/hardware/broadcom/wlan/bcm4329/src/shared/ |
miniopt.c | 64 int keylen; local 106 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 107 if (keylen > 63) keylen = 63; 108 memcpy(t->key, p + 2, keylen);
|
/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 87 int keylen, x, y, j; local 94 keylen = prng->rc4.x; 103 if (j == keylen) {
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2743 u_int keylen, prflen; local [all...] |
/external/openssl/crypto/hmac/ |
hm_pmeth.c | 221 long keylen; local 222 key = string_to_hex(value, &keylen); 225 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 82 int keylen, unsigned char *out) 95 tkeylen = keylen; 137 h__dump (out, keylen); 144 int keylen, unsigned char *out) 147 keylen, out); 174 unsigned int keylen; local 220 keylen = EVP_CIPHER_CTX_key_length(ctx); 221 OPENSSL_assert(keylen <= sizeof key); 244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 279 keylen, key) [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 14 const unsigned char *key, unsigned long keylen, 18 const unsigned char *key, unsigned long keylen, 22 unsigned long keylen, 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 42 const unsigned char *key, unsigned long keylen, 46 const unsigned char *key, unsigned long keylen, 50 const unsigned char *key, unsigned long keylen, 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 77 const unsigned char *key, unsigned long keylen, 355 keylen, member in struct:__anon3297 [all...] |
tomcrypt_cipher.h | 102 ulong32 K[32], keylen; member in struct:cast5_key 333 @param keylen The length of the input key (octets) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 443 @param keylen The length of the secret key (octets) 458 const unsigned char *key, unsigned long keylen, 469 @param keylen The length of the secret key 483 const unsigned char *key, unsigned long keylen, 493 @param keylen The key length (octets) 501 const unsigned char *key, unsigned long keylen, 507 @param keylen The key length (octets) [all...] |
/external/grub/stage2/ |
md5.c | 209 int keylen = strlen (key); local 238 md5_update (key, keylen); 240 md5_update (key, keylen); 246 md5_update (key, keylen); 248 for (i = keylen; i > 16; i -= 16) 252 for (i = keylen; i > 0; i >>= 1) 253 md5_update (key + ((i & 1) ? keylen : 0), 1); 263 md5_update (key, keylen); 271 md5_update (key, keylen); 276 md5_update (key, keylen); [all...] |
/external/wpa_supplicant/ |
crypto_internal.c | 236 size_t keylen; member in struct:crypto_cipher::__anon8233::__anon8234 270 ctx->u.rc4.keylen = key_len; 318 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 369 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_libtomcrypt.c | 298 size_t keylen; member in struct:crypto_cipher::__anon8238::__anon8239 342 ctx->u.rc4.keylen = key_len; 365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
radius.c | 902 size_t keylen; local 914 &keylen); 916 keys->send = decrypt_ms_key(key, keylen, 925 &keylen); 927 keys->recv = decrypt_ms_key(key, keylen, 943 size_t keylen; local 954 RADIUS_CISCO_AV_PAIR, &keylen); 955 if (key && keylen == 51 && 957 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 395 int keylen; local 404 keylen = 16; 408 keylen = 32; 417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 599 size_t gtk_len, keylen, rsc_len; local 624 keylen = 16; 629 keylen = 32; 634 keylen = 13; 639 keylen = 5; 649 if (gtk_len < keylen) { [all...] |
wpa.c | 515 int keylen, rsclen; local 525 keylen = 16; 530 keylen = 32; 551 (u8 *) sm->ptk.tk1, keylen) < 0) { 553 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 554 alg, keylen, MAC2STR(sm->bssid)); 569 int keylen, int maxkeylen, 576 if (keylen != 16 || maxkeylen < 16) { 584 if (keylen != 32 || maxkeylen < 32) { 592 if (keylen != 13 || maxkeylen < 13) 946 u16 key_info, keylen, len; local [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 723 unsigned int saltlen, unsigned int keylen, 745 enctmp = OPENSSL_malloc(keylen + 8); 758 inlen = keylen - 8; 789 ret = b2i_PrivateKey(&p, keylen); 803 unsigned int saltlen, keylen; local 811 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 813 buflen = (int) keylen + saltlen; 826 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 322 int keylen,ivlen; local 331 keylen=EVP_CIPHER_key_length(evp_cipher); 358 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 361 OPENSSL_cleanse(key, keylen); 502 int keylen,ivlen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_internal.c | 237 size_t keylen; member in struct:crypto_cipher::__anon8399::__anon8400 271 ctx->u.rc4.keylen = key_len; 319 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 370 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_libtomcrypt.c | 298 size_t keylen; member in struct:crypto_cipher::__anon8404::__anon8405 342 ctx->u.rc4.keylen = key_len; 365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/bluetooth/bluez/tools/ |
bccmd.c | 277 uint16_t handle, keylen; local 295 keylen = array[2] | (array[3] << 8); 297 printf("Crypt key length: %d bit\n", keylen * 8); 1075 { "keylen", cmd_keylen, "<handle>", "Get current crypt key length" },
|
/external/iproute2/ip/ |
ipxfrm.c | 508 int keylen; local 524 keylen = algo->alg_key_len / 8; 525 if (len < keylen) { 531 for (i = 0; i < keylen; i ++)
|
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 144 int keylen; member in struct:__anon5394 162 int keylen; member in struct:__anon5395 249 sess.keylen = ciphers[i].keylen; 288 sess.mackeylen = digests[i].keylen; 419 ctx->key_len == ciphers[i].keylen) { 435 sess->keylen = ctx->key_len; 661 return digests[i].keylen; 1261 int fd, keylen; local 1269 keylen = BN_num_bits(dh->p) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 906 size_t keylen; local 918 &keylen); 920 keys->send = decrypt_ms_key(key, keylen, 929 &keylen); 931 keys->recv = decrypt_ms_key(key, keylen, 947 size_t keylen; local 958 RADIUS_CISCO_AV_PAIR, &keylen); 959 if (key && keylen == 51 && 961 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.c | 143 size_t keylen; local 164 keylen = 16; 171 keylen = 32; 184 0, 1, seq, 6, key, keylen); [all...] |