Home
last modified time | relevance | path

Searched refs:skey (Results 1 - 25 of 86) sorted by relevance

1234

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; in des_encrypt() local
53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt()
55 des_done(&skey); in des_encrypt()
88 symmetric_key *skey; in aes_encrypt_init() local
89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init()
90 if (skey == NULL) in aes_encrypt_init()
92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init()
93 os_free(skey); in aes_encrypt_init()
102 symmetric_key *skey = ctx; aes_encrypt() local
109 symmetric_key *skey = ctx; aes_encrypt_deinit() local
117 symmetric_key *skey; aes_decrypt_init() local
131 symmetric_key *skey = ctx; aes_decrypt() local
138 symmetric_key *skey = ctx; aes_decrypt_deinit() local
[all...]
H A Dtls_openssl_ocsp.c508 EVP_PKEY *skey; in check_ocsp_resp() local
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
628 if (!skey) { in check_ocsp_resp()
635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; in des_encrypt() local
53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt()
55 des_done(&skey); in des_encrypt()
88 symmetric_key *skey; in aes_encrypt_init() local
89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init()
90 if (skey == NULL) in aes_encrypt_init()
92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init()
93 os_free(skey); in aes_encrypt_init()
102 symmetric_key *skey = ctx; aes_encrypt() local
109 symmetric_key *skey = ctx; aes_encrypt_deinit() local
117 symmetric_key *skey; aes_decrypt_init() local
131 symmetric_key *skey = ctx; aes_decrypt() local
138 symmetric_key *skey = ctx; aes_decrypt_deinit() local
[all...]
H A Dtls_openssl_ocsp.c508 EVP_PKEY *skey; in check_ocsp_resp() local
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
628 if (!skey) { in check_ocsp_resp()
635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
/third_party/openssl/demos/cms/
H A Dcms_sign.c19 EVP_PKEY *skey = NULL; in main() local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
45 if (!scert || !skey) in main()
56 cms = CMS_sign(scert, skey, NULL, in, flags); in main()
83 EVP_PKEY_free(skey); in main()
H A Dcms_sign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) in main()
91 EVP_PKEY_free(skey); in main()
/third_party/openssl/demos/smime/
H A Dsmsign.c19 EVP_PKEY *skey = NULL; in main() local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
45 if (!scert || !skey) in main()
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); in main()
81 EVP_PKEY_free(skey); in main()
H A Dsmsign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) in main()
89 EVP_PKEY_free(skey); in main()
/third_party/ltp/testcases/kernel/mem/hugetlb/hugeshmget/
H A Dhugeshmget02.c23 int *skey; member
43 if (*tcases[i].skey == -1) { in test_hugeshmget()
44 shm_id_2 = shmget(*(tcases[i].skey), 0, 0); in test_hugeshmget()
49 TEST(shmget(*(tcases[i].skey), tcases[i].size_coe * shm_size, in test_hugeshmget()
/third_party/mesa3d/src/panfrost/bifrost/
H A Dnodearray.h137 nodearray_sparse skey = nodearray_encode(key, NODEARRAY_MAX_VALUE); in nodearray_sparse_search() local
142 if (data[right] <= skey) in nodearray_sparse_search()
150 if (data[probe] > skey) in nodearray_sparse_search()
/third_party/toybox/toys/pending/
H A Dipcrm.c32 struct arg_list *skey;
84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
/third_party/lwip/src/netif/ppp/
H A Dmppe.c141 char skey[sizeof(state->session_key) * 2 + 1]; in mppe_init() local
150 sprintf(skey + i * 2, "%02x", state->session_key[i]); in mppe_init()
153 debugstr, pcb->netif->num, mkey, skey)); in mppe_init()
/third_party/node/deps/openssl/openssl/crypto/ocsp/
H A Docsp_vfy.c79 EVP_PKEY *skey; in ocsp_verify() local
83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify()
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify()
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
/third_party/openssl/crypto/ocsp/
H A Docsp_vfy.c79 EVP_PKEY *skey; in ocsp_verify() local
83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify()
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify()
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dextensions_clnt.c1783 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local
1879 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share()
1880 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share()
1882 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1886 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share()
1889 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1893 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share()
1895 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1898 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share()
[all...]
H A Dextensions_srvr.c1628 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local
1677 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share()
1678 if (skey == NULL) { in tls_construct_stoc_key_share()
1684 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share()
1687 EVP_PKEY_free(skey); in tls_construct_stoc_key_share()
1694 EVP_PKEY_free(skey); in tls_construct_stoc_key_share()
1703 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share()
1704 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
H A Dstatem_clnt.c2915 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local
2922 skey = s->s3.peer_tmp; in tls_construct_cke_dhe()
2923 if (skey == NULL) { in tls_construct_cke_dhe()
2928 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe()
2934 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe()
2980 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local
2983 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe()
2984 if (skey == NULL) { in tls_construct_cke_ecdhe()
2989 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe()
2995 if (ssl_derive(s, ckey, skey, in tls_construct_cke_ecdhe()
[all...]
H A Dstatem_srvr.c2977 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local
2987 skey = s->s3.tmp.pkey; in tls_process_cke_dhe()
2988 if (skey == NULL) { in tls_process_cke_dhe()
3003 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe()
3013 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe()
3028 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local
3051 if (skey == NULL) { in tls_process_cke_ecdhe()
3057 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe()
3068 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
/third_party/openssl/ssl/statem/
H A Dextensions_clnt.c1768 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local
1864 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share()
1865 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share()
1867 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1871 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share()
1874 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1878 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share()
1880 EVP_PKEY_free(skey); in tls_parse_stoc_key_share()
1883 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share()
[all...]
H A Dextensions_srvr.c1595 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local
1644 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share()
1645 if (skey == NULL) { in tls_construct_stoc_key_share()
1651 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share()
1654 EVP_PKEY_free(skey); in tls_construct_stoc_key_share()
1661 EVP_PKEY_free(skey); in tls_construct_stoc_key_share()
1670 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share()
1671 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
H A Dstatem_clnt.c2907 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local
2914 skey = s->s3.peer_tmp; in tls_construct_cke_dhe()
2915 if (skey == NULL) { in tls_construct_cke_dhe()
2920 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe()
2926 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe()
2972 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local
2975 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe()
2976 if (skey == NULL) { in tls_construct_cke_ecdhe()
2981 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe()
2987 if (ssl_derive(s, ckey, skey, in tls_construct_cke_ecdhe()
[all...]
H A Dstatem_srvr.c2956 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local
2966 skey = s->s3.tmp.pkey; in tls_process_cke_dhe()
2967 if (skey == NULL) { in tls_process_cke_dhe()
2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe()
2992 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe()
3007 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local
3030 if (skey == NULL) { in tls_process_cke_ecdhe()
3036 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe()
3047 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
/third_party/backends/backend/
H A Dhs2p-scsi.c433 struct sense_key *skey; in sense_handler() local
479 skey = lookup_sensekey_errmsg (sense); /* simple sequential search */ in sense_handler()
480 DBG (DBG_sense, "sense_handler: sense_key=%#x '%s - %s'\n", skey->key, in sense_handler()
481 skey->meaning, skey->description); in sense_handler()
773 skey->meaning, skey->description, ascq_key->description, status); in sense_handler()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_vfy.c2021 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff()
2058 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff()
2059 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff()
2114 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
2020 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) X509_CRL_diff() argument
/third_party/openssl/crypto/x509/
H A Dx509_vfy.c2023 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff()
2060 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff()
2061 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff()
2116 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
2022 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) X509_CRL_diff() argument

Completed in 48 milliseconds

1234