Home
last modified time | relevance | path

Searched refs:ke (Results 1 - 25 of 36) sorted by relevance

12

/third_party/libwebsockets/lib/cose/
H A Dcose_key.c143 const struct lws_gencrypto_keyelem *ke; in lws_cose_key_checks() local
168 ke = &key->meta[COSEKEY_META_KTY]; in lws_cose_key_checks()
169 if (ke->buf && (strlen(kty_strings[kty]) != ke->len || in lws_cose_key_checks()
170 memcmp(kty_strings[kty], ke->buf, ke->len))) { in lws_cose_key_checks()
172 lwsl_hexdump_notice(ke->buf, ke->len); in lws_cose_key_checks()
202 ke = &key->meta[COSEKEY_META_KEY_OPS]; in lws_cose_key_checks()
203 if (ke in lws_cose_key_checks()
309 struct lws_gencrypto_keyelem *ke = NULL; cb_cose_key() local
772 struct lws_gencrypto_keyelem *ke = &ck->meta[COSEKEY_META_KID]; lws_cose_key_from_set() local
791 struct lws_gencrypto_keyelem *ke; lws_cose_key_generate() local
1039 struct lws_gencrypto_keyelem *ke = lws_cose_key_export() local
1066 struct lws_gencrypto_keyelem *ke = NULL; lws_cose_key_export() local
[all...]
H A Dcose_sign.c108 const struct lws_gencrypto_keyelem *ke; in lws_cose_sign_payload_chunk() local
266 ke = &alg->cose_key->meta[COSEKEY_META_KID]; in lws_cose_sign_payload_chunk()
267 if (ke->len) { in lws_cose_sign_payload_chunk()
270 (int)ke->len, ke->buf); in lws_cose_sign_payload_chunk()
483 ke = &alg->cose_key->meta[COSEKEY_META_KID]; in lws_cose_sign_payload_chunk()
484 if (ke->len) { in lws_cose_sign_payload_chunk()
487 (int)ke->len, ke->buf); in lws_cose_sign_payload_chunk()
H A Dcose_validate_alg.c33 struct lws_gencrypto_keyelem *ke; in lws_cose_val_alg_create() local
109 ke = &ck->e[LWS_GENCRYPTO_OCT_KEYEL_K]; in lws_cose_val_alg_create()
110 if (lws_genhmac_init(&alg->u.hmacctx, ghm, ke->buf, ke->len)) in lws_cose_val_alg_create()
H A Dcose_sign_alg.c33 const struct lws_gencrypto_keyelem *ke; in lws_cose_sign_alg_create() local
109 ke = &ck->e[LWS_GENCRYPTO_OCT_KEYEL_K]; in lws_cose_sign_alg_create()
110 if (lws_genhmac_init(&alg->u.hmacctx, ghm, ke->buf, ke->len)) in lws_cose_sign_alg_create()
H A Dcose_validate.c449 struct lws_gencrypto_keyelem *ke; in cb_cose_sig() local
872 ke = &sl->kid; in cb_cose_sig()
873 if (ke->buf) in cb_cose_sig()
874 lws_free(ke->buf); in cb_cose_sig()
875 ke->buf = lws_malloc(ctx->npos, __func__); in cb_cose_sig()
876 if (!ke->buf) in cb_cose_sig()
878 ke->len = ctx->npos; in cb_cose_sig()
879 memcpy(ke->buf, ctx->buf, ctx->npos); in cb_cose_sig()
/third_party/icu/icu4j/tools/misc/src/com/ibm/icu/dev/tool/ime/translit/
H A DTransliteratorInputMethod.java377 KeyEvent ke = (KeyEvent)event; in dispatchEvent()
378 if (TRACE_EVENT) System.out.println("TIM: " + eventInfo(ke)); in dispatchEvent()
379 if ((ke.getModifiers() & MODIFIERS) != 0) { in dispatchEvent()
382 if (handleTyped(ke.getKeyChar())) { in dispatchEvent()
383 ke.consume(); in dispatchEvent()
391 KeyEvent ke = (KeyEvent)event; in dispatchEvent()
392 if (TRACE_EVENT) System.out.println("TIM: " + eventInfo(ke)); in dispatchEvent()
393 if (handlePressed(ke.getKeyCode())) { in dispatchEvent()
394 ke.consume(); in dispatchEvent()
401 KeyEvent ke in dispatchEvent()
[all...]
/third_party/skia/third_party/externals/libjpeg-turbo/
H A Djcarith.c464 int tbl, k, ke; in METHODDEF() local
485 for (ke = cinfo->Se; ke > 0; ke--) in METHODDEF()
490 if ((v = (*block)[jpeg_natural_order[ke]]) >= 0) { in METHODDEF()
498 for (k = cinfo->Ss; k <= ke; k++) { in METHODDEF()
598 int tbl, k, ke, kex; in METHODDEF() local
