/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | ikev2_common.c | 438 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 496 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload() 543 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload() 566 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload() 597 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument 607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted() [all …]
|
D | eap_fast_common.c | 105 struct tls_keys keys; in eap_fast_derive_key() local 123 if (tls_connection_get_keys(ssl_ctx, conn, &keys)) in eap_fast_derive_key() 126 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_fast_derive_key() 130 os_memcpy(rnd, keys.server_random, keys.server_random_len); in eap_fast_derive_key() 131 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_fast_derive_key() 132 keys.client_random_len); in eap_fast_derive_key() 135 "expansion", keys.master_key, keys.master_key_len); in eap_fast_derive_key() 136 if (tls_prf(keys.master_key, keys.master_key_len, in eap_fast_derive_key() 137 label, rnd, keys.client_random_len + in eap_fast_derive_key() 138 keys.server_random_len, out, block_size + len)) in eap_fast_derive_key()
|
D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 33 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat() 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 84 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv() 112 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
|
/external/v8/test/mjsunit/third_party/ |
D | object-keys.js | 34 assertThrows(function () { Object.keys(2) }, TypeError); 35 assertThrows(function () { Object.keys("foo") }, TypeError); 36 assertThrows(function () { Object.keys(null) }, TypeError); 37 assertThrows(function () { Object.keys(undefined) }, TypeError); 39 assertEquals(Object.keys({}), []); 40 assertEquals(Object.keys({a:null}), ['a']); 41 assertEquals(Object.keys({a:null, b:null}), ['a', 'b']); 42 assertEquals(Object.keys({b:null, a:null}), ['b', 'a']); 43 assertEquals(Object.keys([]), []); 44 assertEquals(Object.keys([null]), ['0']); [all …]
|
/external/dbus/dbus/ |
D | dbus-keyring.c | 118 DBusKey *keys; /**< Keys loaded from the file */ member 144 keyring->keys = NULL; in _dbus_keyring_new() 162 free_keys (DBusKey *keys, in free_keys() argument 172 _dbus_string_free (&keys[i].secret); in free_keys() 176 dbus_free (keys); in free_keys() 268 find_key_by_id (DBusKey *keys, in find_key_by_id() argument 277 if (keys[i].id == id) in find_key_by_id() 278 return &keys[i]; in find_key_by_id() 297 DBusKey *keys; in add_new_key() local 308 keys = *keys_p; in add_new_key() [all …]
|
D | dbus-hash.c | 1769 char **keys; in _dbus_hash_test() local 1772 keys = dbus_new (char *, N_HASH_KEYS); in _dbus_hash_test() 1773 if (keys == NULL) in _dbus_hash_test() 1778 keys[i] = dbus_malloc (128); in _dbus_hash_test() 1780 if (keys[i] == NULL) in _dbus_hash_test() 1794 len = sprintf (keys[i], "Hash key %d", i); in _dbus_hash_test() 1795 sprintf (keys[i] + len + 1, "Two string %d", i); in _dbus_hash_test() 1796 _dbus_assert (*(keys[i] + len) == '\0'); in _dbus_hash_test() 1797 _dbus_assert (*(keys[i] + len + 1) != '\0'); in _dbus_hash_test() 1832 key = _dbus_strdup (keys[i]); in _dbus_hash_test() [all …]
|
D | dbus-address.c | 47 DBusList *keys; /**< List of keys */ member 151 link = _dbus_list_get_first_link (&entry->keys); in dbus_address_entry_free() 157 link = _dbus_list_get_next_link (&entry->keys, link); in dbus_address_entry_free() 159 _dbus_list_clear (&entry->keys); in dbus_address_entry_free() 246 DBusList *values, *keys; in dbus_address_entry_get_value() local 248 keys = _dbus_list_get_first_link (&entry->keys); in dbus_address_entry_get_value() 251 while (keys != NULL) in dbus_address_entry_get_value() 255 if (_dbus_string_equal_c_str (keys->data, key)) in dbus_address_entry_get_value() 258 keys = _dbus_list_get_next_link (&entry->keys, keys); in dbus_address_entry_get_value() 498 if (!_dbus_list_append (&entry->keys, key)) in dbus_parse_address()
|
/external/dropbear/ |
D | packet.c | 102 blocksize = ses.keys->recv_algo_crypt->blocksize; in read_packet() 159 blocksize = ses.keys->recv_algo_crypt->blocksize; in read_packet_init() 160 macsize = ses.keys->recv_algo_mac->hashsize; in read_packet_init() 195 if (ses.keys->recv_algo_crypt->cipherdesc == NULL) { in read_packet_init() 205 &ses.keys->recv_symmetric_struct) != CRYPT_OK) { in read_packet_init() 235 blocksize = ses.keys->recv_algo_crypt->blocksize; in decrypt_packet() 236 macsize = ses.keys->recv_algo_mac->hashsize; in decrypt_packet() 248 if (ses.keys->recv_algo_crypt->cipherdesc == NULL) { in decrypt_packet() 259 &ses.keys->recv_symmetric_struct) != CRYPT_OK) { in decrypt_packet() 291 if (ses.keys->recv_algo_comp == DROPBEAR_COMP_ZLIB) { in decrypt_packet() [all …]
|
