/external/boringssl/src/crypto/evp/ |
D | pbkdf.c | 67 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { in PKCS5_PBKDF2_HMAC() argument 100 OPENSSL_memcpy(out_key, digest_tmp, todo); in PKCS5_PBKDF2_HMAC() 109 out_key[k] ^= digest_tmp[k]; in PKCS5_PBKDF2_HMAC() 114 out_key += todo; in PKCS5_PBKDF2_HMAC() 143 uint8_t *out_key) { in PKCS5_PBKDF2_HMAC_SHA1() argument 145 EVP_sha1(), key_len, out_key); in PKCS5_PBKDF2_HMAC_SHA1()
|
D | scrypt.c | 148 uint64_t p, size_t max_mem, uint8_t *out_key, in EVP_PBE_scrypt() argument 200 EVP_sha256(), key_len, out_key)) { in EVP_PBE_scrypt()
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 100 OPENSSL_memcpy(out_key + done, previous, todo); in HKDF_expand()
|
/external/boringssl/src/include/openssl/ |
D | hkdf.h | 35 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 44 OPENSSL_EXPORT int HKDF_extract(uint8_t *out_key, size_t *out_len, 52 OPENSSL_EXPORT int HKDF_expand(uint8_t *out_key, size_t out_len,
|
D | ec_key.h | 282 OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp, 301 OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, 318 OPENSSL_EXPORT EC_KEY *o2i_ECPublicKey(EC_KEY **out_key, const uint8_t **inp,
|
D | evp.h | 422 size_t key_len, uint8_t *out_key); 430 uint8_t *out_key); 443 size_t max_mem, uint8_t *out_key,
|
D | curve25519.h | 179 OPENSSL_EXPORT int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key,
|
D | pkcs8.h | 125 OPENSSL_EXPORT int PKCS12_get_key_and_certs(EVP_PKEY **out_key,
|
D | ssl.h | 3796 OPENSSL_EXPORT int *SSL_get_server_tmp_key(SSL *ssl, EVP_PKEY **out_key);
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 230 EVP_PKEY **out_key; member 314 if (*ctx->out_key) { in PKCS12_handle_safe_bag() 331 *ctx->out_key = pkey; in PKCS12_handle_safe_bag() 470 int PKCS12_get_key_and_certs(EVP_PKEY **out_key, STACK_OF(X509) *out_certs, in PKCS12_get_key_and_certs() argument 491 *out_key = NULL; in PKCS12_get_key_and_certs() 544 ctx.out_key = out_key; in PKCS12_get_key_and_certs() 608 EVP_PKEY_free(*out_key); in PKCS12_get_key_and_certs() 609 *out_key = NULL; in PKCS12_get_key_and_certs()
|
/external/boringssl/src/crypto/ec_extra/ |
D | ec_asn1.c | 458 EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp, long len) { in d2i_ECParameters() argument 478 if (out_key != NULL) { in d2i_ECParameters() 479 EC_KEY_free(*out_key); in d2i_ECParameters() 480 *out_key = ret; in d2i_ECParameters()
|
/external/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 475 int SPAKE2_process_msg(SPAKE2_CTX *ctx, uint8_t *out_key, size_t *out_key_len, in SPAKE2_process_msg() argument 534 OPENSSL_memcpy(out_key, key, to_copy); in SPAKE2_process_msg()
|
/external/protobuf/ruby/ext/google/protobuf_c/ |
D | map.c | 68 const char** out_key, in table_key() argument 76 *out_key = RSTRING_PTR(key); in table_key() 86 *out_key = buf; in table_key()
|
/external/toolchain-utils/cros_utils/ |
D | perf_diff.py | 32 out_key = '%s' % (function.name) 33 output[k][out_key] = function.count
|
/external/boringssl/src/crypto/fipsmodule/modes/ |
D | internal.h | 188 u128 *out_key, u128 out_table[16], int *out_is_avx,
|
D | gcm.c | 348 u128 *out_key, u128 out_table[16], in CRYPTO_ghash_init() argument 364 OPENSSL_memcpy(out_key, H.c, 16); in CRYPTO_ghash_init()
|
/external/boringssl/src/ssl/ |
D | ssl_lib.cc | 2211 int *SSL_get_server_tmp_key(SSL *ssl, EVP_PKEY **out_key) { return 0; } in SSL_get_server_tmp_key() argument
|