/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
D | sctp_auth.c | 247 sctp_alloc_key(uint32_t keylen) in sctp_alloc_key() argument 251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, in sctp_alloc_key() 257 new_key->keylen = keylen; in sctp_alloc_key() 277 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_print_key() 278 if (key->keylen) { in sctp_print_key() 279 for (i = 0; i < key->keylen; i++) in sctp_print_key() 296 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_show_key() 297 if (key->keylen) { in sctp_show_key() 298 for (i = 0; i < key->keylen; i++) in sctp_show_key() 310 return (key->keylen); in sctp_get_keylen() [all …]
|
D | sctp_auth.h | 61 uint32_t keylen; member 127 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 131 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 132 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 169 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 171 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 178 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
/external/openssl/crypto/cms/ |
D | cms_enc.c | 160 ec->keylen = tkeylen; in DECLARE_ASN1_ITEM() 169 if (ec->keylen != tkeylen) in DECLARE_ASN1_ITEM() 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) in DECLARE_ASN1_ITEM() 186 OPENSSL_cleanse(ec->key, ec->keylen); in DECLARE_ASN1_ITEM() 189 ec->keylen = tkeylen; in DECLARE_ASN1_ITEM() 224 OPENSSL_cleanse(ec->key, ec->keylen); in DECLARE_ASN1_ITEM() 241 const unsigned char *key, size_t keylen) in cms_EncryptedContent_init() argument 246 ec->key = OPENSSL_malloc(keylen); in cms_EncryptedContent_init() 249 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init() 251 ec->keylen = keylen; in cms_EncryptedContent_init() [all …]
|
D | cms_env.c | 336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 425 OPENSSL_cleanse(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt() 430 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt() 482 unsigned char *key, size_t keylen, in CMS_add0_recipient_key() argument 497 switch (keylen) in CMS_add0_recipient_key() 530 if (keylen != exp_keylen) in CMS_add0_recipient_key() 567 kekri->keylen = keylen; in CMS_add0_recipient_key() 631 unsigned char *key, size_t keylen) in CMS_RecipientInfo_set0_key() argument 642 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key() [all …]
|
D | cms_pwri.c | 335 size_t keylen; in cms_RecipientInfo_pwri_crypt() local 406 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) in cms_RecipientInfo_pwri_crypt() 409 key = OPENSSL_malloc(keylen); in cms_RecipientInfo_pwri_crypt() 414 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) in cms_RecipientInfo_pwri_crypt() 417 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt() 429 if (!kek_unwrap_key(key, &keylen, in cms_RecipientInfo_pwri_crypt() 439 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
|
/external/mdnsresponder/mDNSShared/ |
D | dnssd_clientlib.c | 76 unsigned long *keylen in InternalTXTRecordSearch() argument 81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 279 unsigned long keylen; in TXTRecordContainsKey() local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 291 unsigned long keylen; in TXTRecordGetValuePtr() local 292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
D | dnsextd_parser.y | 483 mDNSs32 keylen; in ParseConfig() local 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig() 491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig() 517 mDNSs32 keylen; in ParseConfig() local 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig() 525 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
|
/external/chromium_org/third_party/smhasher/src/ |
D | KeysetTest.cpp | 230 for(int keylen = 2; keylen <= maxlen; keylen++) in TwoBytesKeygen() local 231 for(int byteA = 0; byteA < keylen; byteA++) in TwoBytesKeygen() 237 c(key,keylen); in TwoBytesKeygen() 246 for(int keylen = 2; keylen <= maxlen; keylen++) in TwoBytesKeygen() local 247 for(int byteA = 0; byteA < keylen-1; byteA++) in TwoBytesKeygen() 248 for(int byteB = byteA+1; byteB < keylen; byteB++) in TwoBytesKeygen() 257 c(key,keylen); in TwoBytesKeygen()
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 83 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC() argument 96 tkeylen = keylen; in PKCS5_PBKDF2_HMAC() 164 h__dump (out, keylen); in PKCS5_PBKDF2_HMAC() 171 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 174 keylen, out); in PKCS5_PBKDF2_HMAC_SHA1() 260 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen() local 270 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen() 271 OPENSSL_assert(keylen <= sizeof key); in PKCS5_v2_PBKDF2_keyivgen() 289 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen() 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen() [all …]
|
D | e_aes.c | 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 417 static const EVP_CIPHER aesni_##keylen##_##mode = { \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 425 static const EVP_CIPHER aes_##keylen##_##mode = { \ 426 nid##_##keylen##_##nmode,blocksize, \ 427 keylen/8,ivlen, \ 434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ 435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; } 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ argument 438 static const EVP_CIPHER aesni_##keylen##_##mode = { \ [all …]
|
/external/e2fsprogs/lib/ext2fs/ |
D | tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument 210 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb() 216 key.dsize = keylen; in insert_tdb() 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument 229 if ((keyname == NULL) || (keylen == 0)) { in store_tdb() 240 key.dsize = keylen; in store_tdb() 252 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument 256 if ((keyname == NULL) || (keylen == 0)) { in show_tdb() 262 key.dsize = keylen; in show_tdb() 277 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument [all …]
|
/external/openssl/crypto/asn1/ |
D | p5_pbev2.c | 94 int alg_nid, keylen; variable 150 keylen = EVP_CIPHER_key_length(cipher); 152 keylen = -1; 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 201 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument 235 if(keylen > 0) in PKCS5_pbkdf2_set() 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|
/external/openssl/crypto/aes/ |
D | aes_wrap.c | 146 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument 151 otmp = OPENSSL_malloc(keylen + 8); in AES_wrap_unwrap_test() 152 ptmp = OPENSSL_malloc(keylen); in AES_wrap_unwrap_test() 157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test() 161 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test() 168 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 118 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local 172 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv() 174 keylen = -1; in PKCS5_pbe2_set_iv() 180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv() 223 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument 257 if(keylen > 0) in PKCS5_pbkdf2_set() 261 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
D | p_ec.c | 207 size_t *keylen) { in pkey_ec_derive() argument 224 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive() 232 outlen = *keylen; in pkey_ec_derive() 238 *keylen = ret; in pkey_ec_derive() 243 size_t *keylen) { in pkey_ec_kdf_derive() argument 250 return pkey_ec_derive(ctx, key, keylen); in pkey_ec_kdf_derive() 253 *keylen = dctx->kdf_outlen; in pkey_ec_kdf_derive() 256 if (*keylen != dctx->kdf_outlen || in pkey_ec_kdf_derive() 268 if (!ECDH_KDF_X9_62(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm, in pkey_ec_kdf_derive()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 279 size_t keylen; in ieee802_1x_auth_get_msk() local 287 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 288 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 295 if (keylen > *len) in ieee802_1x_auth_get_msk() 296 keylen = *len; in ieee802_1x_auth_get_msk() 297 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 298 *len = keylen; in ieee802_1x_auth_get_msk()
|
/external/ipsec-tools/src/racoon/ |
D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
D | fpdf_parser_encrypt.cpp | 17 FX_LPBYTE key, int keylen, FX_BOOL bIgnoreMeta, CPDF_Array* pIdArray) in CalcEncryptKey() argument 41 FX_DWORD copy_len = keylen; in CalcEncryptKey() 50 FXSYS_memset32(key, 0, keylen); in CalcEncryptKey() 106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen) in _LoadCryptInfo() argument 111 keylen = 0; in _LoadCryptInfo() 136 keylen = nKeyBits / 8; in _LoadCryptInfo() 143 keylen = Version > 1 ? pEncryptDict->GetInteger(FX_BSTRC("Length"), 40) / 8 : 5; in _LoadCryptInfo() 145 if (keylen > 32 || keylen < 0) { in _LoadCryptInfo() 193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) in GetCryptInfo() argument 197 keylen = m_KeyLen; in GetCryptInfo() [all …]
|
/external/tcpdump/tests/ |
D | ikev2four.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
D | ikev2fourv.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
D | ikev2fourv4.out | 5 (t: #1 type=encr id=aes (type=keylen value=0080)) 6 (t: #2 type=encr id=aes (type=keylen value=0100)) 7 (t: #3 type=encr id=aes (type=keylen value=00c0)) 29 (t: #1 type=encr id=aes (type=keylen value=0080)) 30 (t: #2 type=encr id=aes (type=keylen value=0100)) 31 (t: #3 type=encr id=aes (type=keylen value=00c0)) 49 (t: #1 type=encr id=aes (type=keylen value=0080))
|
/external/openssl/crypto/cmac/ |
D | cm_pmeth.c | 180 long keylen; in pkey_cmac_ctrl_str() local 181 key = string_to_hex(value, &keylen); in pkey_cmac_ctrl_str() 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key); in pkey_cmac_ctrl_str()
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
D | linux_netlink.c | 182 size_t keylen = strlen(key); in netlink_message_parse() local 186 if (0 == strncmp(buffer + offset, key, keylen) && in netlink_message_parse() 187 '=' == buffer[offset + keylen]) { in netlink_message_parse() 188 return buffer + offset + keylen + 1; in netlink_message_parse()
|
/external/openssl/crypto/ec/ |
D | ec_pmeth.c | 170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) in pkey_ec_derive() argument 185 *keylen = (EC_GROUP_get_degree(group) + 7)/8; in pkey_ec_derive() 195 outlen = *keylen; in pkey_ec_derive() 200 *keylen = ret; in pkey_ec_derive()
|
/external/pdfium/core/src/fdrm/crypto/ |
D | fx_crypt_aes.cpp | 878 const unsigned char *key, int keylen) in aes_setup() argument 882 ASSERT(keylen == 16 || keylen == 24 || keylen == 32); in aes_setup() 883 Nk = keylen / 4; in aes_setup() 992 void CRYPT_AESSetKey(FX_LPVOID context, FX_DWORD blocklen, FX_LPCBYTE key, FX_DWORD keylen, FX_BOOL… in CRYPT_AESSetKey() argument 994 aes_setup((AESContext*)context, blocklen, key, keylen); in CRYPT_AESSetKey()
|