HomeSort by relevance Sort by last modified time
    Searched refs:keyLen (Results 1 - 25 of 63) sorted by null

1 2 3

  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
keyTypes.h 66 TI_UINT32 keyLen; /**< Key length */
keyDeriveWep.c 114 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
115 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232))
118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen);
124 key.encLen = (TI_UINT16)pEncodedKey->keyLen;
125 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen);
162 key.encLen = (TI_UINT16)pKeyDerive->key.keyLen;
194 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
195 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
196 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)
    [all...]
keyDeriveCkip.c 118 if (pEncodedKey->keyLen != KEY_DERIVE_CKIP_ENC_LEN)
120 if ((pEncodedKey->keyLen != KEY_DERIVE_CKIP_5_LEN) && (pEncodedKey->keyLen != KEY_DERIVE_CKIP_13_LEN))
122 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_CKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
131 if (keyIndex >= pEncodedKey->keyLen)
135 /*keyIndex = ((keyIndex+1) <pEncodedKey->keyLen) ? keyIndex+1 : 0;*/
152 key.encLen = pEncodedKey->keyLen;
keyDeriveAes.c 116 if ( pEncodedKey->keyLen < (sizeof(keyMaterialAes_t) - 2) )
118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
keyDeriveTkip.c 121 if ( pEncodedKey->keyLen < (sizeof(keyMaterialTkip_t) - 2) )
123 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_TKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
keyParserExternal.c 225 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength;
232 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength;
241 encodedKeyMaterial.keyLen = MAC_ADDR_LEN+KEY_RSC_LEN+pKeyDesc->KeyLength;
247 TRACE2(pKeyParser->hReport, REPORT_SEVERITY_INFORMATION, "EXT_KEY_PARSER: Key received keyId=%x, keyLen=%d \n", pKeyDesc->KeyIndex, pKeyDesc->KeyLength );
362 encodedKeyMaterial.keyLen = 0;
mainSecKeysOnly.h 98 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, TI_UINT8* pKey, TI_UINT8 keyLen);
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/
keyTypes.h 67 UINT32 keyLen; /**< Key length */
mainSecKeysOnly.h 99 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, UINT8* pKey, UINT8 keyLen);
  /system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/
keyTypes.h 66 TI_UINT32 keyLen; /**< Key length */
keyDeriveWep.c 114 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
115 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232))
118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen);
124 key.encLen = (TI_UINT16)pEncodedKey->keyLen;
125 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen);
162 key.encLen = (TI_UINT16)pKeyDerive->key.keyLen;
194 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
195 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
196 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)
    [all...]
keyDeriveCkip.c 118 if (pEncodedKey->keyLen != KEY_DERIVE_CKIP_ENC_LEN)
120 if ((pEncodedKey->keyLen != KEY_DERIVE_CKIP_5_LEN) && (pEncodedKey->keyLen != KEY_DERIVE_CKIP_13_LEN))
122 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_CKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
131 if (keyIndex >= pEncodedKey->keyLen)
135 /*keyIndex = ((keyIndex+1) <pEncodedKey->keyLen) ? keyIndex+1 : 0;*/
152 key.encLen = pEncodedKey->keyLen;
keyDeriveAes.c 116 if ( pEncodedKey->keyLen < (sizeof(keyMaterialAes_t) - 2) )
118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
keyDeriveTkip.c 121 if ( pEncodedKey->keyLen < (sizeof(keyMaterialTkip_t) - 2) )
123 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_TKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
keyParserExternal.c 227 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength;
234 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength;
243 encodedKeyMaterial.keyLen = MAC_ADDR_LEN+KEY_RSC_LEN+pKeyDesc->KeyLength;
249 TRACE2(pKeyParser->hReport, REPORT_SEVERITY_INFORMATION, "EXT_KEY_PARSER: Key received keyId=%x, keyLen=%d \n", pKeyDesc->KeyIndex, pKeyDesc->KeyLength );
364 encodedKeyMaterial.keyLen = 0;
mainSecKeysOnly.h 98 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, TI_UINT8* pKey, TI_UINT8 keyLen);
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/params/
KeyParameter.java 19 int keyLen)
21 this.key = new byte[keyLen];
23 System.arraycopy(key, keyOff, this.key, 0, keyLen);
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/
keyDeriveWep.c 115 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
117 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232))
120 ("DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen));
126 key.encLen = (UINT16)pEncodedKey->keyLen;
127 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen);
164 key.encLen = (UINT16)pKeyDerive->key.keyLen;
196 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) &&
197 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) &&
198 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)
    [all...]
keyDeriveAes.c 115 if (pEncodedKey->keyLen < sizeof(keyMaterialAes_t))
119 pEncodedKey->keyLen));
178 if (pEncodedKey->keyLen != DERIVE_AES_KEY_LEN)
186 key.encLen = (UINT16)pEncodedKey->keyLen;
  /frameworks/base/libs/utils/
BackupData.cpp 116 ssize_t keyLen;
118 keyLen = k.length();
121 header.keyLen = tolel(keyLen);
131 amt = write(m_fd, k.string(), keyLen+1);
132 if (amt != keyLen+1) {
138 amt = write_padding_for(keyLen+1);
250 m_header.entity.keyLen = fromlel(m_header.entity.keyLen);
251 if (m_header.entity.keyLen <= 0)
    [all...]
  /external/chromium/net/third_party/nss/ssl/
preenc.h 80 unsigned char keyLen[2];
89 unsigned char keyLen[2];
98 +GetInt2(header->keyIDLen)+GetInt2(header->keyLen)])
104 +GetInt2(header->serialLen)+GetInt2(header->keyLen)])
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-api-fst.h 55 int keyLen; /* Length of the key */
84 int rijndael_makeKey(keyInstance *key, u_int8_t direction, int keyLen, char *keyMaterial);
  /frameworks/base/media/libstagefright/rtsp/
AAMRAssembler.cpp 36 size_t keyLen = strlen(key);
44 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) {
45 value->setTo(&s[keyLen + 1], len - keyLen - 1);
48 if (len == keyLen && !strncmp(s, key, keyLen)) {
AMPEG4ElementaryAssembler.cpp 40 size_t keyLen = strlen(key);
52 if (len >= keyLen + 1 && s[keyLen] == '='
53 && !strncasecmp(s, key, keyLen)) {
54 value->setTo(&s[keyLen + 1], len - keyLen - 1);
  /external/qemu/android/utils/
ini.c 65 iniFile_addPair( IniFile* i, const char* key, int keyLen,
80 AARRAY_NEW(pair->key, keyLen + valueLen + 2);
81 memcpy(pair->key, key, keyLen);
82 pair->key[keyLen] = 0;
84 pair->value = pair->key + keyLen + 1;
182 int keyLen;
209 keyLen = p - key;
235 iniFile_addPair(ini, key, keyLen, value, valueLen);
237 keyLen, key, valueLen, value);

Completed in 271 milliseconds

1 2 3