D | common-session.c | 88 ses.keys = (struct key_context*)m_malloc(sizeof(struct key_context)); in common_session_init() 90 ses.keys->recv_algo_crypt = &dropbear_nocipher; in common_session_init() 91 ses.keys->trans_algo_crypt = &dropbear_nocipher; in common_session_init() 93 ses.keys->recv_algo_mac = &dropbear_nohash; in common_session_init() 94 ses.keys->trans_algo_mac = &dropbear_nohash; in common_session_init() 96 ses.keys->algo_kex = -1; in common_session_init() 97 ses.keys->algo_hostkey = -1; in common_session_init() 98 ses.keys->recv_algo_comp = DROPBEAR_COMP_NONE; in common_session_init() 99 ses.keys->trans_algo_comp = DROPBEAR_COMP_NONE; in common_session_init() 102 ses.keys->recv_zstream = NULL; in common_session_init() [all …]
|
/external/icu4c/samples/legacy/ |
D | legacy.cpp | 25 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]); 26 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]); 49 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { in printKeys() 54 currentKey = keys[i]; in printKeys() 88 static uint8_t keys[4][32]; in main() local 96 test_current(uTest, 4, 5, keys); in main() 98 printKeys("Current keys", keys, 4); in main() 104 test_legacy(uTest, 4, 5, keys); in main() 106 printKeys("Legacy keys", keys, 4); in main()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_tls_common.c | 69 struct tls_keys keys; in eap_server_tls_derive_key() local 80 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_key() 83 if (keys.client_random == NULL || keys.server_random == NULL || in eap_server_tls_derive_key() 84 keys.master_key == NULL) in eap_server_tls_derive_key() 87 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_server_tls_derive_key() 90 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_server_tls_derive_key() 91 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_server_tls_derive_key() 92 keys.server_random_len); in eap_server_tls_derive_key() 94 if (tls_prf(keys.master_key, keys.master_key_len, in eap_server_tls_derive_key() 95 label, rnd, keys.client_random_len + in eap_server_tls_derive_key() [all …]
|
D | eap_ttls.c | 323 struct tls_keys keys; in eap_ttls_implicit_challenge() local 331 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_implicit_challenge() 332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_implicit_challenge() 333 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_implicit_challenge() 334 keys.inner_secret == NULL) { in eap_ttls_implicit_challenge() 341 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_implicit_challenge() 350 os_memcpy(rnd, keys.server_random, keys.server_random_len); in eap_ttls_implicit_challenge() 351 os_memcpy(rnd + keys.server_random_len, keys.client_random, in eap_ttls_implicit_challenge() 352 keys.client_random_len); in eap_ttls_implicit_challenge() 354 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_implicit_challenge() [all …]
|
/external/openssl/crypto/rc4/ |
D | rc4test.c | 75 static unsigned char keys[7][30]={ variable 125 RC4_set_key(&key,keys[i][0],&(keys[i][1])); in main() 148 RC4_set_key(&key,keys[3][0],&(keys[3][1])); in main() 175 RC4_set_key(&key,keys[3][0],&(keys[3][1])); in main() 207 RC4_set_key(&key,keys[0][0],&(keys[3][1])); in main()
|
/external/webkit/JavaScriptCore/ |
D | create_hash_table | 40 my @keys = (); 73 @keys = (); 85 push(@keys, $key); 134 for ($pefectHashSize = ceilingToPowerOf2(scalar @keys); ; $pefectHashSize += $pefectHashSize) { 136 foreach my $key (@keys) { 154 my $compactHashSize = ceilingToPowerOf2(2 * @keys); 160 foreach my $key (@keys) { 249 my $count = scalar @keys + 1; 252 foreach my $key (@keys) {
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
D | JDKPKCS12KeyStore.java | 83 private IgnoresCaseHashtable keys = new IgnoresCaseHashtable(); field in JDKPKCS12KeyStore 203 Enumeration e = certs.keys(); in engineAliases() 209 e = keys.keys(); in engineAliases() 219 return tab.keys(); in engineAliases() 225 return (certs.get(alias) != null || keys.get(alias) != null); in engineContainsAlias() 236 Key k = (Key)keys.remove(alias); in engineDeleteEntry() 303 Enumeration k = certs.keys(); in engineGetCertificateAlias() 317 k = keyCerts.keys(); in engineGetCertificateAlias() 390 Enumeration e = chainCerts.keys(); in engineGetCertificateChain() 443 if (keys.get(alias) == null && certs.get(alias) == null) { in engineGetCreationDate() [all …]
|
/external/wpa_supplicant/ |
D | eap_ttls.c | 376 struct tls_keys keys; in eap_ttls_v1_derive_key() local 382 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_v1_derive_key() 383 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_v1_derive_key() 384 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_v1_derive_key() 385 keys.inner_secret == NULL) { in eap_ttls_v1_derive_key() 392 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_v1_derive_key() 401 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_ttls_v1_derive_key() 402 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_ttls_v1_derive_key() 403 keys.server_random_len); in eap_ttls_v1_derive_key() 405 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_v1_derive_key() [all …]