619 for (ke = cinfo->Se; ke > 0; ke in METHODDEF()
692 int blkn, ci, tbl, k, ke; METHODDEF() local
[all...]
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-sign/
H A Dmain.c100 const struct lws_gencrypto_keyelem *ke; in main() local
368 ke = &res->cose_key->meta[COSEKEY_META_KID]; in main()
369 if (ke && ke->buf) in main()
370 lws_hex_from_byte_array(ke->buf, ke->len, in main()
/third_party/mesa3d/src/gallium/auxiliary/gallivm/
H A Dlp_bld_type.c358 LLVMTypeKind ke = LLVMGetTypeKind(te); in lp_dump_llvmtype() local
360 if (ke == LLVMIntegerTypeKind) { in lp_dump_llvmtype()
365 debug_printf("Vector [%u] of %s\n", len, lp_typekind_name(ke)); in lp_dump_llvmtype()
370 LLVMTypeKind ke = LLVMGetTypeKind(te); in lp_dump_llvmtype() local
372 debug_printf("Array [%u] of %s\n", len, lp_typekind_name(ke)); in lp_dump_llvmtype()
/third_party/ffmpeg/libavfilter/
H A Dvf_xbr.c102 const unsigned ke = df(PF,PG); \
104 const int left = ke<<1 <= ki && PE != PG && PD != PG; \
105 const int up = ke >= ki<<1 && PE != PC && PB != PC; \
136 const unsigned ke = df(PF,PG); \
138 const int left = ke<<1 <= ki && PE != PG && PD != PG; \
139 const int up = ke >= ki<<1 && PE != PC && PB != PC; \
178 const unsigned ke = df(PF,PG); \
180 const int left = ke<<1 <= ki && PE != PG && PD != PG; \
181 const int up = ke >= ki<<1 && PE != PC && PB != PC; \
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-key/
H A Dmain.c216 struct lws_gencrypto_keyelem *ke = in main() local
221 if (!kid_len || (ke->len && in main()
222 ke->len == (uint32_t)kid_len && in main()
223 !memcmp(ke->buf, kid, kid_len))) { in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_eke_common.c466 os_memcpy(sess->ke, buf, ke_len); in eap_eke_derive_ke_ki()
467 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len); in eap_eke_derive_ke_ki()
627 if (aes_128_cbc_encrypt(sess->ke, iv, e, data_len + pad) < 0 || in eap_eke_prot()
675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { in eap_eke_decrypt_prot()
725 os_memset(sess->ke, 0, EAP_EKE_MAX_KE_LEN); in eap_eke_session_clean()
H A Deap_eke_common.h69 u8 ke[EAP_EKE_MAX_KE_LEN]; member
H A Dikev2_common.h298 const u8 *ke; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_eke_common.c466 os_memcpy(sess->ke, buf, ke_len); in eap_eke_derive_ke_ki()
467 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len); in eap_eke_derive_ke_ki()
627 if (aes_128_cbc_encrypt(sess->ke, iv, e, data_len + pad) < 0 || in eap_eke_prot()
675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { in eap_eke_decrypt_prot()
725 os_memset(sess->ke, 0, EAP_EKE_MAX_KE_LEN); in eap_eke_session_clean()
H A Deap_eke_common.h69 u8 ke[EAP_EKE_MAX_KE_LEN]; member
H A Dikev2_common.h298 const u8 *ke; member
/third_party/typescript/tests/baselines/reference/
H A DobjectRestAssignment.js10 let overEmit: { a: { ka: string, x: string }[], b: { z: string, ki: string, ku: string }, ke: string, ko: string };
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Deloop.c320 struct kevent ke; in eloop_sock_queue() local
322 EV_SET(&ke, sock, event_type_kevent_filter(type), EV_ADD, 0, 0, 0); in eloop_sock_queue()
323 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) == -1) { in eloop_sock_queue()
463 struct kevent ke; in eloop_sock_table_remove_sock() local
495 EV_SET(&ke, sock, event_type_kevent_filter(table->type), EV_DELETE, 0, in eloop_sock_table_remove_sock()
