HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 32) sorted by null

1 2

  /hardware/broadcom/wlan/bcm4329/src/shared/
miniopt.c 64 int keylen; local
106 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
107 if (keylen > 63) keylen = 63;
108 memcpy(t->key, p + 2, keylen);
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 87 int keylen, x, y, j; local
94 keylen = prng->rc4.x;
103 if (j == keylen) {
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
oakley.c 2743 u_int keylen, prflen; local
    [all...]
  /external/openssl/crypto/hmac/
hm_pmeth.c 221 long keylen; local
222 key = string_to_hex(value, &keylen);
225 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/openssl/crypto/evp/
p5_crpt2.c 82 int keylen, unsigned char *out)
95 tkeylen = keylen;
137 h__dump (out, keylen);
144 int keylen, unsigned char *out)
147 keylen, out);
174 unsigned int keylen; local
220 keylen = EVP_CIPHER_CTX_key_length(ctx);
221 OPENSSL_assert(keylen <= sizeof key);
244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
279 keylen, key)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon3297
    [all...]
tomcrypt_cipher.h 102 ulong32 K[32], keylen; member in struct:cast5_key
333 @param keylen The length of the input key (octets)
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
443 @param keylen The length of the secret key (octets)
458 const unsigned char *key, unsigned long keylen,
469 @param keylen The length of the secret key
483 const unsigned char *key, unsigned long keylen,
493 @param keylen The key length (octets)
501 const unsigned char *key, unsigned long keylen,
507 @param keylen The key length (octets)
    [all...]
  /external/grub/stage2/
md5.c 209 int keylen = strlen (key); local
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
248 for (i = keylen; i > 16; i -= 16)
252 for (i = keylen; i > 0; i >>= 1)
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
    [all...]
  /external/wpa_supplicant/
crypto_internal.c 236 size_t keylen; member in struct:crypto_cipher::__anon8233::__anon8234
270 ctx->u.rc4.keylen = key_len;
318 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
369 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 298 size_t keylen; member in struct:crypto_cipher::__anon8238::__anon8239
342 ctx->u.rc4.keylen = key_len;
365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
radius.c 902 size_t keylen; local
914 &keylen);
916 keys->send = decrypt_ms_key(key, keylen,
925 &keylen);
927 keys->recv = decrypt_ms_key(key, keylen,
943 size_t keylen; local
954 RADIUS_CISCO_AV_PAIR, &keylen);
955 if (key && keylen == 51 &&
957 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 395 int keylen; local
404 keylen = 16;
408 keylen = 32;
417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
599 size_t gtk_len, keylen, rsc_len; local
624 keylen = 16;
629 keylen = 32;
634 keylen = 13;
639 keylen = 5;
649 if (gtk_len < keylen) {
    [all...]
wpa.c 515 int keylen, rsclen; local
525 keylen = 16;
530 keylen = 32;
551 (u8 *) sm->ptk.tk1, keylen) < 0) {
553 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
554 alg, keylen, MAC2STR(sm->bssid));
569 int keylen, int maxkeylen,
576 if (keylen != 16 || maxkeylen < 16) {
584 if (keylen != 32 || maxkeylen < 32) {
592 if (keylen != 13 || maxkeylen < 13)
946 u16 key_info, keylen, len; local
    [all...]
  /external/openssl/crypto/pem/
pvkfmt.c 723 unsigned int saltlen, unsigned int keylen,
745 enctmp = OPENSSL_malloc(keylen + 8);
758 inlen = keylen - 8;
789 ret = b2i_PrivateKey(&p, keylen);
803 unsigned int saltlen, keylen; local
811 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
813 buflen = (int) keylen + saltlen;
826 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
  /external/openssl/crypto/pkcs7/
pk7_doit.c 142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
322 int keylen,ivlen; local
331 keylen=EVP_CIPHER_key_length(evp_cipher);
358 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
361 OPENSSL_cleanse(key, keylen);
502 int keylen,ivlen;
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_internal.c 237 size_t keylen; member in struct:crypto_cipher::__anon8399::__anon8400
271 ctx->u.rc4.keylen = key_len;
319 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
370 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 298 size_t keylen; member in struct:crypto_cipher::__anon8404::__anon8405
342 ctx->u.rc4.keylen = key_len;
365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/bluetooth/bluez/tools/
bccmd.c 277 uint16_t handle, keylen; local
295 keylen = array[2] | (array[3] << 8);
297 printf("Crypt key length: %d bit\n", keylen * 8);
1075 { "keylen", cmd_keylen, "<handle>", "Get current crypt key length" },
  /external/iproute2/ip/
ipxfrm.c 508 int keylen; local
524 keylen = algo->alg_key_len / 8;
525 if (len < keylen) {
531 for (i = 0; i < keylen; i ++)
  /external/openssl/crypto/engine/
eng_cryptodev.c 144 int keylen; member in struct:__anon5394
162 int keylen; member in struct:__anon5395
249 sess.keylen = ciphers[i].keylen;
288 sess.mackeylen = digests[i].keylen;
419 ctx->key_len == ciphers[i].keylen) {
435 sess->keylen = ctx->key_len;
661 return digests[i].keylen;
1261 int fd, keylen; local
1269 keylen = BN_num_bits(dh->p)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 906 size_t keylen; local
918 &keylen);
920 keys->send = decrypt_ms_key(key, keylen,
929 &keylen);
931 keys->recv = decrypt_ms_key(key, keylen,
947 size_t keylen; local
958 RADIUS_CISCO_AV_PAIR, &keylen);
959 if (key && keylen == 51 &&
961 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.c 143 size_t keylen; local
164 keylen = 16;
171 keylen = 32;
184 0, 1, seq, 6, key, keylen);
    [all...]

Completed in 1018 milliseconds

1 2