/third_party/mesa3d/src/vulkan/runtime/ |
H A D | vk_pipeline_cache.c | 49 const void *key_data, size_t key_size, 66 const void *key_data, in raw_data_object_deserialize() 80 raw_data_object_create(device, key_data, key_size, data, data_size); in raw_data_object_deserialize() 102 const void *key_data, size_t key_size, in raw_data_object_create() 120 memcpy(obj_key_data, key_data, key_size); in raw_data_object_create() 133 return memcmp(a->key_data, b->key_data, a->key_size) == 0; in object_keys_equal() 140 return _mesa_hash_data(object->key_data, object->key_size); in object_key_hash() 270 const void *key_data, uint32_t key_size, in vk_pipeline_cache_object_deserialize() 287 ops->deserialize(cache->base.device, key_data, key_siz in vk_pipeline_cache_object_deserialize() 65 raw_data_object_deserialize(struct vk_device *device, const void *key_data, size_t key_size, struct blob_reader *blob) raw_data_object_deserialize() argument 101 raw_data_object_create(struct vk_device *device, const void *key_data, size_t key_size, const void *data, size_t data_size) raw_data_object_create() argument 269 vk_pipeline_cache_object_deserialize(struct vk_pipeline_cache *cache, const void *key_data, uint32_t key_size, const void *data, size_t data_size, const struct vk_pipeline_cache_object_ops *ops) vk_pipeline_cache_object_deserialize() argument 306 vk_pipeline_cache_lookup_object(struct vk_pipeline_cache *cache, const void *key_data, size_t key_size, const struct vk_pipeline_cache_object_ops *ops, bool *cache_hit) vk_pipeline_cache_lookup_object() argument 446 vk_pipeline_cache_lookup_nir(struct vk_pipeline_cache *cache, const void *key_data, size_t key_size, const struct nir_shader_compiler_options *nir_options, bool *cache_hit, void *mem_ctx) vk_pipeline_cache_lookup_nir() argument 475 vk_pipeline_cache_add_nir(struct vk_pipeline_cache *cache, const void *key_data, size_t key_size, const nir_shader *nir) vk_pipeline_cache_add_nir() argument 551 const void *key_data = blob_read_bytes(&blob, key_size); vk_pipeline_cache_load() local [all...] |
H A D | vk_pipeline_cache.h | 81 const void *key_data, 113 const void *key_data; member 121 const void *key_data, uint32_t key_size) in vk_pipeline_cache_object_init() 128 object->key_data = key_data; in vk_pipeline_cache_object_init() 213 const void *key_data, size_t key_size, 246 const void *key_data, size_t key_size, 251 const void *key_data, size_t key_size, 118 vk_pipeline_cache_object_init(struct vk_device *device, struct vk_pipeline_cache_object *object, const struct vk_pipeline_cache_object_ops *ops, const void *key_data, uint32_t key_size) vk_pipeline_cache_object_init() argument
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_storage.c | 233 uint8_t key_data[]; member 254 memcpy(storage_format->key_data, data, data_length); in psa_format_key_data_for_storage() 268 uint8_t **key_data, in psa_parse_key_data_from_storage() 298 *key_data = NULL; in psa_parse_key_data_from_storage() 300 *key_data = mbedtls_calloc(1, *key_data_length); in psa_parse_key_data_from_storage() 301 if (*key_data == NULL) { in psa_parse_key_data_from_storage() 304 memcpy(*key_data, storage_format->key_data, *key_data_length); in psa_parse_key_data_from_storage() 350 void psa_free_persistent_key_data(uint8_t *key_data, size_t key_data_length) in psa_free_persistent_key_data() argument 352 mbedtls_zeroize_and_free(key_data, key_data_lengt in psa_free_persistent_key_data() 266 psa_parse_key_data_from_storage(const uint8_t *storage_data, size_t storage_data_length, uint8_t **key_data, size_t *key_data_length, psa_key_attributes_t *attr) psa_parse_key_data_from_storage() argument [all...] |
