/external/boringssl/src/crypto/hmac/ |
D | hmac_tests.txt | 30 Input = "Sample message for keylen=blocklen" 35 Input = "Sample message for keylen<blocklen" 40 Input = "Sample message for keylen=blocklen" 45 Input = "Sample message for keylen=blocklen" 50 Input = "Sample message for keylen<blocklen" 55 Input = "Sample message for keylen=blocklen" 60 Input = "Sample message for keylen=blocklen" 65 Input = "Sample message for keylen<blocklen" 70 Input = "Sample message for keylen=blocklen" 75 Input = "Sample message for keylen=blocklen" [all …]
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 76 unsigned long *keylen in InternalTXTRecordSearch() argument 81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 279 unsigned long keylen; in TXTRecordContainsKey() local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 291 unsigned long keylen; in TXTRecordGetValuePtr() local 292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
D | dnsextd_parser.y | 483 mDNSs32 keylen; in ParseConfig() local 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig() 491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig() 517 mDNSs32 keylen; in ParseConfig() local 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig() 525 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 110 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 119 size_t origkeylen = keylen; in bcrypt_pbkdf() 124 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 125 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 129 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 130 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 138 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 161 amt = MIN(amt, keylen); in bcrypt_pbkdf() 168 keylen -= i; in bcrypt_pbkdf()
|
/external/e2fsprogs/lib/ext2fs/ |
D | tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument 210 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb() 216 key.dsize = keylen; in insert_tdb() 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument 229 if ((keyname == NULL) || (keylen == 0)) { in store_tdb() 240 key.dsize = keylen; in store_tdb() 252 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument 256 if ((keyname == NULL) || (keylen == 0)) { in show_tdb() 262 key.dsize = keylen; in show_tdb() 277 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument [all …]
|
/external/vboot_reference/tests/ |
D | vb2_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | run_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | gen_test_vbpubks.sh | 14 for keylen in ${key_lengths[@]} 19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
|
D | run_vbutil_tests.sh | 16 local keylen=$2 19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 43 for keylen in ${key_lengths[@]} 47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
|
D | gen_test_cases.sh | 20 for keylen in ${key_lengths[@]} 28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \ 29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 119 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local 173 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv() 175 keylen = -1; in PKCS5_pbe2_set_iv() 181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv() 224 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument 258 if(keylen > 0) in PKCS5_pbkdf2_set() 262 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 279 size_t keylen; in ieee802_1x_auth_get_msk() local 287 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 288 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 295 if (keylen > *len) in ieee802_1x_auth_get_msk() 296 keylen = *len; in ieee802_1x_auth_get_msk() 297 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 298 *len = keylen; in ieee802_1x_auth_get_msk()
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
D | fpdf_parser_encrypt.cpp | 17 FX_LPBYTE key, int keylen, FX_BOOL bIgnoreMeta, CPDF_Array* pIdArray) in CalcEncryptKey() argument 41 FX_DWORD copy_len = keylen; in CalcEncryptKey() 50 FXSYS_memset32(key, 0, keylen); in CalcEncryptKey() 106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen) in _LoadCryptInfo() argument 110 keylen = 0; in _LoadCryptInfo() 135 keylen = nKeyBits / 8; in _LoadCryptInfo() 142 keylen = Version > 1 ? pEncryptDict->GetInteger(FX_BSTRC("Length"), 40) / 8 : 5; in _LoadCryptInfo() 144 if (keylen > 32 || keylen < 0) { in _LoadCryptInfo() 192 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) in GetCryptInfo() argument 196 keylen = m_KeyLen; in GetCryptInfo() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
D | privsep.c | 469 int keylen; in privsep_init() local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { in privsep_init() 481 memcpy(&keylen, bufs[1], sizeof(keylen)); in privsep_init() 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); in privsep_init() 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 890 privsep_getpsk(str, keylen) in privsep_getpsk() argument 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); 918 msg->bufs.buflen[1] = sizeof(keylen); [all …]
|
/external/tcpdump/tests/ |
D | ikev2four.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
D | ikev2fourv4.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
D | ikev2fourv.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
/external/openssh/ |
D | cipher.c | 297 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, in cipher_init() argument 307 if (keylen > 8) in cipher_init() 308 keylen = 8; in cipher_init() 314 if (keylen < cipher->key_len || in cipher_init() 320 return chachapoly_init(&cc->cp_ctx, key, keylen); in cipher_init() 324 aesctr_keysetup(&cc->ac_ctx, key, 8 * keylen, 8 * ivlen); in cipher_init() 346 if (klen > 0 && keylen != (u_int)klen) { in cipher_init() 347 if (EVP_CIPHER_CTX_set_key_length(&cc->evp, keylen) == 0) { in cipher_init()
|
/external/boringssl/src/crypto/evp/ |
D | p_ec.c | 168 size_t *keylen) { in pkey_ec_derive() argument 184 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive() 192 outlen = *keylen; in pkey_ec_derive() 198 *keylen = ret; in pkey_ec_derive()
|
/external/pdfium/core/src/fdrm/crypto/ |
D | fx_crypt_aes.cpp | 878 const unsigned char *key, int keylen) in aes_setup() argument 882 ASSERT(keylen == 16 || keylen == 24 || keylen == 32); in aes_setup() 883 Nk = keylen / 4; in aes_setup() 992 void CRYPT_AESSetKey(FX_LPVOID context, FX_DWORD blocklen, FX_LPCBYTE key, FX_DWORD keylen, FX_BOOL… in CRYPT_AESSetKey() argument 994 aes_setup((AESContext*)context, blocklen, key, keylen); in CRYPT_AESSetKey()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 317 int keylen; in wpa_ft_install_ptk() local 330 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk() 333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk() 547 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 571 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem() 580 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 589 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem() 592 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem() 596 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 605 gtk_elem + 3, rsc_len, gtk, keylen) < 0) { in wpa_ft_process_gtk_subelem()
|
/external/wpa_supplicant_8/src/crypto/ |
D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 31 if (kpos >= keylen) in rc4_skip()
|
D | crypto_internal-cipher.c | 23 size_t keylen; member 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt() 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
|
/external/boringssl/src/include/openssl/ |
D | tls1.h | 325 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ argument 326 SSL_CTX_ctrl((ctx), SSL_CTRL_GET_TLSEXT_TICKET_KEYS, (keylen), (keys)) 327 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ argument 328 SSL_CTX_ctrl((ctx), SSL_CTRL_SET_TLSEXT_TICKET_KEYS, (keylen), (keys))
|