Home
last modified time | relevance | path

Searched refs:klen (Results 1 – 25 of 31) sorted by relevance

12

/external/boringssl/src/crypto/pem/
Dpem_pk8.c70 char *kstr, int klen, pem_password_cb *cb, void *u);
73 char *kstr, int klen, pem_password_cb *cb, void *u);
83 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey_nid() argument
86 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey_nid()
90 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey() argument
93 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey()
97 char *kstr, int klen, in i2d_PKCS8PrivateKey_bio() argument
100 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_bio()
104 char *kstr, int klen, in i2d_PKCS8PrivateKey_nid_bio() argument
107 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_nid_bio()
[all …]
Dpem_pkey.c100 int klen; in PEM_read_bio_PrivateKey() local
106 klen = 0; in PEM_read_bio_PrivateKey()
109 klen = cb(psbuf, PEM_BUFSIZE, 0, u); in PEM_read_bio_PrivateKey()
110 if (klen <= 0) { in PEM_read_bio_PrivateKey()
115 p8inf = PKCS8_decrypt(p8, psbuf, klen); in PEM_read_bio_PrivateKey()
117 OPENSSL_cleanse(psbuf, klen); in PEM_read_bio_PrivateKey()
148 unsigned char *kstr, int klen, in PEM_write_bio_PrivateKey() argument
151 return PEM_write_bio_PKCS8PrivateKey(bp, x, enc, (char *)kstr, klen, cb, u); in PEM_write_bio_PrivateKey()
169 unsigned char *kstr, int klen, in PEM_write_PrivateKey() argument
177 int ret = PEM_write_bio_PrivateKey(b, x, enc, kstr, klen, cb, u); in PEM_write_PrivateKey()
Dpem_lib.c258 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write() argument
265 int ret = PEM_ASN1_write_bio(i2d, name, b, x, enc, kstr, klen, callback, u); in PEM_ASN1_write()
273 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write_bio() argument
312 klen = 0; in PEM_ASN1_write_bio()
315 klen = (*callback) (buf, PEM_BUFSIZE, 1, u); in PEM_ASN1_write_bio()
316 if (klen <= 0) { in PEM_ASN1_write_bio()
329 if (!EVP_BytesToKey(enc, EVP_md5(), iv, kstr, klen, 1, key, NULL)) in PEM_ASN1_write_bio()
372 int i = 0, j, o, klen; in PEM_do_header() local
383 klen = 0; in PEM_do_header()
386 klen = callback(buf, PEM_BUFSIZE, 0, u); in PEM_do_header()
[all …]
Dpem_info.c279 unsigned char *kstr, int klen, in PEM_X509_INFO_write_bio() argument
341 enc, kstr, klen, cb, u) <= 0) in PEM_X509_INFO_write_bio()
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/IndVarSimplify/
Dexit_value_test3.ll16 %klen.0 = phi i32 [ %len, %entry ], [ %sub, %while.cond ]
17 %cmp = icmp ugt i32 %klen.0, 11
18 %sub = add i32 %klen.0, -12
22 %klen.0.lcssa = phi i32 [ %klen.0, %while.cond ]
23 ret i32 %klen.0.lcssa
/external/llvm/test/Transforms/IndVarSimplify/
Dexit_value_test3.ll16 %klen.0 = phi i32 [ %len, %entry ], [ %sub, %while.cond ]
17 %cmp = icmp ugt i32 %klen.0, 11
18 %sub = add i32 %klen.0, -12
22 %klen.0.lcssa = phi i32 [ %klen.0, %while.cond ]
23 ret i32 %klen.0.lcssa
/external/boringssl/src/include/openssl/
Dpem.h160 FILE *fp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \
162 return PEM_ASN1_write(pem_write_##name##_i2d, str, fp, x, enc, kstr, klen, \
171 FILE *fp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \
173 return PEM_ASN1_write(pem_write_##name##_i2d, str, fp, x, enc, kstr, klen, \
213 BIO *bp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \
216 kstr, klen, cb, u); \
224 BIO *bp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \
227 enc, kstr, klen, cb, u); \
283 unsigned char *kstr, int klen, pem_password_cb *cb, void *u);
298 unsigned char *kstr, int klen, pem_password_cb *cb, void *u);
[all …]
/external/openssh/
Dkexecdhs.c75 size_t klen = 0, hashlen; in input_kex_ecdh_init() local
125 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_init()
126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init()
131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init()
132 server_key, NULL) != (int)klen || in input_kex_ecdh_init()
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init()
139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init()
198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init()
Dkexecdhc.c111 size_t klen = 0, hashlen; in input_kex_ecdh_reply() local
159 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_reply()
160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply()
165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply()
166 client_key, NULL) != (int)klen || in input_kex_ecdh_reply()
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply()
173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply()
217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply()