H A D | psa_crypto_storage.h | 149 * \param key_data Buffer for the key data. 153 void psa_free_persistent_key_data(uint8_t *key_data, size_t key_data_length); 174 * \param[out] key_data On output, pointer to a newly allocated buffer 187 uint8_t **key_data,
|
H A D | pk.c | 659 unsigned char *key_data = key_end; in import_pair_into_psa() local 661 key_buffer, &key_data); in import_pair_into_psa() 665 size_t key_length = key_end - key_data; in import_pair_into_psa() 667 key_data, key_length, in import_pair_into_psa() 669 mbedtls_platform_zeroize(key_data, key_length); in import_pair_into_psa() 750 unsigned char *key_data = NULL; in import_public_into_psa() local 761 key_data = key_end; in import_public_into_psa() 763 key_buffer, &key_data); in import_public_into_psa() 786 key_data = (unsigned char *) pk->pub_raw; in import_public_into_psa() 802 key_data in import_public_into_psa() [all...] |
H A D | psa_crypto_slot_management.c | 248 uint8_t *key_data = NULL; in psa_load_persistent_key_into_slot() local 252 &key_data, &key_data_length); in psa_load_persistent_key_into_slot() 269 data = (psa_se_key_data_storage_t *) key_data; in psa_load_persistent_key_into_slot() 276 status = psa_copy_key_material_into_slot(slot, key_data, key_data_length); in psa_load_persistent_key_into_slot() 282 psa_free_persistent_key_data(key_data, key_data_length); in psa_load_persistent_key_into_slot()
|
/third_party/node/src/crypto/ |
H A D | crypto_aes.cc | 31 // The key_data must be a secret key. 36 KeyObjectData* key_data, in AES_Cipher() 41 CHECK_NOT_NULL(key_data); in AES_Cipher() 42 CHECK_EQ(key_data->GetKeyType(), kKeyTypeSecret); in AES_Cipher() 74 key_data->GetSymmetricKeySize()) || in AES_Cipher() 79 reinterpret_cast<const unsigned char*>(key_data->GetSymmetricKey()), in AES_Cipher() 224 KeyObjectData* key_data, in AES_CTR_Cipher2() 237 reinterpret_cast<const unsigned char*>(key_data->GetSymmetricKey()), in AES_CTR_Cipher2() 267 KeyObjectData* key_data, in AES_CTR_Cipher() 302 auto status = AES_CTR_Cipher2(key_data, in AES_CTR_Cipher() 34 AES_Cipher( Environment* env, KeyObjectData* key_data, WebCryptoCipherMode cipher_mode, const AESCipherConfig& params, const ByteSource& in, ByteSource* out) AES_Cipher() argument 223 AES_CTR_Cipher2( KeyObjectData* key_data, WebCryptoCipherMode cipher_mode, const AESCipherConfig& params, const ByteSource& in, unsigned const char* counter, unsigned char* out) AES_CTR_Cipher2() argument 265 AES_CTR_Cipher( Environment* env, KeyObjectData* key_data, WebCryptoCipherMode cipher_mode, const AESCipherConfig& params, const ByteSource& in, ByteSource* out) AES_CTR_Cipher() argument 573 DoCipher( Environment* env, std::shared_ptr<KeyObjectData> key_data, WebCryptoCipherMode cipher_mode, const AESCipherConfig& params, const ByteSource& in, ByteSource* out) DoCipher() argument [all...] |
H A D | crypto_rsa.cc | 191 KeyObjectData* key_data, in RSA_JWK_Export() 201 KeyObjectData* key_data, in RSA_Cipher() 205 CHECK_NE(key_data->GetKeyType(), kKeyTypeSecret); in RSA_Cipher() 206 ManagedEVPPKey m_pkey = key_data->GetAsymmetricKey(); in RSA_Cipher() 262 std::shared_ptr<KeyObjectData> key_data, in DoExport() 266 CHECK_NE(key_data->GetKeyType(), kKeyTypeSecret); in DoExport() 273 return RSA_JWK_Export(key_data.get(), params, out); in DoExport() 275 if (key_data->GetKeyType() != kKeyTypePrivate) in DoExport() 277 return PKEY_PKCS8_Export(key_data.get(), out); in DoExport() 279 if (key_data in DoExport() 190 RSA_JWK_Export( KeyObjectData* key_data, const RSAKeyExportConfig& params, ByteSource* out) RSA_JWK_Export() argument 199 RSA_Cipher( Environment* env, KeyObjectData* key_data, const RSACipherConfig& params, const ByteSource& in, ByteSource* out) RSA_Cipher() argument 261 DoExport( std::shared_ptr<KeyObjectData> key_data, WebCryptoKeyFormat format, const RSAKeyExportConfig& params, ByteSource* out) DoExport() argument 342 DoCipher( Environment* env, std::shared_ptr<KeyObjectData> key_data, WebCryptoCipherMode cipher_mode, const RSACipherConfig& params, const ByteSource& in, ByteSource* out) DoCipher() argument [all...] |
