/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_tests.txt | 27 Input = "Sample message for keylen=blocklen" 32 Input = "Sample message for keylen<blocklen" 37 Input = "Sample message for keylen=blocklen" 42 Input = "Sample message for keylen=blocklen" 47 Input = "Sample message for keylen<blocklen" 52 Input = "Sample message for keylen=blocklen" 57 Input = "Sample message for keylen=blocklen" 62 Input = "Sample message for keylen<blocklen" 67 Input = "Sample message for keylen=blocklen" 72 Input = "Sample message for keylen=blocklen" [all …]
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 76 unsigned long *keylen in InternalTXTRecordSearch() argument 81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 279 unsigned long keylen; in TXTRecordContainsKey() local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 291 unsigned long keylen; in TXTRecordGetValuePtr() local 292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 112 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 121 size_t origkeylen = keylen; in bcrypt_pbkdf() 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 131 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 132 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 140 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 163 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 170 keylen -= i; in bcrypt_pbkdf()
|
/external/e2fsprogs/lib/ext2fs/ |
D | tdbtool.c | 207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument 211 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb() 217 key.dsize = keylen; in insert_tdb() 226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument 230 if ((keyname == NULL) || (keylen == 0)) { in store_tdb() 241 key.dsize = keylen; in store_tdb() 253 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument 257 if ((keyname == NULL) || (keylen == 0)) { in show_tdb() 263 key.dsize = keylen; in show_tdb() 278 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument [all …]
|
/external/vboot_reference/tests/ |
D | vb2_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | run_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
D | gen_test_vbpubks.sh | 14 for keylen in ${key_lengths[@]} 19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
|
D | run_vbutil_tests.sh | 16 local keylen=$2 19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 43 for keylen in ${key_lengths[@]} 47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
|
D | gen_test_cases.sh | 20 for keylen in ${key_lengths[@]} 28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \ 29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
|
/external/syslinux/gpxe/src/net/80211/ |
D | wep.c | 79 int keylen; member 98 int keylen, const void *rsc __unused ) in wep_init() argument 102 ctx->keylen = ( keylen > WEP_MAX_KEY ? WEP_MAX_KEY : keylen ); in wep_init() 103 memcpy ( ctx->key + WEP_IV_LEN, key, ctx->keylen ); in wep_init() 144 ctx->keylen + WEP_IV_LEN ); in wep_encrypt() 192 ctx->keylen + WEP_IV_LEN ); in wep_decrypt()
|
/external/libdrm/intel/ |
D | uthash.h | 114 #define HASH_VALUE(keyptr,keylen,hashv) \ argument 116 HASH_FCN(keyptr, keylen, hashv); \ 119 #define HASH_FIND_BYHASHVALUE(hh,head,keyptr,keylen,hashval,out) \ argument 126 …HASH_FIND_IN_BKT((head)->hh.tbl, hh, (head)->hh.tbl->buckets[ _hf_bkt ], keyptr, keylen, hashval, … 131 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 134 HASH_VALUE(keyptr, keylen, _hf_hashv); \ 135 HASH_FIND_BYHASHVALUE(hh, head, keyptr, keylen, _hf_hashv, out); \ 238 (add)->hh.keylen = (unsigned) (keylen_in); \ 289 (add)->hh.keylen = (unsigned) (keylen_in); \ 477 #define HASH_BER(key,keylen,hashv) \ argument [all …]
|
/external/curl/lib/ |
D | hmac.c | 53 unsigned int keylen) in Curl_HMAC_init() argument 74 if(keylen > hashparams->hmac_maxkeylen) { in Curl_HMAC_init() 76 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); in Curl_HMAC_init() 80 keylen = hashparams->hmac_resultlen; in Curl_HMAC_init() 87 for(i = 0; i < keylen; i++) { in Curl_HMAC_init()
|
