage() argument 307 *key_data = NULL; in psa_parse_key_data_from_storage() 311 *key_data = mbedtls_calloc( 1, *key_data_length ); in psa_parse_key_data_from_storage() 312 if( *key_data == NULL ) in psa_parse_key_data_from_storage() 314 memcpy( *key_data, storage_format->key_data, *key_data_length ); in psa_parse_key_data_from_storage() 357 void psa_free_persistent_key_data( uint8_t *key_data, size_t key_data_length ) in psa_free_persistent_key_data() argument 359 if( key_data != NULL ) in psa_free_persistent_key_data() 361 mbedtls_platform_zeroize( key_data, key_data_length ); in psa_free_persistent_key_data() [all …]
|
D | psa_crypto_slot_management.c | 240 uint8_t *key_data = NULL; in psa_load_persistent_key_into_slot() local 244 &key_data, &key_data_length ); in psa_load_persistent_key_into_slot() 262 data = (psa_se_key_data_storage_t *) key_data; in psa_load_persistent_key_into_slot() 269 status = psa_copy_key_material_into_slot( slot, key_data, key_data_length ); in psa_load_persistent_key_into_slot() 272 psa_free_persistent_key_data( key_data, key_data_length ); in psa_load_persistent_key_into_slot()
|
D | psa_crypto_storage.h | 165 void psa_free_persistent_key_data( uint8_t *key_data, size_t key_data_length ); 199 uint8_t **key_data,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_tls.c | 23 u8 *key_data; member 137 if (data->key_data) { in eap_tls_free_key() 138 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 139 data->key_data = NULL; in eap_tls_free_key() 211 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 215 if (data->key_data) { in eap_tls_success() 217 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 219 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 366 return data->key_data != NULL; in eap_tls_isKeyAvailable() 375 if (data->key_data == NULL) in eap_tls_getKey() [all …]
|
D | eap_peap.c | 57 u8 *key_data; member 186 if (data->key_data) { in eap_peap_free_key() 187 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 188 data->key_data = NULL; in eap_peap_free_key() 277 tk = data->key_data; in eap_peap_derive_cmk() 1151 data->key_data = in eap_peap_process() 1156 if (data->key_data) { in eap_peap_process() 1159 data->key_data, in eap_peap_process() 1163 data->key_data + in eap_peap_process() 1302 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable() [all …]
|
D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 285 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key() 289 if (!data->key_data) { in eap_ttls_v0_derive_key() 295 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 297 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1797 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1806 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_tls.c | 23 u8 *key_data; member 131 if (data->key_data) { in eap_tls_free_key() 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 133 data->key_data = NULL; in eap_tls_free_key() 205 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 209 if (data->key_data) { in eap_tls_success() 211 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 213 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 364 return data->key_data != NULL; in eap_tls_isKeyAvailable() 373 if (data->key_data == NULL) in eap_tls_getKey() [all …]
|
D | eap_peap.c | 57 u8 *key_data; member 171 if (data->key_data) { in eap_peap_free_key() 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 173 data->key_data = NULL; in eap_peap_free_key() 262 tk = data->key_data; in eap_peap_derive_cmk() 1085 data->key_data = in eap_peap_process() 1090 if (data->key_data) { in eap_peap_process() 1093 data->key_data, in eap_peap_process() 1097 data->key_data + in eap_peap_process() 1235 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable() [all …]
|
D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_ttls_v0_derive_key() 277 if (!data->key_data) { in eap_ttls_v0_derive_key() 283 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 285 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1753 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1762 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey() [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_psa_crypto.function | 297 * \param key_data The encryption / decryption key data 318 static int aead_multipart_internal_func( int key_type_arg, data_t *key_data, 367 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 418 MBEDTLS_TEST_PSA_SKIP_IF_ALT_AES_192( key_type, key_data->len * 8 ); 1117 data_t *key_data, 1140 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 1183 data_t *key_data, 1198 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 1231 data_t *key_data, 1257 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, [all …]
|
D | test_suite_psa_crypto_persistent_key.function | 31 uint8_t key_data[]; 42 void format_storage_data_check( data_t *key_data, 49 key_data->len + sizeof( psa_persistent_key_storage_format ); 60 psa_format_key_data_for_storage( key_data->x, key_data->len, 83 uint8_t *key_data = NULL; 89 &key_data, &key_data_length, 109 key_data, key_data_length ); 112 mbedtls_free( key_data );
|
D | test_suite_psa_crypto_driver_wrappers.function | 427 data_t *key_data, 457 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 510 data_t *key_data, 559 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 642 data_t *key_data, 691 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 775 data_t *key_data, 816 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 849 data_t *key_data, data_t *iv, 872 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, [all …]
|
