/external/usrsctp/usrsctplib/netinet/ |
D | sctp_auth.c | 481 sctp_free_sharedkey(sctp_sharedkey_t *skey) in sctp_free_sharedkey() argument 483 if (skey == NULL) in sctp_free_sharedkey() 486 if (SCTP_DECREMENT_AND_CHECK_REFCOUNT(&skey->refcount)) { in sctp_free_sharedkey() 487 if (skey->key != NULL) in sctp_free_sharedkey() 488 sctp_free_key(skey->key); in sctp_free_sharedkey() 489 SCTP_FREE(skey, SCTP_M_AUTH_KY); in sctp_free_sharedkey() 496 sctp_sharedkey_t *skey; in sctp_find_sharedkey() local 498 LIST_FOREACH(skey, shared_keys, next) { in sctp_find_sharedkey() 499 if (skey->keyid == key_id) in sctp_find_sharedkey() 500 return (skey); in sctp_find_sharedkey() [all …]
|
D | sctp_auth.h | 140 extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 42 symmetric_key skey; in des_encrypt() local 53 des_setup(pkey, 8, 0, &skey); in des_encrypt() 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt() 55 des_done(&skey); in des_encrypt() 88 symmetric_key *skey; in aes_encrypt_init() local 89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init() 90 if (skey == NULL) in aes_encrypt_init() 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init() 93 os_free(skey); in aes_encrypt_init() 96 return skey; in aes_encrypt_init() [all …]
|
D | tls_openssl_ocsp.c | 508 EVP_PKEY *skey; in check_ocsp_resp() local 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 628 if (!skey) { in check_ocsp_resp() 635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/ |
D | TpmToWolfDesSupport.c | 55 tpmKeyScheduleTDES *skey, in TDES_setup() argument 72 return wc_Des3_SetKey( skey, kp, 0, dir ); in TDES_setup() 80 tpmKeyScheduleTDES *skey in TDES_setup_encrypt_key() argument 83 return TDES_setup( key, keyBits, skey, DES_ENCRYPTION ); in TDES_setup_encrypt_key() 91 tpmKeyScheduleTDES *skey in TDES_setup_decrypt_key() argument 94 return TDES_setup( key, keyBits, skey, DES_DECRYPTION ); in TDES_setup_decrypt_key()
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | utils.py | 455 def _check_rsa_private_numbers(skey): argument 456 assert skey 457 pkey = skey.public_numbers 461 assert skey.d 462 assert skey.p * skey.q == pkey.n 463 assert skey.dmp1 == rsa.rsa_crt_dmp1(skey.d, skey.p) 464 assert skey.dmq1 == rsa.rsa_crt_dmq1(skey.d, skey.q) 465 assert skey.iqmp == rsa.rsa_crt_iqmp(skey.p, skey.q) 468 def _check_dsa_private_numbers(skey): argument 469 assert skey [all …]
|
D | test_dsa.py | 73 skey = parameters.generate_private_key() 74 numbers = skey.private_numbers() 76 pkey = skey.public_key() 85 assert skey.key_size == vector['p'].bit_length() 86 assert pkey.key_size == skey.key_size 94 skey = dsa.generate_private_key(1024, backend) 95 assert skey 96 numbers = skey.private_numbers()
|
D | test_rsa.py | 156 skey = rsa.generate_private_key(public_exponent, key_size, backend) 157 assert skey.key_size == key_size 159 _check_rsa_private_numbers_if_serializable(skey) 160 pkey = skey.public_key() 1418 skey = rsa.RSAPrivateNumbers( 1431 assert len(ciphertext) == math.ceil(skey.key_size / 8.0) 1432 message = skey.decrypt(ciphertext, padding.PKCS1v15()) 1506 skey = rsa.RSAPrivateNumbers( 1518 message = skey.decrypt( 1544 skey = rsa.RSAPrivateNumbers( [all …]
|
/external/javasqlite/src/main/java/SQLite/ |
D | Database.java | 827 public void key(String skey) throws SQLite.Exception { in key() argument 830 if (skey != null && skey.length() > 0) { in key() 831 ekey = new byte[skey.length()]; in key() 832 for (int i = 0; i< skey.length(); i++) { in key() 833 char c = skey.charAt(i); in key() 865 public void rekey(String skey) throws SQLite.Exception { in rekey() argument 868 if (skey != null && skey.length() > 0) { in rekey() 869 ekey = new byte[skey.length()]; in rekey() 870 for (int i = 0; i< skey.length(); i++) { in rekey() 871 char c = skey.charAt(i); in rekey()
|
/external/libxml2/ |
D | dict.c | 919 unsigned long skey; in xmlDictLookup() local 926 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictLookup() 928 skey = okey; in xmlDictLookup() 930 key = skey % dict->subdict->size; in xmlDictLookup() 937 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 942 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 949 if ((tmp->okey == skey) && (tmp->len == l)) { in xmlDictLookup() 954 if ((tmp->okey == skey) && (tmp->len == l) && in xmlDictLookup() 1056 unsigned long skey; in xmlDictExists() local 1063 skey = xmlDictComputeKey(dict->subdict, name, l); in xmlDictExists() [all …]
