/external/erofs-utils/lib/ |
D | hashmap.c | 88 const void *keydata) in entry_equals() argument 90 return (e1 == e2) || (e1->hash == e2->hash && !map->cmpfn(e1, e2, keydata)); in entry_equals() 122 const void *keydata) in find_entry_ptr() argument 126 while (*e && !entry_equals(map, *e, key, keydata)) in find_entry_ptr() 168 void *hashmap_get(const struct hashmap *map, const void *key, const void *keydata) in hashmap_get() argument 170 return *find_entry_ptr(map, key, keydata); in hashmap_get() 197 void *hashmap_remove(struct hashmap *map, const void *key, const void *keydata) in hashmap_remove() argument 200 struct hashmap_entry **e = find_entry_ptr(map, key, keydata); in hashmap_remove() 257 const unsigned char *keydata) in pool_entry_cmp() argument 259 return e1->data != keydata && in pool_entry_cmp() [all …]
|
/external/erofs-utils/include/erofs/ |
D | hashmap.h | 47 const void *keydata); 75 void *hashmap_get(const struct hashmap *map, const void *key, const void *keydata); 79 void *hashmap_remove(struct hashmap *map, const void *key, const void *keydata); 83 const void *keydata) in hashmap_get_from_hash() argument 88 return hashmap_get(map, &key, keydata); in hashmap_get_from_hash()
|
/external/iw/ |
D | util.c | 533 char *keydata; in parse_keys() local 554 keydata = arg + pos; in parse_keys() 555 switch (strlen(keydata)) { in parse_keys() 557 keydata = hex2bin(keydata, keybuf); in parse_keys() 565 keydata = hex2bin(keydata, keybuf); in parse_keys() 576 if (!keydata) in parse_keys() 579 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata); in parse_keys()
|
/external/python/rsa/tests/ |
D | test_load_save_keys.py | 189 keydata = privatefile.read() 190 privkey = rsa.key.PrivateKey.load_pkcs1(keydata)
|
/external/oss-fuzz/projects/openvpn/ |
D | fuzz_crypto.c | 94 char *keydata = gb_get_random_string(); in LLVMFuzzerTestOneInput() local 95 read_key_file(&key2, keydata, RKF_INLINE); in LLVMFuzzerTestOneInput()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.c | 699 struct eap_key_data keydata; in eapol_sm_processKey() local 737 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); in eapol_sm_processKey() 745 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); in eapol_sm_processKey() 753 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey() 777 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey() 805 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, in eapol_sm_processKey() 824 os_memcpy(datakey, keydata.encr_key, key_len); in eapol_sm_processKey()
|
/external/python/rsa/rsa/ |
D | cli.py | 166 keydata = keyfile.read() 168 return self.key_class.load_pkcs1(keydata, keyform)
|
/external/python/rsa/doc/ |
D | usage.rst | 40 ... keydata = privatefile.read() 41 >>> privkey = rsa.PrivateKey.load_pkcs1(keydata)
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 1852 const u8 *keydata, in wpa_supplicant_process_1_of_2_rsn() argument 1862 keydata, keydatalen); in wpa_supplicant_process_1_of_2_rsn() 1863 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0) in wpa_supplicant_process_1_of_2_rsn()
|