/third_party/ltp/lib/ |
H A D | tst_af_alg.c | 138 uint8_t *keybuf = NULL; in tst_alg_setkey() local 143 keybuf = SAFE_MALLOC(keylen); in tst_alg_setkey() 145 keybuf[i] = rand(); in tst_alg_setkey() 146 key = keybuf; in tst_alg_setkey() 153 free(keybuf); in tst_alg_setkey()
|
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pvkfmt.c | 828 unsigned char keybuf[20]; in do_PVK_body_key() local 860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key() 875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 884 memset(keybuf + 5, 0, 11); in do_PVK_body_key() 885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key() 1056 unsigned char keybuf[20]; in i2b_PVK() local 1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK() 1072 memset(keybuf in i2b_PVK() [all...] |
/third_party/openssl/crypto/pem/ |
H A D | pvkfmt.c | 828 unsigned char keybuf[20]; in do_PVK_body_key() local 860 if (!derive_pvk_key(keybuf, p, saltlen, in do_PVK_body_key() 875 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 884 memset(keybuf + 5, 0, 11); in do_PVK_body_key() 885 if (!EVP_DecryptInit_ex(cctx, rc4, NULL, keybuf, NULL)) in do_PVK_body_key() 911 OPENSSL_cleanse(keybuf, sizeof(keybuf)); in do_PVK_body_key() 1056 unsigned char keybuf[20]; in i2b_PVK() local 1066 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, in i2b_PVK() 1072 memset(keybuf in i2b_PVK() [all...] |
/third_party/protobuf/ruby/ext/google/protobuf_c/ |
H A D | map.c | 365 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index() local 369 key = table_key(self, key, keybuf, &keyval, &length); in Map_index() 389 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_index_set() local 394 key = table_key(self, key, keybuf, &keyval, &length); in Map_index_set() 426 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_has_key() local 429 key = table_key(self, key, keybuf, &keyval, &length); in Map_has_key() 447 char keybuf[TABLE_KEY_BUF_LENGTH]; in Map_delete() local 451 key = table_key(self, key, keybuf, &keyval, &length); in Map_delete()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 635 u8 *keybuf, *pos; in ikev2_derive_sk_keys() local 650 keybuf = os_malloc(keybuf_len); in ikev2_derive_sk_keys() 651 if (keybuf == NULL) in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 656 os_free(keybuf); in ikev2_derive_sk_keys() 660 pos = keybuf; in ikev2_derive_sk_keys() 717 os_free(keybuf); in ikev2_derive_sk_keys()
|
/third_party/toybox/toys/other/ |
H A D | hexedit.c | 123 char keybuf[16]; in hexedit_main() local 125 *keybuf = 0; in hexedit_main() 187 key = scan_key(keybuf, -1); in hexedit_main()
|
/third_party/musl/src/crypt/ |
H A D | crypt_des.c | 880 unsigned char keybuf[8]; in _crypt_extended_r_uut() local 889 q = keybuf; in _crypt_extended_r_uut() 890 while (q <= &keybuf[sizeof(keybuf) - 1]) { in _crypt_extended_r_uut() 895 __des_setkey(keybuf, &ekey); in _crypt_extended_r_uut() 923 des_cipher(keybuf, keybuf, 1, 0, &ekey); in _crypt_extended_r_uut() 927 q = keybuf; in _crypt_extended_r_uut() 928 while (q <= &keybuf[sizeof(keybuf) in _crypt_extended_r_uut() [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | asfcrypt.c | 50 * @brief read keys from keybuf into keys 51 * @param keybuf buffer containing the keys 55 static void multiswap_init(const uint8_t keybuf[48], uint32_t keys[12]) in multiswap_init() argument 59 keys[i] = AV_RL32(keybuf + (i << 2)) | 1; in multiswap_init()
|
/third_party/libwebsockets/plugins/ssh-base/ |
H A D | sshd.c | 150 uint8_t keybuf[256]; in offer() local 152 keylen = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in offer() 158 n = ed25519_key_parse(keybuf, (unsigned int)keylen, in offer() 303 uint8_t keybuf[256]; in handle_name() local 312 len = (int)get_gen_server_key_25519(pss, keybuf, (int)sizeof(keybuf)); in handle_name() 315 if (ed25519_key_parse(keybuf, (unsigned int)len, in handle_name()
|
/third_party/node/test/parallel/ |
H A D | test-crypto-key-objects.js | 69 const keybuf = randomBytes(32); 70 const key = createSecretKey(keybuf); 78 assert(keybuf.equals(exportedKey));
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 217 uint8_t keybuf[64], ivbuf[64], hp_keybuf[64]; in ngtcp2_crypto_derive_and_install_rx_key() local 228 key = keybuf; in ngtcp2_crypto_derive_and_install_rx_key() 358 uint8_t keybuf[64], ivbuf[64], hp_keybuf[64]; in ngtcp2_crypto_derive_and_install_tx_key() local 369 key = keybuf; in ngtcp2_crypto_derive_and_install_tx_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 2172 u8 keybuf[WPA_GTK_MAX_LEN]; in wpa_ft_gtk_subelem() local 2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem() 2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem() 2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem() 2205 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2208 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem() 2209 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem() 2211 key = keybuf; in wpa_ft_gtk_subelem() 2217 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2219 key = keybuf; in wpa_ft_gtk_subelem() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_ft.c | 2172 u8 keybuf[32]; in wpa_ft_gtk_subelem() local 2185 if (key_len > sizeof(keybuf)) in wpa_ft_gtk_subelem() 2197 if (pad_len && key_len < sizeof(keybuf)) { in wpa_ft_gtk_subelem() 2198 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); in wpa_ft_gtk_subelem() 2199 os_memset(keybuf + key_len, 0, pad_len); in wpa_ft_gtk_subelem() 2200 keybuf[key_len] = 0xdd; in wpa_ft_gtk_subelem() 2202 key = keybuf; in wpa_ft_gtk_subelem() 2229 forced_memzero(keybuf, sizeof(keybuf)); in wpa_ft_gtk_subelem()
|
/third_party/toybox/toys/pending/ |
H A D | vi.c | 1500 char keybuf[16] = {0}; in vi_main() local 1539 key = scan_key(keybuf, -1); in vi_main() 1541 } else key = scan_key(keybuf, -1); in vi_main()
|