/external/python/cpython3/Modules/_blake2/impl/ |
D | blake2-dispatch.c | 159 int blake2b_init_key_ref( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 163 …b_ref( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 168 int blake2b_init_key_sse2( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 172 …_sse2( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 175 int blake2b_init_key_ssse3( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 179 …ssse3( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 182 int blake2b_init_key_sse41( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 186 …sse41( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 189 int blake2b_init_key_avx( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 193 …b_avx( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); [all …]
|
D | blake2sp.c | 27 static int blake2sp_init_leaf( blake2s_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2sp_init_leaf() argument 31 P->key_length = keylen; in blake2sp_init_leaf() 45 static int blake2sp_init_root( blake2s_state *S, uint8_t outlen, uint8_t keylen ) in blake2sp_init_root() argument 49 P->key_length = keylen; in blake2sp_init_root() 83 int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2sp_init_key() argument 87 if( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2sp_init_key() 92 if( blake2sp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2sp_init_key() 96 if( blake2sp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2sp_init_key() 105 memcpy( block, key, keylen ); in blake2sp_init_key() 194 …ake2sp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2sp() argument [all …]
|
D | blake2bp.c | 28 static int blake2bp_init_leaf( blake2b_state *S, uint8_t outlen, uint8_t keylen, uint64_t offset ) in blake2bp_init_leaf() argument 32 P->key_length = keylen; in blake2bp_init_leaf() 47 static int blake2bp_init_root( blake2b_state *S, uint8_t outlen, uint8_t keylen ) in blake2bp_init_root() argument 51 P->key_length = keylen; in blake2bp_init_root() 86 int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ) in blake2bp_init_key() argument 90 if( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2bp_init_key() 95 if( blake2bp_init_root( S->R, ( uint8_t ) outlen, ( uint8_t ) keylen ) < 0 ) in blake2bp_init_key() 99 if( blake2bp_init_leaf( S->S[i], ( uint8_t ) outlen, ( uint8_t ) keylen, i ) < 0 ) in blake2bp_init_key() 108 memcpy( block, key, keylen ); in blake2bp_init_key() 196 …ake2bp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2bp() argument [all …]
|
D | blake2s.c | 183 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 186 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 232 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument 236 if ( ( !key ) || ( !keylen ) || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 241 keylen, in blake2s_init_key() 258 memcpy( block, key, keylen ); in blake2s_init_key() 381 …lake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2s() argument 390 if ( NULL == key && keylen > 0) return -1; in blake2s() 394 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 396 if( keylen > 0 ) in blake2s() [all …]
|
D | blake2.h | 144 …BLAKE2_API int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 150 …BLAKE2_API int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 156 …AKE2_API int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen ); 161 …AKE2_API int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen ); 166 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 167 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 169 …ke2sp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 170 …ke2bp( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen );
|
D | blake2b-ref.c | 153 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 156 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 198 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ) in blake2b_init_key() argument 204 if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 207 P->key_length = ( uint8_t ) keylen; in blake2b_init_key() 223 memcpy( block, key, keylen ); in blake2b_init_key() 351 …lake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2b() argument 360 if( NULL == key && keylen > 0 ) return -1; in blake2b() 364 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 366 if( keylen > 0 ) in blake2b() [all …]
