/external/erofs-utils/lib/ |
D | hashmap.c | 88 const void *keydata) in entry_equals() argument 90 return (e1 == e2) || (e1->hash == e2->hash && !map->cmpfn(e1, e2, keydata)); in entry_equals() 122 const void *keydata) in find_entry_ptr() argument 126 while (*e && !entry_equals(map, *e, key, keydata)) in find_entry_ptr() 168 void *hashmap_get(const struct hashmap *map, const void *key, const void *keydata) in hashmap_get() argument 170 return *find_entry_ptr(map, key, keydata); in hashmap_get() 197 void *hashmap_remove(struct hashmap *map, const void *key, const void *keydata) in hashmap_remove() argument 200 struct hashmap_entry **e = find_entry_ptr(map, key, keydata); in hashmap_remove() 257 const unsigned char *keydata) in pool_entry_cmp() argument 259 return e1->data != keydata && in pool_entry_cmp() [all …]
|
/external/erofs-utils/include/erofs/ |
D | hashmap.h | 47 const void *keydata); 75 void *hashmap_get(const struct hashmap *map, const void *key, const void *keydata); 79 void *hashmap_remove(struct hashmap *map, const void *key, const void *keydata); 83 const void *keydata) in hashmap_get_from_hash() argument 88 return hashmap_get(map, &key, keydata); in hashmap_get_from_hash()
|
/external/iw/ |
D | util.c | 533 char *keydata; in parse_keys() local 554 keydata = arg + pos; in parse_keys() 555 switch (strlen(keydata)) { in parse_keys() 557 keydata = hex2bin(keydata, keybuf); in parse_keys() 565 keydata = hex2bin(keydata, keybuf); in parse_keys() 576 if (!keydata) in parse_keys() 579 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata); in parse_keys()
|
/external/python/rsa/tests/ |
D | test_load_save_keys.py | 189 keydata = privatefile.read() 190 privkey = rsa.key.PrivateKey.load_pkcs1(keydata)
|
/external/oss-fuzz/projects/openvpn/ |
D | fuzz_crypto.c | 94 char *keydata = gb_get_random_string(); in LLVMFuzzerTestOneInput() local 95 read_key_file(&key2, keydata, RKF_INLINE); in LLVMFuzzerTestOneInput()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.c | 699 struct eap_key_data keydata; in eapol_sm_processKey() local 737 res = eapol_sm_get_key(sm, (u8 *) &keydata, sizeof(keydata)); in eapol_sm_processKey() 745 res = eapol_sm_get_key(sm, (u8 *) &keydata, 16); in eapol_sm_processKey() 753 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey() 777 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey() 805 os_memcpy(ekey + IEEE8021X_KEY_IV_LEN, keydata.encr_key, in eapol_sm_processKey() 824 os_memcpy(datakey, keydata.encr_key, key_len); in eapol_sm_processKey()
|
/external/python/rsa/rsa/ |
D | cli.py | 166 keydata = keyfile.read() 168 return self.key_class.load_pkcs1(keydata, keyform)
|
/external/libese/ready_se/google/keymint/KM300/Applet/src/com/android/javacard/keymaster/ |
D | KMKeymintDataStore.java | 612 public void createRkpMacKey(byte[] keydata, short offset, short length) { in createRkpMacKey() argument 614 rkpMacKey = seProvider.createRkpMacKey(rkpMacKey, keydata, offset, length); in createRkpMacKey() 616 seProvider.createRkpMacKey(rkpMacKey, keydata, offset, length); in createRkpMacKey()
|
/external/libese/ready_se/google/keymint/KM200/Applet/src/com/android/javacard/keymaster/ |
D | KMKeymintDataStore.java | 628 public void createRkpMacKey(byte[] keydata, short offset, short length) { in createRkpMacKey() argument 630 rkpMacKey = seProvider.createRkpMacKey(rkpMacKey, keydata, offset, length); in createRkpMacKey() 632 seProvider.createRkpMacKey(rkpMacKey, keydata, offset, length); in createRkpMacKey()
|
/external/python/rsa/doc/ |
D | usage.rst | 40 ... keydata = privatefile.read() 41 >>> privkey = rsa.PrivateKey.load_pkcs1(keydata)
|