/external/vboot_reference/tests/ |
D | rsa_utility_tests.c | 133 uint8_t keybuf[8 + 2 * RSA1024NUMBYTES]; in TestVerifyBinary() local 134 uint32_t* keybuf_len = (uint32_t*)keybuf; in TestVerifyBinary() 145 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 0), in TestVerifyBinary() 158 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 3), in TestVerifyBinary() 171 uint8_t keybuf[8 + 2 * RSA1024NUMBYTES]; in TestVerifyBinaryWithDigest() local 172 uint32_t* keybuf_len = (uint32_t*)keybuf; in TestVerifyBinaryWithDigest() 183 TEST_EQ(RSAVerifyBinaryWithDigest_f(keybuf, NULL, digest, sig, 0), in TestVerifyBinaryWithDigest() 196 TEST_EQ(RSAVerifyBinaryWithDigest_f(keybuf, NULL, digest, sig, 3), in TestVerifyBinaryWithDigest()
|
/external/protobuf/ruby/ext/google/protobuf_c/ |
D | map.c | 356 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index() local 360 table_key(self, key, keybuf, &keyval, &length); in Map_index() 381 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index_set() local 386 table_key(self, key, keybuf, &keyval, &length); in Map_index_set() 411 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_has_key() local 414 table_key(self, key, keybuf, &keyval, &length); in Map_has_key() 433 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_delete() local 437 table_key(self, key, keybuf, &keyval, &length); in Map_delete()
|
/external/syslinux/com32/cmenu/libmenu/ |
D | des.c | 952 my_u_int32_t count, salt, l, r0, r1, keybuf[2]; in crypt() local 962 q = (my_u_char_t *) keybuf; in crypt() 963 while (q - (my_u_char_t *) keybuf - 8) { in crypt() 968 if (des_setkey((char *)keybuf)) in crypt() 989 if (des_cipher((char *)keybuf, (char *)keybuf, 0L, 1)) in crypt() 994 q = (my_u_char_t *) keybuf; in crypt() 995 while (q - (my_u_char_t *) keybuf - 8 && *key) in crypt() 998 if (des_setkey((char *)keybuf)) in crypt()
|
/external/sqlite/android/ |
D | sqlite3_android.cpp | 368 char keybuf[1024]; 369 uint32_t result = ucol_getSortKey(collator, token, -1, (uint8_t*)keybuf, sizeof(keybuf)-1); 370 if (result > sizeof(keybuf)) { 378 base16Encode(base16buf, keybuf, keysize);
|
/external/fio/os/ |
D | os-android.h | 101 char keybuf[11]; in shmget() local 107 sprintf(keybuf,"%d",__key); in shmget() 108 ret = ioctl(fd, ASHMEM_SET_NAME, keybuf); in shmget()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|
/external/clang/test/Rewriter/ |
D | rewrite-modern-block.mm | 40 int rdar7547630(const char *keybuf, const char *valuebuf) { 45 __block const char *keys = keybuf, *values = valuebuf, *novalues;
|
/external/toybox/toys/other/ |
D | hexedit.c | 123 char keybuf[16]; in hexedit_main() local 125 *keybuf = 0; in hexedit_main() 186 key = scan_key(keybuf, -1); in hexedit_main()
|
/external/openssh/ |
D | authfile.c | 57 sshkey_save_private_blob(struct sshbuf *keybuf, const char *filename) in sshkey_save_private_blob() argument 63 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(keybuf), in sshkey_save_private_blob() 64 sshbuf_len(keybuf)) != sshbuf_len(keybuf)) { in sshkey_save_private_blob()
|
/external/iw/ |
D | util.c | 380 char keybuf[13]; in parse_keys() local 416 keydata = hex2bin(keydata, keybuf); in parse_keys() 422 keydata = hex2bin(keydata, keybuf); in parse_keys()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 437 u8 keybuf[32]; in wpa_ft_gtk_subelem() local 440 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem() 452 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem() 453 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem() 454 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem() 455 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem() 457 key = keybuf; in wpa_ft_gtk_subelem()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1324 mDNSu8 keybuf[1024]; in DNSDigest_ConstructHMACKeyfromBase64() local 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); in DNSDigest_ConstructHMACKeyfromBase64() 1327 DNSDigest_ConstructHMACKey(info, keybuf, (mDNSu32)keylen); in DNSDigest_ConstructHMACKeyfromBase64()
|
/external/pdfium/core/fpdfapi/parser/ |
D | cpdf_security_handler.cpp | 404 uint8_t keybuf[32]; in CheckPassword() local 406 key = keybuf; in CheckPassword()
|
/external/python/cpython2/Mac/Modules/ctl/ |
D | _Ctlmodule.c | 5604 char keybuf[9]; in setcallback() local 5630 sprintf(keybuf, "%x", (unsigned)which); in setcallback() 5631 if (PyDict_SetItemString(self->ob_callbackdict, keybuf, callback) < 0) in setcallback() 5639 char keybuf[9]; in callcallback() local 5642 sprintf(keybuf, "%x", (unsigned)which); in callcallback() 5644 (func = PyDict_GetItemString(self->ob_callbackdict, keybuf)) == NULL ) { in callcallback()
|