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | TpmToWolfDesSupport_fp.h | 53 tpmKeyScheduleTDES *skey, 62 tpmKeyScheduleTDES *skey 70 tpmKeyScheduleTDES *skey
|
D | TpmToLtcDesSupport_fp.h | 53 symmetric_key *skey
|
/external/ltp/testcases/kernel/mem/hugetlb/hugeshmget/ |
D | hugeshmget02.c | 41 int *skey; member 61 if (*tcases[i].skey == -1) { in test_hugeshmget() 62 shm_id_2 = shmget(*(tcases[i].skey), 0, 0); in test_hugeshmget() 67 TEST(shmget(*(tcases[i].skey), tcases[i].size_coe * shm_size, in test_hugeshmget()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ltc/ |
D | TpmToLtcDesSupport.c | 56 symmetric_key *skey in TDES_setup() argument 72 des3_setup(kp, 24, 0, skey); in TDES_setup()
|
/external/igt-gpu-tools/scripts/ |
D | trace.pl | 1293 my $skey; 1297 $skey = 2 * $max_seqno * $ctx + 2 * $seqno; 1301 …print "\t{id: $i, key: $skey, $type group: $group, subgroup: $subgroup, subgroupOrder: $subgroup, … 1308 $skey = 2 * $max_seqno * $ctx + 2 * $seqno + 1; 1312 …print "\t{id: $i, key: $skey, $type group: $group, subgroup: $subgroup, subgroupOrder: $subgroup, … 1318 $skey = -2 * $max_seqno * $ctx - 2 * $seqno - 1; 1328 …print "\t{id: $i, key: $skey, $type group: $group, subgroup: $subgroup, subgroupOrder: $subgroup, … 1334 $skey = -2 * $max_seqno * $ctx - 2 * $seqno; 1342 …print "\t{id: $i, key: $skey, $type group: $group, subgroup: $subgroup, subgroupOrder: $subgroup, … 1388 my ($content, $style, $startend, $skey); [all …]
|
/external/python/cryptography/docs/development/custom-vectors/rsa-oaep-sha2/ |
D | generate_rsa_oaep_sha2.py | 29 skey = rsa.generate_private_key(65537, 2048, backend) 30 pn = skey.private_numbers() 56 pkey = skey.public_key()
|
/external/ltp/testcases/kernel/syscalls/ipc/shmget/ |
D | shmget02.c | 67 int *skey; member 110 TEST(shmget(*(TC[i].skey), TC[i].size, TC[i].flags)); in main()
|
/external/toybox/toys/pending/ |
D | ipcrm.c | 32 struct arg_list *skey; 84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
|
/external/python/pyopenssl/tests/ |
D | test_ssl.py | 279 skey = PKey() 280 skey.generate_key(TYPE_RSA, 2048) 285 scert.set_pubkey(skey) 294 return [(cakey, cacert), (ikey, icert), (skey, scert)] 1474 [(cakey, cacert), (ikey, icert), (skey, scert)] = chain 1486 for key, name in [(cakey, "ca.key"), (ikey, "i.key"), (skey, "s.key")]: 1492 serverContext.use_privatekey(skey) 1517 [(cakey, cacert), (ikey, icert), (skey, scert)] = chain 1536 serverContext.use_privatekey(skey) 2461 [(cakey, cacert), (ikey, icert), (skey, scert)] = chain [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 2012 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 2048 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2049 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2106 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
|
/external/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 2012 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 2048 if (skey && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2049 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2106 if (skey && md && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
|
/external/icu/icu4c/source/test/intltest/ |
D | loctest.cpp | 3995 const UnicodeString* skey; in TestCreateUnicodeKeywords() local 3998 skey = keys->snext(status); in TestCreateUnicodeKeywords() 4000 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords() 4001 if (skey != nullptr) { in TestCreateUnicodeKeywords() 4002 assertEquals("calendar", "ca", *skey); in TestCreateUnicodeKeywords() 4005 skey = keys->snext(status); in TestCreateUnicodeKeywords() 4007 assertTrue("skey != nullptr", skey != nullptr); in TestCreateUnicodeKeywords() 4008 if (skey != nullptr) { in TestCreateUnicodeKeywords() 4009 assertEquals("collation", "co", *skey); in TestCreateUnicodeKeywords() 4012 skey = keys->snext(status); in TestCreateUnicodeKeywords() [all …]
|
/external/f2fs-tools/tools/sg_write_buffer/ |
D | sg_pt_linux_nvme.c | 173 build_sense_buffer(bool desc, uint8_t *buf, uint8_t skey, uint8_t asc, in build_sense_buffer() argument 178 buf[1] = skey; in build_sense_buffer() 184 buf[2] = skey; in build_sense_buffer()
|
/external/flatbuffers/include/flatbuffers/ |
D | flexbuffers.h | 839 auto skey = reinterpret_cast<const char *>(key); in KeyCompare() local 840 return strcmp(skey, str_elem); in KeyCompare()
|
/external/toybox/android/linux/generated/ |
D | globals.h | 731 struct arg_list *skey; member
|