D | test_suite_psa_crypto_entropy.function | 69 void external_rng_failure_sign( int key_type, data_t *key_data, int alg, 91 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 102 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len,
|
D | test_suite_psa_crypto_slot_management.function | 116 int type_arg, data_t *key_data, 141 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 198 int type_arg, data_t *key_data, 232 PSA_ASSERT( psa_import_key( &attributes, key_data->x, key_data->len, 308 ASSERT_ALLOC( reexported, key_data->len ); 311 PSA_ASSERT( psa_export_key( id, reexported, key_data->len, 313 ASSERT_COMPARE( key_data->x, key_data->len, 319 key_data->len, &reexported_length ),
|
/third_party/mbedtls/programs/psa/ |
D | key_ladder_demo.c | 172 uint8_t key_data[KEY_SIZE_BYTES]; in save_key() local 177 key_data, sizeof( key_data ), in save_key() 180 SYS_CHECK( fwrite( key_data, 1, key_size, key_file ) == key_size ); in save_key() 228 uint8_t key_data[KEY_SIZE_BYTES]; in import_key_from_file() local 234 SYS_CHECK( ( key_size = fread( key_data, 1, sizeof( key_data ), in import_key_from_file() 239 (unsigned) sizeof( key_data ) ); in import_key_from_file() 249 PSA_CHECK( psa_import_key( &attributes, key_data, key_size, master_key ) ); in import_key_from_file() 253 mbedtls_platform_zeroize( key_data, sizeof( key_data ) ); in import_key_from_file()
|
/third_party/mesa3d/src/intel/vulkan/ |
D | anv_pipeline_cache.c | 40 const void *key_data, size_t key_size, 70 const void *key_data, uint32_t key_size, in anv_shader_bin_create() argument 100 memcpy(obj_key_data, key_data, key_size); in anv_shader_bin_create() 236 const void *key_data, size_t key_size, in anv_shader_bin_deserialize() argument 287 key_data, key_size, in anv_shader_bin_deserialize() 300 const void *key_data, uint32_t key_size, in anv_device_search_for_kernel() argument 309 vk_pipeline_cache_lookup_object(cache, key_data, key_size, in anv_device_search_for_kernel() 325 const void *key_data, uint32_t key_size, in anv_device_upload_kernel() argument 340 key_data, key_size, in anv_device_upload_kernel()
|
/third_party/openssl/test/ |
D | destest.c | 33 static unsigned char key_data[NUM_TESTS][8] = { variable 314 DES_set_key_unchecked(&key_data[i], &ks); in test_des_ecb() 323 pt(key_data[i], b1), pt(in, b2)); in test_des_ecb() 328 pt(key_data[i], b1), pt(out, b2)); in test_des_ecb() 340 DES_set_key_unchecked(&key_data[i], &ks); in test_des_ede_ecb() 341 DES_set_key_unchecked(&key_data[i + 1], &ks2); in test_des_ede_ecb() 342 DES_set_key_unchecked(&key_data[i + 2], &ks3); in test_des_ede_ecb() 351 pt(key_data[i], b1), pt(in, b2)); in test_des_ede_ecb() 356 pt(key_data[i], b1), pt(out, b2)); in test_des_ede_ecb()
|
D | bftest.c | 198 static unsigned char key_data[8] = variable 249 printf("%02X", key_data[j]); in print_test_data() 340 BF_ecb_encrypt(key_data, out, &key, BF_ENCRYPT); in test_bf_set_key()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | aes.rs | 299 let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap(); in test_wrap_unwrap() localVariable 306 wrap_key(&enc_key, None, &mut wrapped, &key_data).unwrap(), in test_wrap_unwrap() 317 assert_eq!(&unwrapped[..], &key_data[..]); in test_wrap_unwrap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa.c | 100 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local 120 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send() 141 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 144 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 150 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send() 588 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument 612 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 613 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1438 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() argument 1450 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa.c | 102 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local 122 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send() 143 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 146 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 152 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send() 674 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument 706 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 707 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1659 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() argument 1671 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() [all …]
|
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/ |
D | gstmikey.c | 603 GstMIKEYKeyDataType key_type, guint16 key_len, const guint8 * key_data) in gst_mikey_payload_key_data_set_key() argument 609 g_return_val_if_fail (key_len > 0 && key_data != NULL, FALSE); in gst_mikey_payload_key_data_set_key() 613 INIT_MEMDUP (p->key_data, key_data, key_len); in gst_mikey_payload_key_data_set_key() 722 FREE_MEMDUP (payload->key_data); in gst_mikey_payload_key_data_dispose() 735 payload->key_len, payload->key_data); in gst_mikey_payload_key_data_copy() 1609 memcpy (&data[4], p->key_data, p->key_len); in payloads_to_bytes() 1941 const guint8 *key_data, *salt_data; in payloads_from_bytes() local 1960 key_data = &d[4]; in payloads_from_bytes() 1970 gst_mikey_payload_key_data_set_key (p, key_type & 2, key_len, key_data); in payloads_from_bytes() 2493 buf = gst_buffer_new_memdup (pkd->key_data, pkd->key_len); in gst_mikey_message_to_caps()
|
/third_party/flutter/flutter/dev/tools/gen_keycodes/bin/ |
D | gen_keycodes.dart | 14 import 'package:gen_keycodes/key_data.dart'; 95 … defaultsTo: path.join(flutterRoot.path, 'dev', 'tools', 'gen_keycodes', 'data', 'key_data.json'), 124 '"key_data.json", and then update "key_data.json" with the fresh data.',
|