Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 401) sorted by relevance

12345678910>>...17

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Dikev2_common.c438 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument
447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
496 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument
507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload()
543 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload()
566 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload()
597 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument
607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted()
[all …]
Deap_fast_common.c105 struct tls_keys keys; in eap_fast_derive_key() local
123 if (tls_connection_get_keys(ssl_ctx, conn, &keys)) in eap_fast_derive_key()
126 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_fast_derive_key()
130 os_memcpy(rnd, keys.server_random, keys.server_random_len); in eap_fast_derive_key()
131 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_fast_derive_key()
132 keys.client_random_len); in eap_fast_derive_key()
135 "expansion", keys.master_key, keys.master_key_len); in eap_fast_derive_key()
136 if (tls_prf(keys.master_key, keys.master_key_len, in eap_fast_derive_key()
137 label, rnd, keys.client_random_len + in eap_fast_derive_key()
138 keys.server_random_len, out, block_size + len)) in eap_fast_derive_key()
Deap_ikev2_common.c24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
33 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat()
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
84 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument
91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv()
112 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
/external/v8/test/mjsunit/third_party/
Dobject-keys.js34 assertThrows(function () { Object.keys(2) }, TypeError);
35 assertThrows(function () { Object.keys("foo") }, TypeError);
36 assertThrows(function () { Object.keys(null) }, TypeError);
37 assertThrows(function () { Object.keys(undefined) }, TypeError);
39 assertEquals(Object.keys({}), []);
40 assertEquals(Object.keys({a:null}), ['a']);
41 assertEquals(Object.keys({a:null, b:null}), ['a', 'b']);
42 assertEquals(Object.keys({b:null, a:null}), ['b', 'a']);
43 assertEquals(Object.keys([]), []);
44 assertEquals(Object.keys([null]), ['0']);
[all …]
/external/dbus/dbus/
Ddbus-keyring.c118 DBusKey *keys; /**< Keys loaded from the file */ member
144 keyring->keys = NULL; in _dbus_keyring_new()
162 free_keys (DBusKey *keys, in free_keys() argument
172 _dbus_string_free (&keys[i].secret); in free_keys()
176 dbus_free (keys); in free_keys()
268 find_key_by_id (DBusKey *keys, in find_key_by_id() argument
277 if (keys[i].id == id) in find_key_by_id()
278 return &keys[i]; in find_key_by_id()
297 DBusKey *keys; in add_new_key() local
308 keys = *keys_p; in add_new_key()
[all …]
Ddbus-hash.c1769 char **keys; in _dbus_hash_test() local
1772 keys = dbus_new (char *, N_HASH_KEYS); in _dbus_hash_test()
1773 if (keys == NULL) in _dbus_hash_test()
1778 keys[i] = dbus_malloc (128); in _dbus_hash_test()
1780 if (keys[i] == NULL) in _dbus_hash_test()
1794 len = sprintf (keys[i], "Hash key %d", i); in _dbus_hash_test()
1795 sprintf (keys[i] + len + 1, "Two string %d", i); in _dbus_hash_test()
1796 _dbus_assert (*(keys[i] + len) == '\0'); in _dbus_hash_test()
1797 _dbus_assert (*(keys[i] + len + 1) != '\0'); in _dbus_hash_test()
1832 key = _dbus_strdup (keys[i]); in _dbus_hash_test()
[all …]
Ddbus-address.c47 DBusList *keys; /**< List of keys */ member
151 link = _dbus_list_get_first_link (&entry->keys); in dbus_address_entry_free()
157 link = _dbus_list_get_next_link (&entry->keys, link); in dbus_address_entry_free()
159 _dbus_list_clear (&entry->keys); in dbus_address_entry_free()
246 DBusList *values, *keys; in dbus_address_entry_get_value() local
248 keys = _dbus_list_get_first_link (&entry->keys); in dbus_address_entry_get_value()
251 while (keys != NULL) in dbus_address_entry_get_value()
255 if (_dbus_string_equal_c_str (keys->data, key)) in dbus_address_entry_get_value()
258 keys = _dbus_list_get_next_link (&entry->keys, keys); in dbus_address_entry_get_value()
498 if (!_dbus_list_append (&entry->keys, key)) in dbus_parse_address()
/external/dropbear/
Dpacket.c102 blocksize = ses.keys->recv_algo_crypt->blocksize; in read_packet()
159 blocksize = ses.keys->recv_algo_crypt->blocksize; in read_packet_init()
160 macsize = ses.keys->recv_algo_mac->hashsize; in read_packet_init()
195 if (ses.keys->recv_algo_crypt->cipherdesc == NULL) { in read_packet_init()
205 &ses.keys->recv_symmetric_struct) != CRYPT_OK) { in read_packet_init()
235 blocksize = ses.keys->recv_algo_crypt->blocksize; in decrypt_packet()
236 macsize = ses.keys->recv_algo_mac->hashsize; in decrypt_packet()
248 if (ses.keys->recv_algo_crypt->cipherdesc == NULL) { in decrypt_packet()