|
D | eap_tls_common.c | 235 struct tls_keys keys; in eap_tls_derive_key() local 252 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) in eap_tls_derive_key() 255 if (keys.client_random == NULL || keys.server_random == NULL || in eap_tls_derive_key() 256 keys.master_key == NULL) in eap_tls_derive_key() 259 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_tls_derive_key() 262 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_tls_derive_key() 263 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_tls_derive_key() 264 keys.server_random_len); in eap_tls_derive_key() 266 if (tls_prf(keys.master_key, keys.master_key_len, in eap_tls_derive_key() 267 label, rnd, keys.client_random_len + in eap_tls_derive_key() [all …]
|
D | eapol_test.c | 568 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local 570 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 572 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys() 573 os_free(keys); in ieee802_1x_get_keys() 574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 578 if (keys) { in ieee802_1x_get_keys() 579 if (keys->send) { in ieee802_1x_get_keys() 581 keys->send, keys->send_len); in ieee802_1x_get_keys() 583 if (keys->recv) { in ieee802_1x_get_keys() 585 keys->recv, keys->recv_len); in ieee802_1x_get_keys() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | eapol_test.c | 623 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local 625 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 627 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys() 628 os_free(keys); in ieee802_1x_get_keys() 629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 633 if (keys) { in ieee802_1x_get_keys() 634 if (keys->send) { in ieee802_1x_get_keys() 636 keys->send, keys->send_len); in ieee802_1x_get_keys() 638 if (keys->recv) { in ieee802_1x_get_keys() 640 keys->recv, keys->recv_len); in ieee802_1x_get_keys() [all …]
|
/external/webkit/LayoutTests/storage/domstorage/localstorage/resources/ |
D | clearLocalStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 localStorage.removeItem(keys[key]);
|
/external/webkit/LayoutTests/storage/domstorage/sessionstorage/resources/ |
D | clearSessionStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 sessionStorage.removeItem(keys[key]);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_ttls.c | 305 struct tls_keys keys; in eap_ttls_v1_derive_key() local 311 os_memset(&keys, 0, sizeof(keys)); in eap_ttls_v1_derive_key() 312 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || in eap_ttls_v1_derive_key() 313 keys.client_random == NULL || keys.server_random == NULL || in eap_ttls_v1_derive_key() 314 keys.inner_secret == NULL) { in eap_ttls_v1_derive_key() 321 rnd = os_malloc(keys.client_random_len + keys.server_random_len); in eap_ttls_v1_derive_key() 330 os_memcpy(rnd, keys.client_random, keys.client_random_len); in eap_ttls_v1_derive_key() 331 os_memcpy(rnd + keys.client_random_len, keys.server_random, in eap_ttls_v1_derive_key() 332 keys.server_random_len); in eap_ttls_v1_derive_key() 334 if (tls_prf(keys.inner_secret, keys.inner_secret_len, in eap_ttls_v1_derive_key() [all …]
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 14 the keys. So, what all this means for the security administrator is 15 that the setup needs a pair of reasonably long keys for each host that 27 RSA keys for the host. There are only two parameters that you should 28 be concerned about: -b, which sets the number of bits for the keys, 31 seconds to generate keys that are 2048 bits long, and only slightly 32 longer to generate 4096-bit keys. Either key length should be 37 plainrsa-gen -b 2048 -f /var/tmp/boston.keys 40 includes both public and private keys. GUARD THIS FILE CAREFULLY, 50 Alternatively, you can also grab the first line of the boston.keys 66 your keys and place it in one directory and use the global directive [all …]
|
/external/iproute2/tc/ |
D | f_flow.c | 62 static int flow_parse_keys(__u32 *keys, __u32 *nkeys, char *argv) in flow_parse_keys() argument 67 *keys = 0; in flow_parse_keys() 77 *keys |= 1 << i; in flow_parse_keys() 97 static int get_addend(__u32 *addend, char *argv, __u32 keys) in get_addend() argument 111 if (keys & (FLOW_KEY_SRC | FLOW_KEY_DST | in get_addend() 139 __u32 keys = 0, nkeys = 0; in flow_parse_opt() local 162 if (flow_parse_keys(&keys, &nkeys, *argv)) in flow_parse_opt() 164 addattr32(n, 4096, TCA_FLOW_KEYS, keys); in flow_parse_opt() 195 if (get_addend(&tmp, *argv, keys)) { in flow_parse_opt()
|
/external/webkit/WebCore/css/ |
D | WebKitCSSKeyframeRule.cpp | 68 void WebKitCSSKeyframeRule::parseKeyString(const String& s, Vector<float>& keys) in parseKeyString() argument 70 keys.clear(); in parseKeyString() 90 keys.clear(); in parseKeyString() 94 keys.append(key); in parseKeyString()
|