/third_party/libwebsockets/lib/cose/ |
H A D | cose_key.c | 143 const struct lws_gencrypto_keyelem *ke; in lws_cose_key_checks() local 168 ke = &key->meta[COSEKEY_META_KTY]; in lws_cose_key_checks() 169 if (ke->buf && (strlen(kty_strings[kty]) != ke->len || in lws_cose_key_checks() 170 memcmp(kty_strings[kty], ke->buf, ke->len))) { in lws_cose_key_checks() 172 lwsl_hexdump_notice(ke->buf, ke->len); in lws_cose_key_checks() 202 ke = &key->meta[COSEKEY_META_KEY_OPS]; in lws_cose_key_checks() 203 if (ke in lws_cose_key_checks() 309 struct lws_gencrypto_keyelem *ke = NULL; cb_cose_key() local 772 struct lws_gencrypto_keyelem *ke = &ck->meta[COSEKEY_META_KID]; lws_cose_key_from_set() local 791 struct lws_gencrypto_keyelem *ke; lws_cose_key_generate() local 1039 struct lws_gencrypto_keyelem *ke = lws_cose_key_export() local 1066 struct lws_gencrypto_keyelem *ke = NULL; lws_cose_key_export() local [all...] |
H A D | cose_sign.c | 108 const struct lws_gencrypto_keyelem *ke; in lws_cose_sign_payload_chunk() local 266 ke = &alg->cose_key->meta[COSEKEY_META_KID]; in lws_cose_sign_payload_chunk() 267 if (ke->len) { in lws_cose_sign_payload_chunk() 270 (int)ke->len, ke->buf); in lws_cose_sign_payload_chunk() 483 ke = &alg->cose_key->meta[COSEKEY_META_KID]; in lws_cose_sign_payload_chunk() 484 if (ke->len) { in lws_cose_sign_payload_chunk() 487 (int)ke->len, ke->buf); in lws_cose_sign_payload_chunk()
|
H A D | cose_validate_alg.c | 33 struct lws_gencrypto_keyelem *ke; in lws_cose_val_alg_create() local 109 ke = &ck->e[LWS_GENCRYPTO_OCT_KEYEL_K]; in lws_cose_val_alg_create() 110 if (lws_genhmac_init(&alg->u.hmacctx, ghm, ke->buf, ke->len)) in lws_cose_val_alg_create()
|
H A D | cose_sign_alg.c | 33 const struct lws_gencrypto_keyelem *ke; in lws_cose_sign_alg_create() local 109 ke = &ck->e[LWS_GENCRYPTO_OCT_KEYEL_K]; in lws_cose_sign_alg_create() 110 if (lws_genhmac_init(&alg->u.hmacctx, ghm, ke->buf, ke->len)) in lws_cose_sign_alg_create()
|
H A D | cose_validate.c | 449 struct lws_gencrypto_keyelem *ke; in cb_cose_sig() local 872 ke = &sl->kid; in cb_cose_sig() 873 if (ke->buf) in cb_cose_sig() 874 lws_free(ke->buf); in cb_cose_sig() 875 ke->buf = lws_malloc(ctx->npos, __func__); in cb_cose_sig() 876 if (!ke->buf) in cb_cose_sig() 878 ke->len = ctx->npos; in cb_cose_sig() 879 memcpy(ke->buf, ctx->buf, ctx->npos); in cb_cose_sig()
|
/third_party/icu/icu4j/tools/misc/src/com/ibm/icu/dev/tool/ime/translit/ |
H A D | TransliteratorInputMethod.java | 377 KeyEvent ke = (KeyEvent)event; in dispatchEvent() 378 if (TRACE_EVENT) System.out.println("TIM: " + eventInfo(ke)); in dispatchEvent() 379 if ((ke.getModifiers() & MODIFIERS) != 0) { in dispatchEvent() 382 if (handleTyped(ke.getKeyChar())) { in dispatchEvent() 383 ke.consume(); in dispatchEvent() 391 KeyEvent ke = (KeyEvent)event; in dispatchEvent() 392 if (TRACE_EVENT) System.out.println("TIM: " + eventInfo(ke)); in dispatchEvent() 393 if (handlePressed(ke.getKeyCode())) { in dispatchEvent() 394 ke.consume(); in dispatchEvent() 401 KeyEvent ke in dispatchEvent() [all...] |
/third_party/skia/third_party/externals/libjpeg-turbo/ |
H A D | jcarith.c | 464 int tbl, k, ke; in METHODDEF() local 485 for (ke = cinfo->Se; ke > 0; ke--) in METHODDEF() 490 if ((v = (*block)[jpeg_natural_order[ke]]) >= 0) { in METHODDEF() 498 for (k = cinfo->Ss; k <= ke; k++) { in METHODDEF() 598 int tbl, k, ke, kex; in METHODDEF() local 619 for (ke = cinfo->Se; ke > 0; ke in METHODDEF() 692 int blkn, ci, tbl, k, ke; METHODDEF() local [all...] |
