/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 31 const keybuf = Buffer.alloc(keylen); 36 if (encoding === 'buffer') return callback.call(wrap, null, keybuf); 37 callback.call(wrap, null, keybuf.toString(encoding)); 40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap), 47 const keybuf = Buffer.alloc(keylen); 48 handleError(_pbkdf2(keybuf, password, salt, iterations, digest), digest); 50 if (encoding === 'buffer') return keybuf; 51 return keybuf.toString(encoding);
|
D | scrypt.js | 38 const keybuf = Buffer.alloc(keylen); 43 if (encoding === 'buffer') return callback.call(wrap, null, keybuf); 44 callback.call(wrap, null, keybuf.toString(encoding)); 47 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem, wrap)); 54 const keybuf = Buffer.alloc(keylen); 55 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem)); 57 if (encoding === 'buffer') return keybuf; 58 return keybuf.toString(encoding);
|
/third_party/musl/src/crypt/ |
D | crypt_des.c | 880 unsigned char keybuf[8]; in _crypt_extended_r_uut() local 889 q = keybuf; in _crypt_extended_r_uut() 890 while (q <= &keybuf[sizeof(keybuf) - 1]) { in _crypt_extended_r_uut() 895 __des_setkey(keybuf, &ekey); in _crypt_extended_r_uut() 923 des_cipher(keybuf, keybuf, 1, 0, &ekey); in _crypt_extended_r_uut() 927 q = keybuf; in _crypt_extended_r_uut() 928 while (q <= &keybuf[sizeof(keybuf) - 1] && *key) in _crypt_extended_r_uut() 930 __des_setkey(keybuf, &ekey); in _crypt_extended_r_uut()
|
/third_party/ltp/lib/ |
D | tst_af_alg.c | 138 uint8_t *keybuf = NULL; in tst_alg_setkey() local 143 keybuf = SAFE_MALLOC(keylen); in tst_alg_setkey() 145 keybuf[i] = rand(); in tst_alg_setkey() 146 key = keybuf; in tst_alg_setkey() 153 free(keybuf); in tst_alg_setkey()
|
/third_party/ejdb/src/ |
D | ejdb2.c | 382 char keybuf[IWNUMBUF_SIZE + sizeof(KEY_PREFIX_COLLMETA)]; in _jb_coll_acquire_keeplock2() local 402 key.size = snprintf(keybuf, sizeof(keybuf), KEY_PREFIX_COLLMETA "%u", dbid); in _jb_coll_acquire_keeplock2() 403 if (key.size >= sizeof(keybuf)) { in _jb_coll_acquire_keeplock2() 407 key.data = keybuf; in _jb_coll_acquire_keeplock2() 1065 …char keybuf[sizeof(KEY_PREFIX_IDXMETA) + 1 + 2 * IWNUMBUF_SIZE]; // Full key format: i.<coldbid>.<… in ejdb_remove_index() local 1074 key.data = keybuf; in ejdb_remove_index() 1075 …key.size = snprintf(keybuf, sizeof(keybuf), KEY_PREFIX_IDXMETA "%u" "." "%u", jbc->dbid, idx->dbid… in ejdb_remove_index() 1076 if (key.size >= sizeof(keybuf)) { in ejdb_remove_index() 1109 …char keybuf[sizeof(KEY_PREFIX_IDXMETA) + 1 + 2 * IWNUMBUF_SIZE]; // Full key format: i.<coldbid>.<… in ejdb_ensure_index() local 1176 key.data = keybuf; in ejdb_ensure_index() [all …]
|
/third_party/openssl/crypto/pem/ |
D | pvkfmt.c | 828 unsigned char keybuf[20]; in do_PVK_body_key() local 860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key() 875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 884 memset(keybuf + 5, 0, 11); in do_PVK_body_key() 885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key() 1056 unsigned char keybuf[20]; in i2b_PVK() local 1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK() 1072 memset(keybuf + 5, 0, 11); in i2b_PVK() 1074 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK() [all …]
|
/third_party/protobuf/ruby/ext/google/protobuf_c/ |
D | map.c | 365 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index() local 369 key = table_key(self, key, keybuf, &keyval, &length); in Map_index() 389 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index_set() local 394 key = table_key(self, key, keybuf, &keyval, &length); in Map_index_set() 426 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_has_key() local 429 key = table_key(self, key, keybuf, &keyval, &length); in Map_has_key() 447 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_delete() local 451 key = table_key(self, key, keybuf, &keyval, &length); in Map_delete()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|
/third_party/toybox/toys/other/ |
D | hexedit.c | 123 char keybuf[16]; in hexedit_main() local 125 *keybuf = 0; in hexedit_main() 187 key = scan_key(keybuf, -1); in hexedit_main()
|
/third_party/ffmpeg/libavformat/ |
D | asfcrypt.c | 54 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) in multiswap_init() 58 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; in multiswap_init()
|
/third_party/node/test/parallel/ |
D | test-crypto-key-objects.js | 68 const keybuf = randomBytes(32); constant 69 const key = createSecretKey(keybuf); 75 assert(keybuf.equals(exportedKey));
|
/third_party/libwebsockets/plugins/ssh-base/ |
D | sshd.c | 150 uint8_t keybuf[256]; in offer() local 152 keylen = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in offer() 158 n = ed25519_key_parse(keybuf, (unsigned int)keylen, in offer() 303 uint8_t keybuf[256]; in handle_name() local 312 len = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in handle_name() 315 if (ed25519_key_parse(keybuf, (unsigned int)len, in handle_name()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_ft.c | 2172 u8 keybuf[WPA_GTK_MAX_LEN]; in wpa_ft_gtk_subelem() local 2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem() 2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem() 2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem() 2205 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2208 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem() 2209 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem() 2211 key = keybuf; in wpa_ft_gtk_subelem() 2217 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2219 key = keybuf; in wpa_ft_gtk_subelem() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_ft.c | 2172 u8 keybuf[32]; in wpa_ft_gtk_subelem() local 2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem() 2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem() 2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem() 2199 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem() 2200 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem() 2202 key = keybuf; in wpa_ft_gtk_subelem() 2229 forced_memzero(keybuf, sizeof(keybuf)); in wpa_ft_gtk_subelem()
|
/third_party/toybox/toys/pending/ |
D | vi.c | 1500 char keybuf[16] = {0}; in vi_main() local 1539 key = scan_key(keybuf, -1); in vi_main() 1541 } else key = scan_key(keybuf, -1); in vi_main()
|