/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 27 Input = "Sample message for keylen=blocklen" 32 Input = "Sample message for keylen<blocklen" 37 Input = "Sample message for keylen=blocklen" 42 Input = "Sample message for keylen=blocklen" 47 Input = "Sample message for keylen<blocklen" 52 Input = "Sample message for keylen=blocklen" 57 Input = "Sample message for keylen=blocklen" 62 Input = "Sample message for keylen<blocklen" 67 Input = "Sample message for keylen=blocklen" 72 Input = "Sample message for keylen=blocklen" [all …]
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 76 unsigned long *keylen in InternalTXTRecordSearch() argument 81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 279 unsigned long keylen; in TXTRecordContainsKey() local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 291 unsigned long keylen; in TXTRecordGetValuePtr() local 292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
/external/python/cpython3/Modules/_blake2/impl/ |
D | blake2.h | 123 … blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); 129 … blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); 135 …lake2sp_init_key( blake2sp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); 140 …lake2bp_init_key( blake2bp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); 145 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); 146 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); 148 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); 149 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); 151 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2() argument 153 return blake2b( out, in, key, outlen, inlen, keylen ); in blake2()
|
D | blake2s.c | 211 int blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen… in blake2s_init_key() argument 216 keylen, in blake2s_init_key() 230 if ( ( !key ) || ( !keylen ) || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 238 memcpy( block, key, keylen ); in blake2s_init_key() 367 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2s() argument 376 if ( NULL == key && keylen > 0) return -1; in blake2s() 380 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 382 if( keylen > 0 ) in blake2s() 384 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
|
D | blake2s-ref.c | 187 int blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen… in blake2s_init_key() argument 193 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 196 P->key_length = keylen; in blake2s_init_key() 212 memcpy( block, key, keylen ); in blake2s_init_key() 343 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2s() argument 352 if ( NULL == key && keylen > 0) return -1; in blake2s() 356 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 358 if( keylen > 0 ) in blake2s() 360 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
|
D | blake2b-ref.c | 194 int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen… in blake2b_init_key() argument 200 if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 203 P->key_length = keylen; in blake2b_init_key() 219 memcpy( block, key, keylen ); in blake2b_init_key() 353 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2b() argument 362 if( NULL == key && keylen > 0 ) return -1; in blake2b() 366 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 368 if( keylen > 0 ) in blake2b() 370 if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2b()
|
D | blake2b.c | 225 int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen… in blake2b_init_key() argument 230 keylen, in blake2b_init_key() 244 if ( ( !keylen ) || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 252 memcpy( block, key, keylen ); in blake2b_init_key() 386 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2b() argument 395 if( NULL == key && keylen > 0 ) return -1; in blake2b() 399 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 401 if( keylen ) in blake2b() 403 if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2b()
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 112 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 121 size_t origkeylen = keylen; in bcrypt_pbkdf() 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 131 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 132 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 140 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 163 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 170 keylen -= i; in bcrypt_pbkdf()
|
/external/e2fsprogs/lib/ext2fs/ |
D | tdbtool.c | 207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument 211 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb() 217 key.dsize = keylen; in insert_tdb() 226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument 230 if ((keyname == NULL) || (keylen == 0)) { in store_tdb() 241 key.dsize = keylen; in store_tdb() 253 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument 257 if ((keyname == NULL) || (keylen == 0)) { in show_tdb() 263 key.dsize = keylen; in show_tdb() 278 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument [all …]