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-sign/ |
H A D | main.c | 100 const struct lws_gencrypto_keyelem *ke; in main() local 368 ke = &res->cose_key->meta[COSEKEY_META_KID]; in main() 369 if (ke && ke->buf) in main() 370 lws_hex_from_byte_array(ke->buf, ke->len, in main()
|
/third_party/mesa3d/src/gallium/auxiliary/gallivm/ |
H A D | lp_bld_type.c | 358 LLVMTypeKind ke = LLVMGetTypeKind(te); in lp_dump_llvmtype() local 360 if (ke == LLVMIntegerTypeKind) { in lp_dump_llvmtype() 365 debug_printf("Vector [%u] of %s\n", len, lp_typekind_name(ke)); in lp_dump_llvmtype() 370 LLVMTypeKind ke = LLVMGetTypeKind(te); in lp_dump_llvmtype() local 372 debug_printf("Array [%u] of %s\n", len, lp_typekind_name(ke)); in lp_dump_llvmtype()
|
/third_party/ffmpeg/libavfilter/ |
H A D | vf_xbr.c | 102 const unsigned ke = df(PF,PG); \ 104 const int left = ke<<1 <= ki && PE != PG && PD != PG; \ 105 const int up = ke >= ki<<1 && PE != PC && PB != PC; \ 136 const unsigned ke = df(PF,PG); \ 138 const int left = ke<<1 <= ki && PE != PG && PD != PG; \ 139 const int up = ke >= ki<<1 && PE != PC && PB != PC; \ 178 const unsigned ke = df(PF,PG); \ 180 const int left = ke<<1 <= ki && PE != PG && PD != PG; \ 181 const int up = ke >= ki<<1 && PE != PC && PB != PC; \
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-key/ |
H A D | main.c | 216 struct lws_gencrypto_keyelem *ke = in main() local 221 if (!kid_len || (ke->len && in main() 222 ke->len == (uint32_t)kid_len && in main() 223 !memcmp(ke->buf, kid, kid_len))) { in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.c | 466 os_memcpy(sess->ke, buf, ke_len); in eap_eke_derive_ke_ki() 467 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len); in eap_eke_derive_ke_ki() 627 if (aes_128_cbc_encrypt(sess->ke, iv, e, data_len + pad) < 0 || in eap_eke_prot() 675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { in eap_eke_decrypt_prot() 725 os_memset(sess->ke, 0, EAP_EKE_MAX_KE_LEN); in eap_eke_session_clean()
|
H A D | eap_eke_common.h | 69 u8 ke[EAP_EKE_MAX_KE_LEN]; member
|
H A D | ikev2_common.h | 298 const u8 *ke; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.c | 466 os_memcpy(sess->ke, buf, ke_len); in eap_eke_derive_ke_ki() 467 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len); in eap_eke_derive_ke_ki() 627 if (aes_128_cbc_encrypt(sess->ke, iv, e, data_len + pad) < 0 || in eap_eke_prot() 675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { in eap_eke_decrypt_prot() 725 os_memset(sess->ke, 0, EAP_EKE_MAX_KE_LEN); in eap_eke_session_clean()
|
H A D | eap_eke_common.h | 69 u8 ke[EAP_EKE_MAX_KE_LEN]; member
|
H A D | ikev2_common.h | 298 const u8 *ke; member
|
/third_party/typescript/tests/baselines/reference/ |
H A D | objectRestAssignment.js | 10 let overEmit: { a: { ka: string, x: string }[], b: { z: string, ki: string, ku: string }, ke: string, ko: string };
