/external/boringssl/src/crypto/pem/ |
D | pem_pk8.c | 71 char *kstr, int klen, 75 char *kstr, int klen, 85 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey_nid() argument 88 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey_nid() 92 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey() argument 95 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey() 99 char *kstr, int klen, in i2d_PKCS8PrivateKey_bio() argument 102 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_bio() 106 char *kstr, int klen, in i2d_PKCS8PrivateKey_nid_bio() argument 109 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_nid_bio() [all …]
|
D | pem_pkey.c | 103 int klen; in PEM_read_bio_PrivateKey() local 108 klen = 0; in PEM_read_bio_PrivateKey() 110 klen=cb(psbuf,PEM_BUFSIZE,0,u); in PEM_read_bio_PrivateKey() 111 if (klen <= 0) { in PEM_read_bio_PrivateKey() 116 p8inf = PKCS8_decrypt(p8, psbuf, klen); in PEM_read_bio_PrivateKey() 145 unsigned char *kstr, int klen, in PEM_write_bio_PrivateKey() argument 151 (char *)kstr, klen, in PEM_write_bio_PrivateKey() 156 pem_str,bp,x,enc,kstr,klen,cb,u); in PEM_write_bio_PrivateKey() 249 unsigned char *kstr, int klen, in PEM_write_PrivateKey() argument 260 ret=PEM_write_bio_PrivateKey(b, x, enc, kstr, klen, cb, u); in PEM_write_PrivateKey()
|
D | pem_lib.c | 271 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write() argument 282 ret=PEM_ASN1_write_bio(i2d,name,b,x,enc,kstr,klen,callback,u); in PEM_ASN1_write() 290 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write_bio() argument 333 klen = 0; in PEM_ASN1_write_bio() 336 klen=(*callback)(buf,PEM_BUFSIZE,1,u); in PEM_ASN1_write_bio() 337 if (klen <= 0) in PEM_ASN1_write_bio() 349 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL)) in PEM_ASN1_write_bio() 396 int i=0,j,o,klen; in PEM_do_header() local 406 klen = 0; in PEM_do_header() 408 klen=callback(buf,PEM_BUFSIZE,0,u); in PEM_do_header() [all …]
|
D | pem_info.c | 313 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) in PEM_X509_INFO_write_bio() argument 383 enc,kstr,klen,cb,u)<=0) in PEM_X509_INFO_write_bio()
|
/external/openssh/ |
D | kexecdhs.c | 75 size_t klen = 0, hashlen; in input_kex_ecdh_init() local 125 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_init() 126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init() 131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init() 132 server_key, NULL) != (int)klen || in input_kex_ecdh_init() 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init() 139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init() 198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init()
|
D | kexecdhc.c | 111 size_t klen = 0, hashlen; in input_kex_ecdh_reply() local 159 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_reply() 160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply() 165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply() 166 client_key, NULL) != (int)klen || in input_kex_ecdh_reply() 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply() 173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply() 217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply()
|
D | hmac.c | 64 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) in ssh_hmac_init() argument 71 if (klen <= ctx->buf_len) in ssh_hmac_init() 72 memcpy(ctx->buf, key, klen); in ssh_hmac_init() 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) in hmac_test() argument 149 if (ssh_hmac_init(ctx, key, klen) < 0 || in hmac_test()
|
D | kexdhc.c | 104 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh() local 149 klen = DH_size(kex->dh); in input_kex_dh() 150 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh() 202 explicit_bzero(kbuf, klen); in input_kex_dh()
|
D | kexdhs.c | 96 size_t klen = 0, hashlen; in input_kex_dh_init() local 141 klen = DH_size(kex->dh); in input_kex_dh_init() 142 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init() 207 explicit_bzero(kbuf, klen); in input_kex_dh_init()
|
D | kexgexs.c | 155 size_t klen = 0, hashlen; in input_kex_dh_gex_init() local 200 klen = DH_size(kex->dh); in input_kex_dh_gex_init() 201 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init() 268 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init()
|
D | kexgexc.c | 161 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh_gex_reply() local 211 klen = DH_size(kex->dh); in input_kex_dh_gex_reply() 212 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply() 269 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply()
|
D | hmac.h | 29 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
|
D | cipher.c | 303 int klen; in cipher_init() local 345 klen = EVP_CIPHER_CTX_key_length(&cc->evp); in cipher_init() 346 if (klen > 0 && keylen != (u_int)klen) { in cipher_init()
|
/external/boringssl/src/include/openssl/ |
D | pem.h | 237 unsigned char *kstr, int klen, pem_password_cb *cb, \ 240 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 245 unsigned char *kstr, int klen, pem_password_cb *cb, \ 248 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 273 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 275 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,enc,kstr,klen,cb,u); \ 280 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 282 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,enc,kstr,klen,cb,u); \ 338 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); 353 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); [all …]
|
/external/srtp/crypto/test/ |
D | cipher_driver.c | 78 int klen, int num_cipher); 92 cipher_type_t *ctype, int klen); 346 cipher_type_t *ctype, int klen) { in cipher_array_alloc_init() argument 361 key = crypto_alloc(klen); in cipher_array_alloc_init() 371 status = cipher_type_alloc(ctype, cipher_array, klen); in cipher_array_alloc_init() 376 for (j=0; j < klen; j++) in cipher_array_alloc_init() 475 int klen, int num_cipher) { in cipher_driver_test_array_throughput() argument 479 status = cipher_array_alloc_init(&ca, num_cipher, ct, klen); in cipher_driver_test_array_throughput()
|
/external/srtp/crypto/include/ |
D | auth.h | 74 #define auth_type_alloc(at, a, klen, outlen) \ argument 75 ((at)->alloc((a), (klen), (outlen)))
|
D | cipher.h | 168 #define cipher_type_alloc(ct, c, klen) ((ct)->alloc((c), (klen))) argument
|
/external/jemalloc/src/ |
D | jemalloc.c | 823 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument 827 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error() 837 size_t klen, vlen; local 932 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v, 935 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) 947 k, klen, v, vlen); \ 963 k, klen, v, vlen); \ 977 k, klen, v, vlen); \ 994 k, klen, v, vlen); \ 999 k, klen, v, vlen); \ [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 772 int klen; in wpa_ft_install_ptk() local 776 klen = wpa_cipher_key_len(sm->pairwise); in wpa_ft_install_ptk() 790 sm->PTK.tk, klen)) in wpa_ft_install_ptk()
|
D | wpa_auth.c | 2337 int klen = wpa_cipher_key_len(sm->pairwise); in SM_STATE() local 2339 sm->PTK.tk, klen)) { in SM_STATE()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 652 int klen; in wpa_supplicant_check_group_cipher() local 663 klen = wpa_cipher_key_len(group_cipher); in wpa_supplicant_check_group_cipher() 664 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher()
|
/external/icu/icu4c/source/test/cintltst/ |
D | cmsccoll.c | 1700 uint32_t klen = 0; in TestBocsuCoverage() local 1706 klen = ucol_getSortKey(coll, test, tlen, key, 256); in TestBocsuCoverage() 1707 (void)klen; /* Suppress set but not used warning. */ in TestBocsuCoverage()
|