H A D | crypto_dsa.cc | 106 std::shared_ptr<KeyObjectData> key_data, in DoExport() 110 CHECK_NE(key_data->GetKeyType(), kKeyTypeSecret); in DoExport() 117 if (key_data->GetKeyType() != kKeyTypePrivate) in DoExport() 119 return PKEY_PKCS8_Export(key_data.get(), out); in DoExport() 121 if (key_data->GetKeyType() != kKeyTypePublic) in DoExport() 123 return PKEY_SPKI_Export(key_data.get(), out); in DoExport() 105 DoExport( std::shared_ptr<KeyObjectData> key_data, WebCryptoKeyFormat format, const DSAKeyExportConfig& params, ByteSource* out) DoExport() argument
|
H A D | crypto_ec.cc | 628 KeyObjectData* key_data, in EC_Raw_Export() 631 ManagedEVPPKey m_pkey = key_data->GetAsymmetricKey(); in EC_Raw_Export() 642 switch (key_data->GetKeyType()) { in EC_Raw_Export() 661 if (key_data->GetKeyType() != kKeyTypePublic) in EC_Raw_Export() 693 std::shared_ptr<KeyObjectData> key_data, in DoExport() 697 CHECK_NE(key_data->GetKeyType(), kKeyTypeSecret); in DoExport() 701 return EC_Raw_Export(key_data.get(), params, out); in DoExport() 703 if (key_data->GetKeyType() != kKeyTypePrivate) in DoExport() 705 return PKEY_PKCS8_Export(key_data.get(), out); in DoExport() 707 if (key_data in DoExport() 627 EC_Raw_Export( KeyObjectData* key_data, const ECKeyExportConfig& params, ByteSource* out) EC_Raw_Export() argument 692 DoExport( std::shared_ptr<KeyObjectData> key_data, WebCryptoKeyFormat format, const ECKeyExportConfig& params, ByteSource* out) DoExport() argument [all...] |
H A D | crypto_rsa.h | 72 std::shared_ptr<KeyObjectData> key_data, 108 std::shared_ptr<KeyObjectData> key_data,
|
H A D | crypto_keys.cc | 443 MaybeLocal<Value> key_data = in ExportJWKSecretKey() local 450 if (key_data.IsEmpty()) { in ExportJWKSecretKey() 455 if (!key_data.ToLocal(&raw)) in ExportJWKSecretKey() 483 ByteSource key_data = ByteSource::FromEncodedString(env, key.As<String>()); in ImportJWKSecretKey() local 484 return KeyObjectData::CreateSecret(std::move(key_data)); in ImportJWKSecretKey() 1101 ArrayBufferOrViewContents<unsigned char> key_data(args[1]); in InitEDRaw() 1118 EVPKeyPointer pkey(fn(id, nullptr, key_data.data(), key_data.size())); in InitEDRaw() 1450 KeyObjectData* key_data, in PKEY_SPKI_Export() 1452 CHECK_EQ(key_data in PKEY_SPKI_Export() 1449 PKEY_SPKI_Export( KeyObjectData* key_data, ByteSource* out) PKEY_SPKI_Export() argument 1464 PKEY_PKCS8_Export( KeyObjectData* key_data, ByteSource* out) PKEY_PKCS8_Export() argument [all...] |
H A D | crypto_dh.cc | 603 std::shared_ptr<KeyObjectData> key_data, in DoExport() 607 CHECK_NE(key_data->GetKeyType(), kKeyTypeSecret); in DoExport() 611 if (key_data->GetKeyType() != kKeyTypePrivate) in DoExport() 613 return PKEY_PKCS8_Export(key_data.get(), out); in DoExport() 615 if (key_data->GetKeyType() != kKeyTypePublic) in DoExport() 617 return PKEY_SPKI_Export(key_data.get(), out); in DoExport() 602 DoExport( std::shared_ptr<KeyObjectData> key_data, WebCryptoKeyFormat format, const DHKeyExportConfig& params, ByteSource* out) DoExport() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member 131 if (data->key_data) { in eap_tls_free_key() 132 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 133 data->key_data = NULL; in eap_tls_free_key() 205 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 209 if (data->key_data) { in eap_tls_success() 211 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 213 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 364 return data->key_data != NULL; in eap_tls_isKeyAvailable() 373 if (data->key_data in eap_tls_getKey() [all...] |