259 &ses.keys->recv_symmetric_struct) != CRYPT_OK) { in decrypt_packet()
291 if (ses.keys->recv_algo_comp == DROPBEAR_COMP_ZLIB) { in decrypt_packet()
[all …]
Dcommon-session.c88 ses.keys = (struct key_context*)m_malloc(sizeof(struct key_context)); in common_session_init()
90 ses.keys->recv_algo_crypt = &dropbear_nocipher; in common_session_init()
91 ses.keys->trans_algo_crypt = &dropbear_nocipher; in common_session_init()
93 ses.keys->recv_algo_mac = &dropbear_nohash; in common_session_init()
94 ses.keys->trans_algo_mac = &dropbear_nohash; in common_session_init()
96 ses.keys->algo_kex = -1; in common_session_init()
97 ses.keys->algo_hostkey = -1; in common_session_init()
98 ses.keys->recv_algo_comp = DROPBEAR_COMP_NONE; in common_session_init()
99 ses.keys->trans_algo_comp = DROPBEAR_COMP_NONE; in common_session_init()
102 ses.keys->recv_zstream = NULL; in common_session_init()
[all …]
/external/icu4c/samples/legacy/
Dlegacy.cpp25 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]);
26 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]);
49 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys()
54 currentKey = keys[i]; in printKeys()
88 static uint8_t keys[4][32]; in main() local
96 test_current(uTest, 4, 5, keys); in main()
98 printKeys("Current keys", keys, 4); in main()
104 test_legacy(uTest, 4, 5, keys); in main()
106 printKeys("Legacy keys", keys, 4); in main()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_tls_common.c69 struct tls_keys keys; in eap_server_tls_derive_key() local
80 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_key()
83 if (keys.client_random == NULL || keys.server_random == NULL || in eap_server_tls_derive_key()
84 keys.master_key == NULL) in eap_server_tls_derive_key()
87 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_server_tls_derive_key()
90 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_server_tls_derive_key()
91 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_server_tls_derive_key()
92 keys.server_random_len); in eap_server_tls_derive_key()
94 if (tls_prf(keys.master_key, keys.master_key_len, in eap_server_tls_derive_key()
95 label, rnd, keys.client_random_len + in eap_server_tls_derive_key()
[all …]
Deap_ttls.c323 struct tls_keys keys; in eap_ttls_implicit_challenge() local
331 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_implicit_challenge()
332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_implicit_challenge()
333 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_implicit_challenge()
334 keys.inner_secret == NULL) { in eap_ttls_implicit_challenge()
341 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_implicit_challenge()
350 os_memcpy(rnd, keys.server_random, keys.server_random_len); in eap_ttls_implicit_challenge()
351 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_ttls_implicit_challenge()
352 keys.client_random_len); in eap_ttls_implicit_challenge()
354 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_implicit_challenge()
[all …]
/external/openssl/crypto/rc4/
Drc4test.c75 static unsigned char keys[7][30]={ variable
125 RC4_set_key(&key,keys[i][0],&(keys[i][1])); in main()
148 RC4_set_key(&key,keys[3][0],&(keys[3][1])); in main()
175 RC4_set_key(&key,keys[3][0],&(keys[3][1])); in main()
207 RC4_set_key(&key,keys[0][0],&(keys[3][1])); in main()
/external/webkit/JavaScriptCore/
Dcreate_hash_table40 my @keys = ();
73 @keys = ();
85 push(@keys, $key);
134 for ($pefectHashSize = ceilingToPowerOf2(scalar @keys); ; $pefectHashSize += $pefectHashSize) {
136 foreach my $key (@keys) {
154 my $compactHashSize = ceilingToPowerOf2(2 * @keys);
160 foreach my $key (@keys) {
249 my $count = scalar @keys + 1;
252 foreach my $key (@keys) {
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
DJDKPKCS12KeyStore.java83 private IgnoresCaseHashtable keys = new IgnoresCaseHashtable(); field in JDKPKCS12KeyStore
203 Enumeration e = certs.keys(); in engineAliases()
209 e = keys.keys(); in engineAliases()
219 return tab.keys(); in engineAliases()
225 return (certs.get(alias) != null || keys.get(alias) != null); in engineContainsAlias()
236 Key k = (Key)keys.remove(alias); in engineDeleteEntry()
303 Enumeration k = certs.keys(); in engineGetCertificateAlias()
317 k = keyCerts.keys(); in engineGetCertificateAlias()
390 Enumeration e = chainCerts.keys(); in engineGetCertificateChain()
443 if (keys.get(alias) == null && certs.get(alias) == null) { in engineGetCreationDate()
[all …]
/external/wpa_supplicant/
Deap_ttls.c376 struct tls_keys keys; in eap_ttls_v1_derive_key() local
382 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_v1_derive_key()
383 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_v1_derive_key()
384 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_v1_derive_key()
385 keys.inner_secret == NULL) { in eap_ttls_v1_derive_key()
392 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_v1_derive_key()
401 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_ttls_v1_derive_key()