Dhmac.c64 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) in ssh_hmac_init() argument
71 if (klen <= ctx->buf_len) in ssh_hmac_init()
72 memcpy(ctx->buf, key, klen); in ssh_hmac_init()
73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init()
141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) in hmac_test() argument
149 if (ssh_hmac_init(ctx, key, klen) < 0 || in hmac_test()
Dkexdhc.c111 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh() local
156 klen = DH_size(kex->dh); in input_kex_dh()
157 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh()
210 explicit_bzero(kbuf, klen); in input_kex_dh()
Dkexdhs.c103 size_t klen = 0, hashlen; in input_kex_dh_init() local
148 klen = DH_size(kex->dh); in input_kex_dh_init()
149 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init()
215 explicit_bzero(kbuf, klen); in input_kex_dh_init()
Dkexgexs.c132 size_t klen = 0, hashlen; in input_kex_dh_gex_init() local
177 klen = DH_size(kex->dh); in input_kex_dh_gex_init()
178 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init()
245 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init()
Dkexgexc.c154 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh_gex_reply() local
204 klen = DH_size(kex->dh); in input_kex_dh_gex_reply()
205 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply()
262 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply()
Dhmac.h29 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
Dcipher.c333 int klen; in cipher_init() local
390 klen = EVP_CIPHER_CTX_key_length(cc->evp); in cipher_init()
391 if (klen > 0 && keylen != (u_int)klen) { in cipher_init()
/external/bcc/examples/lua/
Duprobe-tailkt.lua29 local writeable, watch_key, klen = 'any', arg[2] or '*', 80
36 if watch_key ~= '*' then klen = #watch_key end
41 local key_type = string.format('char [%d]', klen)
52 if ptregs.parm3 ~= klen then return false end
/external/libsrtp2/crypto/test/
Dcipher_driver.c79 int klen,
95 int klen);
442 int klen) in cipher_array_alloc_init() argument
450 int klen_pad = ((klen + 15) >> 4) << 4; in cipher_array_alloc_init()
471 status = srtp_cipher_type_alloc(ctype, cipher_array, klen, 16); in cipher_array_alloc_init()
476 srtp_cipher_rand_for_tests(key, klen); in cipher_array_alloc_init()
477 for (j = klen; j < klen_pad; j++) in cipher_array_alloc_init()
585 int klen, in cipher_driver_test_array_throughput() argument
591 status = cipher_array_alloc_init(&ca, num_cipher, ct, klen); in cipher_driver_test_array_throughput()
/external/curl/tests/unit/
Dunit1602.c54 size_t klen = sizeof(int); variable
63 nodep = Curl_hash_add(&hash_static, &key, klen, value);
73 nodep = Curl_hash_add(&hash_static, &key2, klen, value2);
/external/jemalloc_new/src/
Djemalloc.c848 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument
850 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error()
876 size_t klen, vlen; local
958 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v,
961 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0)
973 k, klen, v, vlen); \
992 k, klen, v, vlen); \
1012 k, klen, v, vlen); \
1037 k, klen, v, vlen); \
1042 k, klen, v, vlen); \
[all …]
/external/libsrtp2/crypto/include/
Dauth.h82 #define srtp_auth_type_alloc(at, a, klen, outlen) \ argument
83 ((at)->alloc((a), (klen), (outlen)))
/external/jemalloc/src/
Djemalloc.c912 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument
916 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error()
946 size_t klen, vlen; local
1043 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v,
1046 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0)
1058 k, klen, v, vlen); \
1078 k, klen, v, vlen); \
1096 k, klen, v, vlen); \
1120 k, klen, v, vlen); \
1125 k, klen, v, vlen); \
[all …]
/external/libiio/src/
Dlocal.c1945 size_t klen, vlen; in populate_context_attrs() local
1947 ret = ini_read_pair(ini, &key, &klen, &value, &vlen); in populate_context_attrs()
1953 new_key = strndup(key, klen); in populate_context_attrs()
/external/curl/lib/vtls/
Dopenssl.c434 int klen = curlx_uztosi(strlen((char *)global_passwd)); in passwd_callback() local
435 if(num > klen) { in passwd_callback()
436 memcpy(buf, global_passwd, klen + 1); in passwd_callback()
437 return klen; in passwd_callback()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth.c2795 int klen; in fils_set_tk() local
2807 klen = wpa_cipher_key_len(sm->pairwise); in fils_set_tk()
2811 sm->PTK.tk, klen, KEY_FLAG_PAIRWISE_RX_TX)) { in fils_set_tk()
3555 int klen = wpa_cipher_key_len(sm->pairwise); in SM_STATE() local
3564 0, sm->PTK.tk, klen, in SM_STATE()

12