/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; in des_encrypt() local 53 des_setup(pkey, 8, 0, &skey); in des_encrypt() 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt() 55 des_done(&skey); in des_encrypt() 88 symmetric_key *skey; in aes_encrypt_init() local 89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init() 90 if (skey == NULL) in aes_encrypt_init() 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init() 93 os_free(skey); in aes_encrypt_init() 102 symmetric_key *skey = ctx; aes_encrypt() local 109 symmetric_key *skey = ctx; aes_encrypt_deinit() local 117 symmetric_key *skey; aes_decrypt_init() local 131 symmetric_key *skey = ctx; aes_decrypt() local 138 symmetric_key *skey = ctx; aes_decrypt_deinit() local [all...] |
H A D | tls_openssl_ocsp.c | 508 EVP_PKEY *skey; in check_ocsp_resp() local 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 628 if (!skey) { in check_ocsp_resp() 635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_libtomcrypt.c | 42 symmetric_key skey; in des_encrypt() local 53 des_setup(pkey, 8, 0, &skey); in des_encrypt() 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt() 55 des_done(&skey); in des_encrypt() 88 symmetric_key *skey; in aes_encrypt_init() local 89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init() 90 if (skey == NULL) in aes_encrypt_init() 92 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { in aes_encrypt_init() 93 os_free(skey); in aes_encrypt_init() 102 symmetric_key *skey = ctx; aes_encrypt() local 109 symmetric_key *skey = ctx; aes_encrypt_deinit() local 117 symmetric_key *skey; aes_decrypt_init() local 131 symmetric_key *skey = ctx; aes_decrypt() local 138 symmetric_key *skey = ctx; aes_decrypt_deinit() local [all...] |
H A D | tls_openssl_ocsp.c | 508 EVP_PKEY *skey; in check_ocsp_resp() local 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 628 if (!skey) { in check_ocsp_resp() 635 basic->tbsResponseData, skey) <= 0) { in check_ocsp_resp()
|
/third_party/openssl/demos/cms/ |
H A D | cms_sign.c | 19 EVP_PKEY *skey = NULL; in main() local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 45 if (!scert || !skey) in main() 56 cms = CMS_sign(scert, skey, NULL, in, flags); in main() 83 EVP_PKEY_free(skey); in main()
|
H A D | cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) in main() 91 EVP_PKEY_free(skey); in main()
|
/third_party/openssl/demos/smime/ |
H A D | smsign.c | 19 EVP_PKEY *skey = NULL; in main() local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 45 if (!scert || !skey) in main() 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); in main() 81 EVP_PKEY_free(skey); in main()
|
H A D | smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) in main() 89 EVP_PKEY_free(skey); in main()
|
/third_party/ltp/testcases/kernel/mem/hugetlb/hugeshmget/ |
H A D | hugeshmget02.c | 23 int *skey; member 43 if (*tcases[i].skey == -1) { in test_hugeshmget() 44 shm_id_2 = shmget(*(tcases[i].skey), 0, 0); in test_hugeshmget() 49 TEST(shmget(*(tcases[i].skey), tcases[i].size_coe * shm_size, in test_hugeshmget()
|
/third_party/mesa3d/src/panfrost/bifrost/ |
H A D | nodearray.h | 137 nodearray_sparse skey = nodearray_encode(key, NODEARRAY_MAX_VALUE); in nodearray_sparse_search() local 142 if (data[right] <= skey) in nodearray_sparse_search() 150 if (data[probe] > skey) in nodearray_sparse_search()
|
/third_party/toybox/toys/pending/ |
H A D | ipcrm.c | 32 struct arg_list *skey; 84 for (tmp = TT.skey; tmp; tmp = tmp->next) do_ipcrm(1, 3, tmp->arg); in ipcrm_main()
|
/third_party/lwip/src/netif/ppp/ |
H A D | mppe.c | 141 char skey[sizeof(state->session_key) * 2 + 1]; in mppe_init() local 150 sprintf(skey + i * 2, "%02x", state->session_key[i]); in mppe_init() 153 debugstr, pcb->netif->num, mkey, skey)); in mppe_init()
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 79 EVP_PKEY *skey; in ocsp_verify() local 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 79 EVP_PKEY *skey; in ocsp_verify() local 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1783 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1879 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share() 1880 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 1882 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1886 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 1889 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1893 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 1895 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1898 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share() [all...] |
H A D | extensions_srvr.c | 1628 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1677 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 1678 if (skey == NULL) { in tls_construct_stoc_key_share() 1684 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share() 1687 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1694 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1703 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share() 1704 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
|
H A D | statem_clnt.c | 2915 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 2922 skey = s->s3.peer_tmp; in tls_construct_cke_dhe() 2923 if (skey == NULL) { in tls_construct_cke_dhe() 2928 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 2934 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 2980 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 2983 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe() 2984 if (skey == NULL) { in tls_construct_cke_ecdhe() 2989 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() 2995 if (ssl_derive(s, ckey, skey, in tls_construct_cke_ecdhe() [all...] |
H A D | statem_srvr.c | 2977 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local 2987 skey = s->s3.tmp.pkey; in tls_process_cke_dhe() 2988 if (skey == NULL) { in tls_process_cke_dhe() 3003 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 3013 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3028 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local 3051 if (skey == NULL) { in tls_process_cke_ecdhe() 3057 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3068 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1768 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1864 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share() 1865 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 1867 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1871 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 1874 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1878 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 1880 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1883 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share() [all...] |
H A D | extensions_srvr.c | 1595 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1644 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 1645 if (skey == NULL) { in tls_construct_stoc_key_share() 1651 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share() 1654 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1661 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1670 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share() 1671 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
|
H A D | statem_clnt.c | 2907 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 2914 skey = s->s3.peer_tmp; in tls_construct_cke_dhe() 2915 if (skey == NULL) { in tls_construct_cke_dhe() 2920 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 2926 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 2972 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 2975 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe() 2976 if (skey == NULL) { in tls_construct_cke_ecdhe() 2981 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() 2987 if (ssl_derive(s, ckey, skey, in tls_construct_cke_ecdhe() [all...] |
H A D | statem_srvr.c | 2956 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local 2966 skey = s->s3.tmp.pkey; in tls_process_cke_dhe() 2967 if (skey == NULL) { in tls_process_cke_dhe() 2982 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 2992 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3007 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local 3030 if (skey == NULL) { in tls_process_cke_ecdhe() 3036 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3047 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
|
/third_party/backends/backend/ |
H A D | hs2p-scsi.c | 433 struct sense_key *skey; in sense_handler() local 479 skey = lookup_sensekey_errmsg (sense); /* simple sequential search */ in sense_handler() 480 DBG (DBG_sense, "sense_handler: sense_key=%#x '%s - %s'\n", skey->key, in sense_handler() 481 skey->meaning, skey->description); in sense_handler() 773 skey->meaning, skey->description, ascq_key->description, status); in sense_handler()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2021 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() 2058 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2059 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2114 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff() 2020 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) X509_CRL_diff() argument
|
/third_party/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2023 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() 2060 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2061 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2116 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff() 2022 X509_CRL_diff(X509_CRL *base, X509_CRL *newer, EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) X509_CRL_diff() argument
|