Home
last modified time | relevance | path

Searched refs:keybuf (Results 1 – 16 of 16) sorted by relevance

/third_party/node/lib/internal/crypto/
Dpbkdf2.js31 const keybuf = Buffer.alloc(keylen);
36 if (encoding === 'buffer') return callback.call(wrap, null, keybuf);
37 callback.call(wrap, null, keybuf.toString(encoding));
40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap),
47 const keybuf = Buffer.alloc(keylen);
48 handleError(_pbkdf2(keybuf, password, salt, iterations, digest), digest);
50 if (encoding === 'buffer') return keybuf;
51 return keybuf.toString(encoding);
Dscrypt.js38 const keybuf = Buffer.alloc(keylen);
43 if (encoding === 'buffer') return callback.call(wrap, null, keybuf);
44 callback.call(wrap, null, keybuf.toString(encoding));
47 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem, wrap));
54 const keybuf = Buffer.alloc(keylen);
55 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem));
57 if (encoding === 'buffer') return keybuf;
58 return keybuf.toString(encoding);
/third_party/musl/src/crypt/
Dcrypt_des.c880 unsigned char keybuf[8]; in _crypt_extended_r_uut() local
889 q = keybuf; in _crypt_extended_r_uut()
890 while (q <= &keybuf[sizeof(keybuf) - 1]) { in _crypt_extended_r_uut()
895 __des_setkey(keybuf, &ekey); in _crypt_extended_r_uut()
923 des_cipher(keybuf, keybuf, 1, 0, &ekey); in _crypt_extended_r_uut()
927 q = keybuf; in _crypt_extended_r_uut()
928 while (q <= &keybuf[sizeof(keybuf) - 1] && *key) in _crypt_extended_r_uut()
930 __des_setkey(keybuf, &ekey); in _crypt_extended_r_uut()
/third_party/ltp/lib/
Dtst_af_alg.c138 uint8_t *keybuf = NULL; in tst_alg_setkey() local
143 keybuf = SAFE_MALLOC(keylen); in tst_alg_setkey()
145 keybuf[i] = rand(); in tst_alg_setkey()
146 key = keybuf; in tst_alg_setkey()
153 free(keybuf); in tst_alg_setkey()
/third_party/ejdb/src/
Dejdb2.c382 char keybuf[IWNUMBUF_SIZE + sizeof(KEY_PREFIX_COLLMETA)]; in _jb_coll_acquire_keeplock2() local
402 key.size = snprintf(keybuf, sizeof(keybuf), KEY_PREFIX_COLLMETA "%u", dbid); in _jb_coll_acquire_keeplock2()
403 if (key.size >= sizeof(keybuf)) { in _jb_coll_acquire_keeplock2()
407 key.data = keybuf; in _jb_coll_acquire_keeplock2()
1065 …char keybuf[sizeof(KEY_PREFIX_IDXMETA) + 1 + 2 * IWNUMBUF_SIZE]; // Full key format: i.<coldbid>.<… in ejdb_remove_index() local
1074 key.data = keybuf; in ejdb_remove_index()
1075 …key.size = snprintf(keybuf, sizeof(keybuf), KEY_PREFIX_IDXMETA "%u" "." "%u", jbc->dbid, idx->dbid… in ejdb_remove_index()
1076 if (key.size >= sizeof(keybuf)) { in ejdb_remove_index()
1109 …char keybuf[sizeof(KEY_PREFIX_IDXMETA) + 1 + 2 * IWNUMBUF_SIZE]; // Full key format: i.<coldbid>.<… in ejdb_ensure_index() local
1176 key.data = keybuf; in ejdb_ensure_index()
[all …]
/third_party/openssl/crypto/pem/
Dpvkfmt.c828 unsigned char keybuf[20]; in do_PVK_body_key() local
860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key()
875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
884 memset(keybuf + 5, 0, 11); in do_PVK_body_key()
885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key()
911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key()
1056 unsigned char keybuf[20]; in i2b_PVK() local
1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK()
1072 memset(keybuf + 5, 0, 11); in i2b_PVK()
1074 if (!EVP_EncryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in i2b_PVK()
[all …]
/third_party/protobuf/ruby/ext/google/protobuf_c/
Dmap.c365 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index() local
369 key = table_key(self, key, keybuf, &keyval, &length); in Map_index()
389 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index_set() local
394 key = table_key(self, key, keybuf, &keyval, &length); in Map_index_set()
426 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_has_key() local
429 key = table_key(self, key, keybuf, &keyval, &length); in Map_has_key()
447 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_delete() local
451 key = table_key(self, key, keybuf, &keyval, &length); in Map_delete()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Dikev2_common.c635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local
650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys()
651 if (keybuf == NULL) in ikev2_derive_sk_keys()
655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys()
656 os_free(keybuf); in ikev2_derive_sk_keys()
660 pos = keybuf; in ikev2_derive_sk_keys()
717 os_free(keybuf); in ikev2_derive_sk_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Dikev2_common.c635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local
650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys()
651 if (keybuf == NULL) in ikev2_derive_sk_keys()
655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys()
656 os_free(keybuf); in ikev2_derive_sk_keys()
660 pos = keybuf; in ikev2_derive_sk_keys()
717 os_free(keybuf); in ikev2_derive_sk_keys()
/third_party/toybox/toys/other/
Dhexedit.c123 char keybuf[16]; in hexedit_main() local
125 *keybuf = 0; in hexedit_main()
187 key = scan_key(keybuf, -1); in hexedit_main()
/third_party/ffmpeg/libavformat/
Dasfcrypt.c54 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) in multiswap_init()
58 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; in multiswap_init()
/third_party/node/test/parallel/
Dtest-crypto-key-objects.js68 const keybuf = randomBytes(32); constant
69 const key = createSecretKey(keybuf);
75 assert(keybuf.equals(exportedKey));
/third_party/libwebsockets/plugins/ssh-base/
Dsshd.c150 uint8_t keybuf[256]; in offer() local
152 keylen = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in offer()
158 n = ed25519_key_parse(keybuf, (unsigned int)keylen, in offer()
303 uint8_t keybuf[256]; in handle_name() local
312 len = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in handle_name()
315 if (ed25519_key_parse(keybuf, (unsigned int)len, in handle_name()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_ft.c2172 u8 keybuf[WPA_GTK_MAX_LEN]; in wpa_ft_gtk_subelem() local
2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem()
2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem()
2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem()
2205 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem()
2208 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem()
2209 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem()
2211 key = keybuf; in wpa_ft_gtk_subelem()
2217 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem()
2219 key = keybuf; in wpa_ft_gtk_subelem()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_ft.c2172 u8 keybuf[32]; in wpa_ft_gtk_subelem() local
2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem()
2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem()
2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem()
2199 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem()
2200 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem()
2202 key = keybuf; in wpa_ft_gtk_subelem()
2229 forced_memzero(keybuf, sizeof(keybuf)); in wpa_ft_gtk_subelem()
/third_party/toybox/toys/pending/
Dvi.c1500 char keybuf[16] = {0}; in vi_main() local
1539 key = scan_key(keybuf, -1); in vi_main()
1541 } else key = scan_key(keybuf, -1); in vi_main()