497 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) < 0) { in eloop_sock_table_remove_sock()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Deloop.c322 struct kevent ke; in eloop_sock_queue() local
324 EV_SET(&ke, sock, event_type_kevent_filter(type), EV_ADD, 0, 0, 0); in eloop_sock_queue()
325 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) == -1) { in eloop_sock_queue()
466 struct kevent ke; in eloop_sock_table_remove_sock() local
498 EV_SET(&ke, sock, event_type_kevent_filter(table->type), EV_DELETE, 0, in eloop_sock_table_remove_sock()
500 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) < 0) { in eloop_sock_table_remove_sock()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_reconfig.c392 /* Wrapped Data: {C-nonce, E-nonce, Connection Status}ke */ in dpp_reconfig_build_resp()
398 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_build_resp()
628 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_build_conf()
775 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_auth_resp_rx()
887 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_reconfig_auth_conf_rx()
H A Ddpp_crypto.c436 "DPP: Mx/Nx not available - cannot derive ke"); in dpp_derive_bk_ke()
452 "DPP: Lx not available - cannot derive ke"); in dpp_derive_bk_ke()
467 /* ke = HKDF-Expand(bk, "DPP Key", length) */ in dpp_derive_bk_ke()
468 res = dpp_hkdf_expand(hash_len, auth->bk, hash_len, info_ke, auth->ke, in dpp_derive_bk_ke()
474 "DPP: ke = HKDF-Expand(bk, \"DPP Key\", length)", in dpp_derive_bk_ke()
475 auth->ke, hash_len); in dpp_derive_bk_ke()
1725 /* ke = HKDF(C-nonce | E-nonce, "dpp reconfig key", M.x) */ in dpp_reconfig_derive_ke_responder()
1737 "dpp reconfig key", auth->ke, curve->hash_len) < 0) in dpp_reconfig_derive_ke_responder()
1740 "DPP: ke = HKDF(C-nonce | E-nonce, \"dpp reconfig key\", M.x)", in dpp_reconfig_derive_ke_responder()
1741 auth->ke, curv in dpp_reconfig_derive_ke_responder()
[all...]
H A Ddpp.c677 /* { E-nonce, configAttrib }ke */ in dpp_build_conf_req_attr()
735 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_req_attr()
1735 /* { E-nonce, configurationObject[, sendConnStatus]}ke */ in dpp_build_conf_resp()
1854 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_resp()
1925 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_req_rx()
2896 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_resp_rx()
3041 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conf_result_rx()
3128 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_build_conf_result()
3200 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_conn_status_result_rx()
3352 if (aes_siv_encrypt(auth->ke, aut in dpp_build_conn_status_result()
[all...]
H A Ddpp_auth.c308 /* Wrapped data ({R-nonce, I-nonce, R-capabilities, {R-auth}ke}k2) */ in dpp_auth_build_resp()
370 /* {R-auth}ke */ in dpp_auth_build_resp()
515 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_resp_ok()
520 wpa_hexdump(MSG_DEBUG, "DPP: {R-auth}ke", in dpp_auth_build_resp_ok()
1064 /* I-auth wrapped with ke */ in dpp_auth_build_conf()
1088 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_conf()
1092 wpa_hexdump(MSG_DEBUG, "DPP: {I-auth}ke", in dpp_auth_build_conf()
1683 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_auth_resp_rx()
1936 if (aes_siv_decrypt(auth->ke, auth->curve->hash_len, in dpp_auth_conf_rx()
/third_party/python/Lib/multiprocessing/
H A Dmanagers.py257 except KeyError as ke:
262 raise ke
427 except KeyError as ke:
439 raise ke

Completed in 27 milliseconds

12