H A D | eap_peap.c | 57 u8 *key_data; member 171 if (data->key_data) { in eap_peap_free_key() 172 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 173 data->key_data = NULL; in eap_peap_free_key() 262 tk = data->key_data; in eap_peap_derive_cmk() 1085 data->key_data = in eap_peap_process() 1090 if (data->key_data) { in eap_peap_process() 1093 data->key_data, in eap_peap_process() 1097 data->key_data + in eap_peap_process() 1235 return data->key_data ! in eap_peap_isKeyAvailable() [all...] |
H A D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, in eap_ttls_v0_derive_key() 277 if (!data->key_data) { in eap_ttls_v0_derive_key() 283 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 285 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1753 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1762 if (data->key_data in eap_ttls_getKey() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_tls.c | 23 u8 *key_data; member 137 if (data->key_data) { in eap_tls_free_key() 138 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 139 data->key_data = NULL; in eap_tls_free_key() 211 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 215 if (data->key_data) { in eap_tls_success() 217 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 219 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 366 return data->key_data != NULL; in eap_tls_isKeyAvailable() 375 if (data->key_data in eap_tls_getKey() [all...] |
H A D | eap_peap.c | 57 u8 *key_data; member 186 if (data->key_data) { in eap_peap_free_key() 187 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 188 data->key_data = NULL; in eap_peap_free_key() 277 tk = data->key_data; in eap_peap_derive_cmk() 1151 data->key_data = in eap_peap_process() 1156 if (data->key_data) { in eap_peap_process() 1159 data->key_data, in eap_peap_process() 1163 data->key_data + in eap_peap_process() 1302 return data->key_data ! in eap_peap_isKeyAvailable() [all...] |
H A D | eap_ttls.c | 57 u8 *key_data; member 182 if (data->key_data) { in eap_ttls_free_key() 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 184 data->key_data = NULL; in eap_ttls_free_key() 285 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key() 289 if (!data->key_data) { in eap_ttls_v0_derive_key() 295 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 297 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1797 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1806 if (data->key_data in eap_ttls_getKey() [all...] |
/third_party/mbedtls/programs/psa/ |
H A D | key_ladder_demo.c | 159 uint8_t key_data[KEY_SIZE_BYTES]; in save_key() local 164 key_data, sizeof(key_data), in save_key() 169 SYS_CHECK(fwrite(key_data, 1, key_size, key_file) == key_size); in save_key() 218 uint8_t key_data[KEY_SIZE_BYTES]; in import_key_from_file() local 226 SYS_CHECK((key_size = fread(key_data, 1, sizeof(key_data), in import_key_from_file() 230 (unsigned) sizeof(key_data)); in import_key_from_file() 240 PSA_CHECK(psa_import_key(&attributes, key_data, key_size, master_key)); in import_key_from_file() 245 mbedtls_platform_zeroize(key_data, sizeo in import_key_from_file() [all...] |
/third_party/mesa3d/src/intel/vulkan/ |