/external/pdfium/core/fpdfapi/parser/ |
D | cpdf_crypto_handler.cpp | 266 bool CPDF_CryptoHandler::Init(int cipher, const uint8_t* key, int keylen) { in Init() argument 268 switch (keylen) { in Init() 277 if (keylen != 32) { in Init() 281 if (keylen < 5 || keylen > 16) { in Init() 285 if (keylen > 32) { in Init() 286 keylen = 32; in Init() 290 m_KeyLen = keylen; in Init() 291 FXSYS_memcpy(m_EncryptKey, key, keylen); in Init()
|
D | cpdf_security_handler.cpp | 34 int keylen, in CalcEncryptKey() argument 60 uint32_t copy_len = keylen; in CalcEncryptKey() 69 FXSYS_memset(key, 0, keylen); in CalcEncryptKey() 122 int& keylen) { in LoadCryptInfo() argument 125 keylen = 0; in LoadCryptInfo() 150 keylen = nKeyBits / 8; in LoadCryptInfo() 157 keylen = Version > 1 ? pEncryptDict->GetIntegerFor("Length", 40) / 8 : 5; in LoadCryptInfo() 159 if (keylen > 32 || keylen < 0) { in LoadCryptInfo() 208 int& keylen) { in GetCryptInfo() argument 211 keylen = m_KeyLen; in GetCryptInfo()
|
/external/kmod/shared/ |
D | hash.c | 148 unsigned int keylen = strlen(key); in hash_add() local 149 unsigned int hashval = hash_superfast(key, keylen); in hash_add() 191 unsigned int keylen = strlen(key); in hash_add_unique() local 192 unsigned int hashval = hash_superfast(key, keylen); in hash_add_unique() 236 unsigned int keylen = strlen(key); in hash_find() local 237 unsigned int hashval = hash_superfast(key, keylen); in hash_find() 254 unsigned int keylen = strlen(key); in hash_del() local 255 unsigned int hashval = hash_superfast(key, keylen); in hash_del()
|
/external/syslinux/gpxe/src/include/gpxe/ |
D | cbc.h | 24 static inline int cbc_setkey ( void *ctx, const void *key, size_t keylen, in cbc_setkey() argument 28 return cipher_setkey ( raw_cipher, ctx, key, keylen ); in cbc_setkey() 68 size_t keylen ) { \ 70 return cbc_setkey ( &_cbc_name ## _ctx->raw_ctx, key, keylen, \
|
D | crypto.h | 62 int ( * setkey ) ( void *ctx, const void *key, size_t keylen ); 117 void *ctx, const void *key, size_t keylen ) { in cipher_setkey() argument 118 return cipher->setkey ( ctx, key, keylen ); in cipher_setkey()
|
/external/syslinux/gpxe/src/crypto/ |
D | arc4.c | 41 static int arc4_setkey ( void *ctxv, const void *keyv, size_t keylen ) in arc4_setkey() argument 53 j = ( j + S[i] + key[i % keylen] ) & 0xff; in arc4_setkey() 114 void arc4_skip ( const void *key, size_t keylen, size_t skip, in arc4_skip() argument 118 arc4_setkey ( &ctx, key, keylen ); in arc4_skip()
|
/external/ipsec-tools/src/racoon/ |
D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 289 size_t keylen; in ieee802_1x_auth_get_msk() local 297 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 298 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 305 if (keylen > *len) in ieee802_1x_auth_get_msk() 306 keylen = *len; in ieee802_1x_auth_get_msk() 307 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 308 *len = keylen; in ieee802_1x_auth_get_msk()
|
/external/tcpdump/tests/ |
D | ikev2four.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
D | ikev2fourv4.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
/external/boringssl/src/crypto/evp/ |
D | p_ec.c | 143 size_t *keylen) { in pkey_ec_derive() argument 159 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive() 167 outlen = *keylen; in pkey_ec_derive() 173 *keylen = ret; in pkey_ec_derive()
|
/external/llvm/test/Transforms/IndVarSimplify/ |
D | exit_value_test2.ll | 27 %keylen.010 = phi i32 [ %len, %while.body.lr.ph ], [ %sub, %while.body ] 38 %sub = add i32 %keylen.010, -12 47 %keylen.0.lcssa = phi i32 [ %sub.lcssa, %while.cond.while.end_crit_edge ], [ %len, %entry ] 48 call void @_Z3mixRjj(i32* dereferenceable(4) %a, i32 %keylen.0.lcssa)
|
/external/pdfium/core/fdrm/crypto/ |
D | fx_crypt_aes.cpp | 691 int keylen) { in aes_setup() argument 694 ASSERT(keylen == 16 || keylen == 24 || keylen == 32); in aes_setup() 695 Nk = keylen / 4; in aes_setup() 809 uint32_t keylen, in CRYPT_AESSetKey() argument 811 aes_setup((AESContext*)context, blocklen, key, keylen); in CRYPT_AESSetKey()
|