/external/boringssl/src/crypto/pem/ |
D | pem_pk8.c | 70 char *kstr, int klen, pem_password_cb *cb, void *u); 73 char *kstr, int klen, pem_password_cb *cb, void *u); 83 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey_nid() argument 86 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey_nid() 90 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey() argument 93 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey() 97 char *kstr, int klen, in i2d_PKCS8PrivateKey_bio() argument 100 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_bio() 104 char *kstr, int klen, in i2d_PKCS8PrivateKey_nid_bio() argument 107 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_nid_bio() [all …]
|
D | pem_pkey.c | 100 int klen; in PEM_read_bio_PrivateKey() local 106 klen = 0; in PEM_read_bio_PrivateKey() 109 klen = cb(psbuf, PEM_BUFSIZE, 0, u); in PEM_read_bio_PrivateKey() 110 if (klen <= 0) { in PEM_read_bio_PrivateKey() 115 p8inf = PKCS8_decrypt(p8, psbuf, klen); in PEM_read_bio_PrivateKey() 117 OPENSSL_cleanse(psbuf, klen); in PEM_read_bio_PrivateKey() 148 unsigned char *kstr, int klen, in PEM_write_bio_PrivateKey() argument 151 return PEM_write_bio_PKCS8PrivateKey(bp, x, enc, (char *)kstr, klen, cb, u); in PEM_write_bio_PrivateKey() 169 unsigned char *kstr, int klen, in PEM_write_PrivateKey() argument 177 int ret = PEM_write_bio_PrivateKey(b, x, enc, kstr, klen, cb, u); in PEM_write_PrivateKey()
|
D | pem_lib.c | 258 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write() argument 265 int ret = PEM_ASN1_write_bio(i2d, name, b, x, enc, kstr, klen, callback, u); in PEM_ASN1_write() 273 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write_bio() argument 312 klen = 0; in PEM_ASN1_write_bio() 315 klen = (*callback) (buf, PEM_BUFSIZE, 1, u); in PEM_ASN1_write_bio() 316 if (klen <= 0) { in PEM_ASN1_write_bio() 329 if (!EVP_BytesToKey(enc, EVP_md5(), iv, kstr, klen, 1, key, NULL)) in PEM_ASN1_write_bio() 372 int i = 0, j, o, klen; in PEM_do_header() local 383 klen = 0; in PEM_do_header() 386 klen = callback(buf, PEM_BUFSIZE, 0, u); in PEM_do_header() [all …]
|
D | pem_info.c | 279 unsigned char *kstr, int klen, in PEM_X509_INFO_write_bio() argument 341 enc, kstr, klen, cb, u) <= 0) in PEM_X509_INFO_write_bio()
|
/external/llvm/test/Transforms/IndVarSimplify/ |
D | exit_value_test3.ll | 16 %klen.0 = phi i32 [ %len, %entry ], [ %sub, %while.cond ] 17 %cmp = icmp ugt i32 %klen.0, 11 18 %sub = add i32 %klen.0, -12 22 %klen.0.lcssa = phi i32 [ %klen.0, %while.cond ] 23 ret i32 %klen.0.lcssa
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/IndVarSimplify/ |
D | exit_value_test3.ll | 16 %klen.0 = phi i32 [ %len, %entry ], [ %sub, %while.cond ] 17 %cmp = icmp ugt i32 %klen.0, 11 18 %sub = add i32 %klen.0, -12 22 %klen.0.lcssa = phi i32 [ %klen.0, %while.cond ] 23 ret i32 %klen.0.lcssa
|
/external/boringssl/src/include/openssl/ |
D | pem.h | 160 FILE *fp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \ 162 return PEM_ASN1_write(pem_write_##name##_i2d, str, fp, x, enc, kstr, klen, \ 171 FILE *fp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \ 173 return PEM_ASN1_write(pem_write_##name##_i2d, str, fp, x, enc, kstr, klen, \ 213 BIO *bp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \ 216 kstr, klen, cb, u); \ 224 BIO *bp, type *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, \ 227 enc, kstr, klen, cb, u); \ 283 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); 298 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); [all …]
|
/external/openssh/ |
D | kexecdhs.c | 75 size_t klen = 0, hashlen; in input_kex_ecdh_init() local 125 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_init() 126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init() 131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init() 132 server_key, NULL) != (int)klen || in input_kex_ecdh_init() 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init() 139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init() 198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init()
|
D | kexecdhc.c | 111 size_t klen = 0, hashlen; in input_kex_ecdh_reply() local 159 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_reply() 160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply() 165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply() 166 client_key, NULL) != (int)klen || in input_kex_ecdh_reply() 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply() 173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply() 217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply()