|
D | blake2b.c | 197 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ); 200 …ake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 246 int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen ) in blake2b_init_key() argument 250 if ( ( !keylen ) || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key() 255 ( uint8_t ) keylen, in blake2b_init_key() 273 memcpy( block, key, keylen ); in blake2b_init_key() 403 …lake2b( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2b() argument 412 if( NULL == key && keylen > 0 ) return -1; in blake2b() 416 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b() 418 if( keylen ) in blake2b() [all …]
|
D | blake2s-ref.c | 146 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ); 149 …ake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ); 191 int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen ) in blake2s_init_key() argument 197 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key() 200 P->key_length = ( uint8_t ) keylen; in blake2s_init_key() 216 memcpy( block, key, keylen ); in blake2s_init_key() 341 …lake2s( uint8_t *out, const void *in, const void *key, size_t outlen, size_t inlen, size_t keylen ) in blake2s() argument 350 if ( NULL == key && keylen > 0 ) return -1; in blake2s() 354 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s() 356 if( keylen > 0 ) in blake2s() [all …]
|
/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 27 Input = "Sample message for keylen=blocklen" 32 Input = "Sample message for keylen<blocklen" 37 Input = "Sample message for keylen=blocklen" 42 Input = "Sample message for keylen=blocklen" 47 Input = "Sample message for keylen<blocklen" 52 Input = "Sample message for keylen=blocklen" 57 Input = "Sample message for keylen=blocklen" 62 Input = "Sample message for keylen<blocklen" 67 Input = "Sample message for keylen=blocklen" 72 Input = "Sample message for keylen=blocklen" [all …]
|
/external/ltp/lib/ |
D | tst_af_alg.c | 97 void tst_alg_setkey(int algfd, const uint8_t *key, unsigned int keylen) in tst_alg_setkey() argument 104 keybuf = SAFE_MALLOC(keylen); in tst_alg_setkey() 105 for (i = 0; i < keylen; i++) in tst_alg_setkey() 109 TEST(setsockopt(algfd, SOL_ALG, ALG_SET_KEY, key, keylen)); in tst_alg_setkey() 112 "unexpected error setting key (len=%u)", keylen); in tst_alg_setkey() 128 const uint8_t *key, unsigned int keylen) in tst_alg_setup() argument 134 if (keylen != 0) in tst_alg_setup() 135 tst_alg_setkey(algfd, key, keylen); in tst_alg_setup() 141 const uint8_t *key, unsigned int keylen) in tst_alg_setup_reqfd() argument 143 int algfd = tst_alg_setup(algtype, algname, key, keylen); in tst_alg_setup_reqfd()
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 76 unsigned long *keylen in InternalTXTRecordSearch() argument 81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 279 unsigned long keylen; in TXTRecordContainsKey() local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 291 unsigned long keylen; in TXTRecordGetValuePtr() local 292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 112 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 121 size_t origkeylen = keylen; in bcrypt_pbkdf() 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 131 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 132 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 140 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 163 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 170 keylen -= i; in bcrypt_pbkdf()
|
/external/u-boot/lib/crypto/ |
D | public_key.c | 153 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query() 157 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 158 ptr = key + pkey->keylen; in software_key_query() 164 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_query() 166 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_query() 222 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op() 227 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 228 ptr = key + pkey->keylen; in software_key_eds_op() 234 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_eds_op() 236 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_eds_op() [all …]