|
/external/libdrm/intel/ |
D | uthash.h | 114 #define HASH_VALUE(keyptr,keylen,hashv) \ argument 116 HASH_FCN(keyptr, keylen, hashv); \ 119 #define HASH_FIND_BYHASHVALUE(hh,head,keyptr,keylen,hashval,out) \ argument 126 …HASH_FIND_IN_BKT((head)->hh.tbl, hh, (head)->hh.tbl->buckets[ _hf_bkt ], keyptr, keylen, hashval, … 131 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 134 HASH_VALUE(keyptr, keylen, _hf_hashv); \ 135 HASH_FIND_BYHASHVALUE(hh, head, keyptr, keylen, _hf_hashv, out); \ 238 (add)->hh.keylen = (unsigned) (keylen_in); \ 289 (add)->hh.keylen = (unsigned) (keylen_in); \ 477 #define HASH_BER(key,keylen,hashv) \ argument [all …]
|
/external/vboot_reference/tests/ |
D | vb2_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | run_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | run_vbutil_tests.sh | 16 local keylen=$2 19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 43 for keylen in ${key_lengths[@]} 47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
|
D | gen_test_vbpubks.sh | 14 for keylen in ${key_lengths[@]} 19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
|
D | gen_test_cases.sh | 20 for keylen in ${key_lengths[@]} 28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \ 29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
|
/external/curl/lib/ |
D | hmac.c | 53 unsigned int keylen) in Curl_HMAC_init() argument 74 if(keylen > hashparams->hmac_maxkeylen) { in Curl_HMAC_init() 76 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); in Curl_HMAC_init() 80 keylen = hashparams->hmac_resultlen; in Curl_HMAC_init() 87 for(i = 0; i < keylen; i++) { in Curl_HMAC_init()
|
/external/pdfium/core/fpdfapi/parser/ |
D | cpdf_security_handler.cpp | 32 int keylen, in CalcEncryptKey() argument 58 uint32_t copy_len = keylen; in CalcEncryptKey() 65 memset(key, 0, keylen); in CalcEncryptKey() 69 bool IsValidKeyLengthForCipher(int cipher, int keylen) { in IsValidKeyLengthForCipher() argument 72 return keylen == 16 || keylen == 24 || keylen == 32; in IsValidKeyLengthForCipher() 74 return keylen == 32; in IsValidKeyLengthForCipher() 76 return keylen >= 5 && keylen <= 16; in IsValidKeyLengthForCipher() 128 int& keylen) { in LoadCryptInfo() argument 131 keylen = 0; in LoadCryptInfo() 156 keylen = nKeyBits / 8; in LoadCryptInfo() [all …]
|
D | cpdf_crypto_handler.cpp | 400 int keylen) in CPDF_CryptoHandler() argument 401 : m_KeyLen(std::min(keylen, 32)), m_Cipher(cipher) { in CPDF_CryptoHandler() 402 ASSERT(cipher != FXCIPHER_AES || keylen == 16 || keylen == 24 || in CPDF_CryptoHandler() 403 keylen == 32); in CPDF_CryptoHandler() 404 ASSERT(cipher != FXCIPHER_AES2 || keylen == 32); in CPDF_CryptoHandler() 405 ASSERT(cipher != FXCIPHER_RC4 || (keylen >= 5 && keylen <= 16)); in CPDF_CryptoHandler()
|
/external/cn-cbor/src/ |
D | cn-get.c | 31 int keylen; in cn_cbor_mapget_string() local 34 keylen = strlen(key); in cn_cbor_mapget_string() 39 if (keylen != cp->length) { in cn_cbor_mapget_string() 42 if (memcmp(key, cp->v.str, keylen) == 0) { in cn_cbor_mapget_string()
|
/external/kmod/shared/ |
D | hash.c | 148 unsigned int keylen = strlen(key); in hash_add() local 149 unsigned int hashval = hash_superfast(key, keylen); in hash_add() 191 unsigned int keylen = strlen(key); in hash_add_unique() local 192 unsigned int hashval = hash_superfast(key, keylen); in hash_add_unique() 236 unsigned int keylen = strlen(key); in hash_find() local 237 unsigned int hashval = hash_superfast(key, keylen); in hash_find() 254 unsigned int keylen = strlen(key); in hash_del() local 255 unsigned int hashval = hash_superfast(key, keylen); in hash_del()
|
/external/u-boot/drivers/crypto/fsl/ |
D | fsl_rsa.c | 21 uint32_t keylen; in fsl_mod_exp() local 27 keylen = prop->num_bits / 8; in fsl_mod_exp() 32 pkin.n_siz = keylen; in fsl_mod_exp()
|
/external/ipsec-tools/src/racoon/ |
D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
/external/tcpdump/tests/ |
D | ikev2four.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 296 size_t keylen; in ieee802_1x_auth_get_msk() local 304 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 305 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 312 if (keylen > *len) in ieee802_1x_auth_get_msk() 313 keylen = *len; in ieee802_1x_auth_get_msk() 314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 315 *len = keylen; in ieee802_1x_auth_get_msk()
|
/external/llvm/test/Transforms/IndVarSimplify/ |
D | exit_value_test2.ll | 27 %keylen.010 = phi i32 [ %len, %while.body.lr.ph ], [ %sub, %while.body ] 38 %sub = add i32 %keylen.010, -12 47 %keylen.0.lcssa = phi i32 [ %sub.lcssa, %while.cond.while.end_crit_edge ], [ %len, %entry ] 48 call void @_Z3mixRjj(i32* dereferenceable(4) %a, i32 %keylen.0.lcssa)
|