/external/boringssl/src/crypto/evp/ |
D | pbkdf.c | 67 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { in PKCS5_PBKDF2_HMAC() argument 100 OPENSSL_memcpy(out_key, digest_tmp, todo); in PKCS5_PBKDF2_HMAC() 109 out_key[k] ^= digest_tmp[k]; in PKCS5_PBKDF2_HMAC() 114 out_key += todo; in PKCS5_PBKDF2_HMAC() 143 uint8_t *out_key) { in PKCS5_PBKDF2_HMAC_SHA1() argument 145 EVP_sha1(), key_len, out_key); in PKCS5_PBKDF2_HMAC_SHA1()
|
D | scrypt.c | 148 uint64_t p, size_t max_mem, uint8_t *out_key, in EVP_PBE_scrypt() argument 204 EVP_sha256(), key_len, out_key)) { in EVP_PBE_scrypt()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | pbkdf.c | 67 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { in PKCS5_PBKDF2_HMAC() argument 100 OPENSSL_memcpy(out_key, digest_tmp, todo); in PKCS5_PBKDF2_HMAC() 109 out_key[k] ^= digest_tmp[k]; in PKCS5_PBKDF2_HMAC() 114 out_key += todo; in PKCS5_PBKDF2_HMAC() 143 uint8_t *out_key) { in PKCS5_PBKDF2_HMAC_SHA1() argument 145 EVP_sha1(), key_len, out_key); in PKCS5_PBKDF2_HMAC_SHA1()
|
D | scrypt.c | 148 uint64_t p, size_t max_mem, uint8_t *out_key, in EVP_PBE_scrypt() argument 204 EVP_sha256(), key_len, out_key)) { in EVP_PBE_scrypt()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 100 OPENSSL_memcpy(out_key + done, previous, todo); in HKDF_expand()
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 100 OPENSSL_memcpy(out_key + done, previous, todo); in HKDF_expand()
|
/external/boringssl/src/include/openssl/ |
D | hkdf.h | 35 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 44 OPENSSL_EXPORT int HKDF_extract(uint8_t *out_key, size_t *out_len, 52 OPENSSL_EXPORT int HKDF_expand(uint8_t *out_key, size_t out_len,
|
D | ec_key.h | 308 OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp, 327 OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, 344 OPENSSL_EXPORT EC_KEY *o2i_ECPublicKey(EC_KEY **out_key, const uint8_t **inp,
|
D | curve25519.h | 179 OPENSSL_EXPORT int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key,
|
D | evp.h | 482 size_t key_len, uint8_t *out_key); 490 uint8_t *out_key); 511 size_t max_mem, uint8_t *out_key,
|
D | pkcs8.h | 125 OPENSSL_EXPORT int PKCS12_get_key_and_certs(EVP_PKEY **out_key,
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | hkdf.h | 35 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 44 OPENSSL_EXPORT int HKDF_extract(uint8_t *out_key, size_t *out_len, 52 OPENSSL_EXPORT int HKDF_expand(uint8_t *out_key, size_t out_len,
|
D | ec_key.h | 308 OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp, 327 OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, 344 OPENSSL_EXPORT EC_KEY *o2i_ECPublicKey(EC_KEY **out_key, const uint8_t **inp,
|
D | evp.h | 480 size_t key_len, uint8_t *out_key); 488 uint8_t *out_key); 509 size_t max_mem, uint8_t *out_key,
|
D | curve25519.h | 179 OPENSSL_EXPORT int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key,
|
/external/tensorflow/tensorflow/core/kernels/ |
D | stateless_random_ops.cc | 32 Status GenerateKey(Tensor seed, random::PhiloxRandom::Key* out_key, in GenerateKey() argument 52 (*out_key)[0] = 0x3ec8f720; in GenerateKey() 53 (*out_key)[1] = 0x02461e29; in GenerateKey() 58 const auto mix = random::PhiloxRandom(*out_counter, *out_key)(); in GenerateKey() 59 (*out_key)[0] = mix[0]; in GenerateKey() 60 (*out_key)[1] = mix[1]; in GenerateKey()
|
D | stateless_random_ops.h | 29 Status GenerateKey(Tensor seed_t, random::PhiloxRandom::Key* out_key,
|
/external/boringssl/src/crypto/hpke/ |
D | hpke.c | 70 static int hpke_labeled_extract(const EVP_MD *hkdf_md, uint8_t *out_key, in hpke_labeled_extract() argument 82 HKDF_extract(out_key, out_len, hkdf_md, CBB_data(&labeled_ikm), in hpke_labeled_extract() 88 static int hpke_labeled_expand(const EVP_MD *hkdf_md, uint8_t *out_key, in hpke_labeled_expand() argument 101 HKDF_expand(out_key, out_len, hkdf_md, prk, prk_len, in hpke_labeled_expand() 107 static int hpke_extract_and_expand(const EVP_MD *hkdf_md, uint8_t *out_key, in hpke_extract_and_expand() argument 120 if (!hpke_labeled_expand(hkdf_md, out_key, out_len, prk, prk_len, in hpke_extract_and_expand()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 246 EVP_PKEY **out_key; member 404 if (*ctx->out_key) { in PKCS12_handle_safe_bag() 423 *ctx->out_key = pkey; in PKCS12_handle_safe_bag() 603 int PKCS12_get_key_and_certs(EVP_PKEY **out_key, STACK_OF(X509) *out_certs, in PKCS12_get_key_and_certs() argument 618 *out_key = NULL; in PKCS12_get_key_and_certs() 671 ctx.out_key = out_key; in PKCS12_get_key_and_certs() 738 EVP_PKEY_free(*out_key); in PKCS12_get_key_and_certs() 739 *out_key = NULL; in PKCS12_get_key_and_certs()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 277 EVP_PKEY **out_key; member 435 if (*ctx->out_key) { in PKCS12_handle_safe_bag() 454 *ctx->out_key = pkey; in PKCS12_handle_safe_bag() 634 int PKCS12_get_key_and_certs(EVP_PKEY **out_key, STACK_OF(X509) *out_certs, in PKCS12_get_key_and_certs() argument 649 *out_key = NULL; in PKCS12_get_key_and_certs() 702 ctx.out_key = out_key; in PKCS12_get_key_and_certs() 769 EVP_PKEY_free(*out_key); in PKCS12_get_key_and_certs() 770 *out_key = NULL; in PKCS12_get_key_and_certs()
|
/external/boringssl/src/crypto/ec_extra/ |
D | ec_asn1.c | 454 EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, long len) { in d2i_ECParameters() argument 474 if (out_key != NULL) { in d2i_ECParameters() 475 EC_KEY_free(*out_key); in d2i_ECParameters() 476 *out_key = ret; in d2i_ECParameters()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/ec_extra/ |
D | ec_asn1.c | 469 EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, long len) { in d2i_ECParameters() argument 489 if (out_key != NULL) { in d2i_ECParameters() 490 EC_KEY_free(*out_key); in d2i_ECParameters() 491 *out_key = ret; in d2i_ECParameters()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 475 int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key, size_t *out_key_len, in SPAKE2_process_msg() argument 534 OPENSSL_memcpy(out_key, key, to_copy); in SPAKE2_process_msg()
|
/external/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 475 int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key, size_t *out_key_len, in SPAKE2_process_msg() argument 534 OPENSSL_memcpy(out_key, key, to_copy); in SPAKE2_process_msg()
|
/external/protobuf/php/ext/google/protobuf/ |
D | map.c | 91 const char** out_key, in table_key() argument 102 *out_key = Z_STRVAL_P(key); in table_key() 113 *out_key = buf; \ in table_key()
|