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | utils.py | 24 keylen = backend._ffi.new("size_t *") 25 res = backend._lib.EVP_PKEY_derive(ctx, backend._ffi.NULL, keylen) 27 backend.openssl_assert(keylen[0] > 0) 28 buf = backend._ffi.new("unsigned char[]", keylen[0]) 29 res = backend._lib.EVP_PKEY_derive(ctx, buf, keylen) 35 return backend._ffi.buffer(buf, keylen[0])[:]
|
/external/e2fsprogs/lib/ext2fs/ |
D | tdbtool.c | 207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument 211 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb() 217 key.dsize = keylen; in insert_tdb() 226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument 230 if ((keyname == NULL) || (keylen == 0)) { in store_tdb() 241 key.dsize = keylen; in store_tdb() 253 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument 257 if ((keyname == NULL) || (keylen == 0)) { in show_tdb() 263 key.dsize = keylen; in show_tdb() 278 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument [all …]
|
/external/vboot_reference/tests/ |
D | run_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | vb2_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | gen_test_vbpubks.sh | 14 for keylen in ${key_lengths[@]} 19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
|
D | run_vbutil_tests.sh | 16 local keylen=$2 19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 43 for keylen in ${key_lengths[@]} 47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
|
/external/libdrm/intel/ |
D | uthash.h | 114 #define HASH_VALUE(keyptr,keylen,hashv) \ argument 116 HASH_FCN(keyptr, keylen, hashv); \ 119 #define HASH_FIND_BYHASHVALUE(hh,head,keyptr,keylen,hashval,out) \ argument 126 …HASH_FIND_IN_BKT((head)->hh.tbl, hh, (head)->hh.tbl->buckets[ _hf_bkt ], keyptr, keylen, hashval, … 131 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 134 HASH_VALUE(keyptr, keylen, _hf_hashv); \ 135 HASH_FIND_BYHASHVALUE(hh, head, keyptr, keylen, _hf_hashv, out); \ 238 (add)->hh.keylen = (unsigned) (keylen_in); \ 289 (add)->hh.keylen = (unsigned) (keylen_in); \ 477 #define HASH_BER(key,keylen,hashv) \ argument [all …]
|
/external/curl/lib/ |
D | hmac.c | 53 unsigned int keylen) in Curl_HMAC_init() argument 74 if(keylen > hashparams->hmac_maxkeylen) { in Curl_HMAC_init() 76 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); in Curl_HMAC_init() 80 keylen = hashparams->hmac_resultlen; in Curl_HMAC_init() 87 for(i = 0; i < keylen; i++) { in Curl_HMAC_init()
|
/external/fastrpc/inc/ |
D | uthash.h | 92 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 97 HASH_FCN(keyptr,keylen, (head)->hh.tbl->num_buckets, _hf_hashv, _hf_bkt); \ 100 keyptr,keylen,out); \ 165 (add)->hh.keylen = keylen_in; \ 344 #define HASH_BER(key,keylen,num_bkts,hashv,bkt) \ argument 346 unsigned _hb_keylen=keylen; \ 356 #define HASH_SAX(key,keylen,num_bkts,hashv,bkt) \ argument 361 for(_sx_i=0; _sx_i < keylen; _sx_i++) \ 366 #define HASH_FNV(key,keylen,num_bkts,hashv,bkt) \ argument 371 for(_fn_i=0; _fn_i < keylen; _fn_i++) \ [all …]
|
/external/cn-cbor/src/ |
D | cn-get.c | 31 int keylen; in cn_cbor_mapget_string() local 34 keylen = strlen(key); in cn_cbor_mapget_string() 39 if (keylen != cp->length) { in cn_cbor_mapget_string() 42 if (memcmp(key, cp->v.str, keylen) == 0) { in cn_cbor_mapget_string()
|
/external/pdfium/core/fpdfapi/parser/ |
D | cpdf_security_handler.cpp | 43 size_t keylen, in CalcEncryptKey() argument 64 size_t copy_len = std::min(keylen, sizeof(digest)); in CalcEncryptKey() 69 memset(key, 0, keylen); in CalcEncryptKey() 73 bool IsValidKeyLengthForCipher(int cipher, size_t keylen) { in IsValidKeyLengthForCipher() argument 76 return keylen == 16 || keylen == 24 || keylen == 32; in IsValidKeyLengthForCipher() 78 return keylen == 32; in IsValidKeyLengthForCipher() 80 return keylen >= 5 && keylen <= 16; in IsValidKeyLengthForCipher() 233 int keylen = 0; in LoadCryptInfo() local 261 keylen = nKeyBits / 8; in LoadCryptInfo() 267 keylen = Version > 1 ? pEncryptDict->GetIntegerFor("Length", 40) / 8 : 5; in LoadCryptInfo() [all …]
|
/external/ltp/include/ |
D | tst_af_alg.h | 88 void tst_alg_setkey(int algfd, const uint8_t *key, unsigned int keylen); 123 const uint8_t *key, unsigned int keylen); 134 const uint8_t *key, unsigned int keylen);
|