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | eloop.c | 320 struct kevent ke; in eloop_sock_queue() local 322 EV_SET(&ke, sock, event_type_kevent_filter(type), EV_ADD, 0, 0, 0); in eloop_sock_queue() 323 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) == -1) { in eloop_sock_queue() 463 struct kevent ke; in eloop_sock_table_remove_sock() local 495 EV_SET(&ke, sock, event_type_kevent_filter(table->type), EV_DELETE, 0, in eloop_sock_table_remove_sock() 497 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) < 0) { in eloop_sock_table_remove_sock()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | eloop.c | 322 struct kevent ke; in eloop_sock_queue() local 324 EV_SET(&ke, sock, event_type_kevent_filter(type), EV_ADD, 0, 0, 0); in eloop_sock_queue() 325 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) == -1) { in eloop_sock_queue() 466 struct kevent ke; in eloop_sock_table_remove_sock() local 498 EV_SET(&ke, sock, event_type_kevent_filter(table->type), EV_DELETE, 0, in eloop_sock_table_remove_sock() 500 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) < 0) { in eloop_sock_table_remove_sock()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_reconfig.c | 392 /* Wrapped Data: {C-nonce, E-nonce, Connection Status}ke */ in dpp_reconfig_build_resp() 398 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_build_resp() 628 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_build_conf() 775 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_auth_resp_rx() 887 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_auth_conf_rx()
|
H A D | dpp_crypto.c | 436 "DPP: Mx/Nx not available - cannot derive ke"); in dpp_derive_bk_ke() 452 "DPP: Lx not available - cannot derive ke"); in dpp_derive_bk_ke() 467 /* ke = HKDF-Expand(bk, "DPP Key", length) */ in dpp_derive_bk_ke() 468 res = dpp_hkdf_expand(hash_len, auth->bk, hash_len, info_ke, auth->ke, in dpp_derive_bk_ke() 474 "DPP: ke = HKDF-Expand(bk, \"DPP Key\", length)", in dpp_derive_bk_ke() 475 auth->ke, hash_len); in dpp_derive_bk_ke() 1725 /* ke = HKDF(C-nonce | E-nonce, "dpp reconfig key", M.x) */ in dpp_reconfig_derive_ke_responder() 1737 "dpp reconfig key", auth->ke, curve->hash_len) < 0) in dpp_reconfig_derive_ke_responder() 1740 "DPP: ke = HKDF(C-nonce | E-nonce, \"dpp reconfig key\", M.x)", in dpp_reconfig_derive_ke_responder() 1741 auth->ke, curv in dpp_reconfig_derive_ke_responder() [all...] |
H A D | dpp.c | 677 /* { E-nonce, configAttrib }ke */ in dpp_build_conf_req_attr() 735 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_req_attr() 1735 /* { E-nonce, configurationObject[, sendConnStatus]}ke */ in dpp_build_conf_resp() 1854 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_resp() 1925 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_req_rx() 2896 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_resp_rx() 3041 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_result_rx() 3128 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_result() 3200 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conn_status_result_rx() 3352 if (aes_siv_encrypt(auth->ke, aut in dpp_build_conn_status_result() [all...] |
H A D | dpp_auth.c | 308 /* Wrapped data ({R-nonce, I-nonce, R-capabilities, {R-auth}ke}k2) */ in dpp_auth_build_resp() 370 /* {R-auth}ke */ in dpp_auth_build_resp() 515 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_resp_ok() 520 wpa_hexdump(MSG_DEBUG, "DPP: {R-auth}ke", in dpp_auth_build_resp_ok() 1064 /* I-auth wrapped with ke */ in dpp_auth_build_conf() 1088 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_conf() 1092 wpa_hexdump(MSG_DEBUG, "DPP: {I-auth}ke", in dpp_auth_build_conf() 1683 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_auth_resp_rx() 1936 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_auth_conf_rx()
|
/third_party/python/Lib/multiprocessing/ |
H A D | managers.py | 257 except KeyError as ke: 262 raise ke 427 except KeyError as ke: 439 raise ke
|