|
D | hmac.c | 64 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) in ssh_hmac_init() argument 71 if (klen <= ctx->buf_len) in ssh_hmac_init() 72 memcpy(ctx->buf, key, klen); in ssh_hmac_init() 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) in hmac_test() argument 149 if (ssh_hmac_init(ctx, key, klen) < 0 || in hmac_test()
|
D | kexdhs.c | 103 size_t klen = 0, hashlen; in input_kex_dh_init() local 148 klen = DH_size(kex->dh); in input_kex_dh_init() 149 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init() 215 explicit_bzero(kbuf, klen); in input_kex_dh_init()
|
D | kexdhc.c | 111 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh() local 156 klen = DH_size(kex->dh); in input_kex_dh() 157 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh() 210 explicit_bzero(kbuf, klen); in input_kex_dh()
|
D | kexgexs.c | 132 size_t klen = 0, hashlen; in input_kex_dh_gex_init() local 177 klen = DH_size(kex->dh); in input_kex_dh_gex_init() 178 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init() 245 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init()
|
D | kexgexc.c | 154 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh_gex_reply() local 204 klen = DH_size(kex->dh); in input_kex_dh_gex_reply() 205 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply() 262 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply()
|
D | cipher.c | 333 int klen; in cipher_init() local 390 klen = EVP_CIPHER_CTX_key_length(cc->evp); in cipher_init() 391 if (klen > 0 && keylen != (u_int)klen) { in cipher_init()
|
D | hmac.h | 29 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
|
/external/bcc/examples/lua/ |
D | uprobe-tailkt.lua | 29 local writeable, watch_key, klen = 'any', arg[2] or '*', 80 36 if watch_key ~= '*' then klen = #watch_key end 41 local key_type = string.format('char [%d]', klen) 52 if ptregs.parm3 ~= klen then return false end
|
/external/curl/tests/unit/ |
D | unit1602.c | 54 size_t klen = sizeof(int); variable 63 nodep = Curl_hash_add(&hash_static, &key, klen, value); 73 nodep = Curl_hash_add(&hash_static, &key2, klen, value2);
|
/external/jemalloc_new/src/ |
D | jemalloc.c | 848 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument 850 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error() 876 size_t klen, vlen; local 958 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v, 961 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) 973 k, klen, v, vlen); \ 992 k, klen, v, vlen); \ 1012 k, klen, v, vlen); \ 1037 k, klen, v, vlen); \ 1042 k, klen, v, vlen); \ [all …]
|
/external/jemalloc/src/ |
D | jemalloc.c | 912 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument 916 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error() 946 size_t klen, vlen; local 1043 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v, 1046 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) 1058 k, klen, v, vlen); \ 1078 k, klen, v, vlen); \ 1096 k, klen, v, vlen); \ 1120 k, klen, v, vlen); \ 1125 k, klen, v, vlen); \ [all …]
|
/external/curl/lib/vtls/ |
D | openssl.c | 429 int klen = curlx_uztosi(strlen((char *)global_passwd)); in passwd_callback() local 430 if(num > klen) { in passwd_callback() 431 memcpy(buf, global_passwd, klen + 1); in passwd_callback() 432 return klen; in passwd_callback()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 2680 int klen; in fils_set_tk() local 2692 klen = wpa_cipher_key_len(sm->pairwise); in fils_set_tk() 2696 sm->PTK.tk, klen)) { in fils_set_tk() 3286 int klen = wpa_cipher_key_len(sm->pairwise); in SM_STATE() local 3288 sm->PTK.tk, klen)) { in SM_STATE()
|
/external/scapy/scapy/layers/tls/ |
D | keyexchange.py | 391 StrLenField("k", "", length_from = lambda pkt: pkt.klen) ]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 832 int klen; in wpa_supplicant_check_group_cipher() local 843 klen = wpa_cipher_key_len(group_cipher); in wpa_supplicant_check_group_cipher() 844 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher()
|
/external/icu/icu4c/source/test/cintltst/ |
D | cmsccoll.c | 1696 uint32_t klen = 0; in TestBocsuCoverage() local 1702 klen = ucol_getSortKey(coll, test, tlen, key, 256); in TestBocsuCoverage() 1703 (void)klen; /* Suppress set but not used warning. */ in TestBocsuCoverage()
|