H A D | anv_pipeline_cache.c | 40 const void *key_data, size_t key_size, 70 const void *key_data, uint32_t key_size, in anv_shader_bin_create() 100 memcpy(obj_key_data, key_data, key_size); in anv_shader_bin_create() 236 const void *key_data, size_t key_size, in anv_shader_bin_deserialize() 287 key_data, key_size, in anv_shader_bin_deserialize() 300 const void *key_data, uint32_t key_size, in anv_device_search_for_kernel() 309 vk_pipeline_cache_lookup_object(cache, key_data, key_size, in anv_device_search_for_kernel() 325 const void *key_data, uint32_t key_size, in anv_device_upload_kernel() 340 key_data, key_size, in anv_device_upload_kernel() 68 anv_shader_bin_create(struct anv_device *device, gl_shader_stage stage, const void *key_data, uint32_t key_size, const void *kernel_data, uint32_t kernel_size, const struct brw_stage_prog_data *prog_data_in, uint32_t prog_data_size, const struct brw_compile_stats *stats, uint32_t num_stats, const nir_xfb_info *xfb_info_in, const struct anv_pipeline_bind_map *bind_map) anv_shader_bin_create() argument 235 anv_shader_bin_deserialize(struct vk_device *vk_device, const void *key_data, size_t key_size, struct blob_reader *blob) anv_shader_bin_deserialize() argument 298 anv_device_search_for_kernel(struct anv_device *device, struct vk_pipeline_cache *cache, const void *key_data, uint32_t key_size, bool *user_cache_hit) anv_device_search_for_kernel() argument 322 anv_device_upload_kernel(struct anv_device *device, struct vk_pipeline_cache *cache, gl_shader_stage stage, const void *key_data, uint32_t key_size, const void *kernel_data, uint32_t kernel_size, const struct brw_stage_prog_data *prog_data, uint32_t prog_data_size, const struct brw_compile_stats *stats, uint32_t num_stats, const nir_xfb_info *xfb_info, const struct anv_pipeline_bind_map *bind_map) anv_device_upload_kernel() argument
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | aes.rs | 299 let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap(); in test_wrap_unwrap() 306 wrap_key(&enc_key, None, &mut wrapped, &key_data).unwrap(), in test_wrap_unwrap() 317 assert_eq!(&unwrapped[..], &key_data[..]); in test_wrap_unwrap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 100 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local 120 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send() 141 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 144 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 150 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send() 588 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() 612 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 613 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1438 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4() 1450 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_le in wpa_supplicant_process_3_of_4() 585 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) wpa_supplicant_process_1_of_4() argument 1436 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) wpa_supplicant_process_3_of_4() argument 1670 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) wpa_supplicant_process_1_of_2_wpa() argument 1824 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) wpa_supplicant_process_1_of_2() argument 1976 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, size_t mic_len, u16 ver, u8 *key_data, size_t *key_data_len) wpa_supplicant_decrypt_key_data() argument 2211 u8 *mic, *key_data; wpa_sm_rx_eapol() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | x_pkey.c | 45 OPENSSL_free(x->key_data); in X509_PKEY_free()
|
/third_party/openssl/crypto/asn1/ |
H A D | x_pkey.c | 45 OPENSSL_free(x->key_data); in X509_PKEY_free()
|