402 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_ttls_v1_derive_key()
403 keys.server_random_len); in eap_ttls_v1_derive_key()
405 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_v1_derive_key()
[all …]
Deap_tls_common.c235 struct tls_keys keys; in eap_tls_derive_key() local
252 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) in eap_tls_derive_key()
255 if (keys.client_random == NULL || keys.server_random == NULL || in eap_tls_derive_key()
256 keys.master_key == NULL) in eap_tls_derive_key()
259 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_tls_derive_key()
262 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_tls_derive_key()
263 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_tls_derive_key()
264 keys.server_random_len); in eap_tls_derive_key()
266 if (tls_prf(keys.master_key, keys.master_key_len, in eap_tls_derive_key()
267 label, rnd, keys.client_random_len + in eap_tls_derive_key()
[all …]
Deapol_test.c568 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local
570 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
572 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys()
573 os_free(keys); in ieee802_1x_get_keys()
574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
578 if (keys) { in ieee802_1x_get_keys()
579 if (keys->send) { in ieee802_1x_get_keys()
581 keys->send, keys->send_len); in ieee802_1x_get_keys()
583 if (keys->recv) { in ieee802_1x_get_keys()
585 keys->recv, keys->recv_len); in ieee802_1x_get_keys()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/
Deapol_test.c623 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local
625 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
627 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys()
628 os_free(keys); in ieee802_1x_get_keys()
629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
633 if (keys) { in ieee802_1x_get_keys()
634 if (keys->send) { in ieee802_1x_get_keys()
636 keys->send, keys->send_len); in ieee802_1x_get_keys()
638 if (keys->recv) { in ieee802_1x_get_keys()
640 keys->recv, keys->recv_len); in ieee802_1x_get_keys()
[all …]
/external/webkit/LayoutTests/storage/domstorage/localstorage/resources/
DclearLocalStorage.js3 var keys = new Array();
5 keys.push(key);
7 for (key in keys)
8 localStorage.removeItem(keys[key]);
/external/webkit/LayoutTests/storage/domstorage/sessionstorage/resources/
DclearSessionStorage.js3 var keys = new Array();
5 keys.push(key);
7 for (key in keys)
8 sessionStorage.removeItem(keys[key]);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_ttls.c305 struct tls_keys keys; in eap_ttls_v1_derive_key() local
311 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_v1_derive_key()
312 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_v1_derive_key()
313 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_v1_derive_key()
314 keys.inner_secret == NULL) { in eap_ttls_v1_derive_key()
321 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_v1_derive_key()
330 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_ttls_v1_derive_key()
331 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_ttls_v1_derive_key()
332 keys.server_random_len); in eap_ttls_v1_derive_key()
334 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_v1_derive_key()
[all …]
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa14 the keys. So, what all this means for the security administrator is
15 that the setup needs a pair of reasonably long keys for each host that
27 RSA keys for the host. There are only two parameters that you should
28 be concerned about: -b, which sets the number of bits for the keys,
31 seconds to generate keys that are 2048 bits long, and only slightly
32 longer to generate 4096-bit keys. Either key length should be
37 plainrsa-gen -b 2048 -f /var/tmp/boston.keys
40 includes both public and private keys. GUARD THIS FILE CAREFULLY,
50 Alternatively, you can also grab the first line of the boston.keys
66 your keys and place it in one directory and use the global directive
[all …]
/external/iproute2/tc/
Df_flow.c62 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) in flow_parse_keys() argument
67 *keys = 0; in flow_parse_keys()
77 *keys |= 1 << i; in flow_parse_keys()
97 static int get_addend(__u32 *addend, char *argv, __u32 keys) in get_addend() argument
111 if (keys & (FLOW_KEY_SRC | FLOW_KEY_DST | in get_addend()
139 __u32 keys = 0, nkeys = 0; in flow_parse_opt() local
162 if (flow_parse_keys(&keys, &nkeys, *argv)) in flow_parse_opt()
164 addattr32(n, 4096, TCA_FLOW_KEYS, keys); in flow_parse_opt()
195 if (get_addend(&tmp, *argv, keys)) { in flow_parse_opt()
/external/webkit/WebCore/css/
DWebKitCSSKeyframeRule.cpp68 void WebKitCSSKeyframeRule::parseKeyString(const String& s, Vector<float>& keys) in parseKeyString() argument
70 keys.clear(); in parseKeyString()
90 keys.clear(); in parseKeyString()
94 keys.append(key); in parseKeyString()

12345678910>>...17