/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
keyTypes.h | 66 TI_UINT32 keyLen; /**< Key length */
|
keyDeriveWep.c | 114 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 115 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)) 118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen); 124 key.encLen = (TI_UINT16)pEncodedKey->keyLen; 125 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen); 162 key.encLen = (TI_UINT16)pKeyDerive->key.keyLen; 194 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 195 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 196 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232) [all...] |
keyDeriveCkip.c | 118 if (pEncodedKey->keyLen != KEY_DERIVE_CKIP_ENC_LEN) 120 if ((pEncodedKey->keyLen != KEY_DERIVE_CKIP_5_LEN) && (pEncodedKey->keyLen != KEY_DERIVE_CKIP_13_LEN)) 122 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_CKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen); 131 if (keyIndex >= pEncodedKey->keyLen) 135 /*keyIndex = ((keyIndex+1) <pEncodedKey->keyLen) ? keyIndex+1 : 0;*/ 152 key.encLen = pEncodedKey->keyLen;
|
keyDeriveAes.c | 116 if ( pEncodedKey->keyLen < (sizeof(keyMaterialAes_t) - 2) ) 118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
|
keyDeriveTkip.c | 121 if ( pEncodedKey->keyLen < (sizeof(keyMaterialTkip_t) - 2) ) 123 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_TKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
|
keyParserExternal.c | 225 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength; 232 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength; 241 encodedKeyMaterial.keyLen = MAC_ADDR_LEN+KEY_RSC_LEN+pKeyDesc->KeyLength; 247 TRACE2(pKeyParser->hReport, REPORT_SEVERITY_INFORMATION, "EXT_KEY_PARSER: Key received keyId=%x, keyLen=%d \n", pKeyDesc->KeyIndex, pKeyDesc->KeyLength ); 362 encodedKeyMaterial.keyLen = 0;
|
mainSecKeysOnly.h | 98 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, TI_UINT8* pKey, TI_UINT8 keyLen);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/ |
keyTypes.h | 67 UINT32 keyLen; /**< Key length */
|
mainSecKeysOnly.h | 99 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, UINT8* pKey, UINT8 keyLen);
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
keyTypes.h | 66 TI_UINT32 keyLen; /**< Key length */
|
keyDeriveWep.c | 114 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 115 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)) 118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen); 124 key.encLen = (TI_UINT16)pEncodedKey->keyLen; 125 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen); 162 key.encLen = (TI_UINT16)pKeyDerive->key.keyLen; 194 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 195 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 196 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232) [all...] |
keyDeriveCkip.c | 118 if (pEncodedKey->keyLen != KEY_DERIVE_CKIP_ENC_LEN) 120 if ((pEncodedKey->keyLen != KEY_DERIVE_CKIP_5_LEN) && (pEncodedKey->keyLen != KEY_DERIVE_CKIP_13_LEN)) 122 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_CKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen); 131 if (keyIndex >= pEncodedKey->keyLen) 135 /*keyIndex = ((keyIndex+1) <pEncodedKey->keyLen) ? keyIndex+1 : 0;*/ 152 key.encLen = pEncodedKey->keyLen;
|
keyDeriveAes.c | 116 if ( pEncodedKey->keyLen < (sizeof(keyMaterialAes_t) - 2) ) 118 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_AES: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
|
keyDeriveTkip.c | 121 if ( pEncodedKey->keyLen < (sizeof(keyMaterialTkip_t) - 2) ) 123 TRACE1(pKeyDerive->hReport, REPORT_SEVERITY_ERROR, "KEY_DERIVE_TKIP: ERROR: wrong key length %d !!!\n", pEncodedKey->keyLen);
|
keyParserExternal.c | 227 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength; 234 encodedKeyMaterial.keyLen = pKeyDesc->KeyLength; 243 encodedKeyMaterial.keyLen = MAC_ADDR_LEN+KEY_RSC_LEN+pKeyDesc->KeyLength; 249 TRACE2(pKeyParser->hReport, REPORT_SEVERITY_INFORMATION, "EXT_KEY_PARSER: Key received keyId=%x, keyLen=%d \n", pKeyDesc->KeyIndex, pKeyDesc->KeyLength ); 364 encodedKeyMaterial.keyLen = 0;
|
mainSecKeysOnly.h | 98 TI_STATUS mainSecKeysOnly_setSessionKey(mainSec_t *pMainSec, TI_UINT8* pKey, TI_UINT8 keyLen);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/params/ |
KeyParameter.java | 19 int keyLen) 21 this.key = new byte[keyLen]; 23 System.arraycopy(key, keyOff, this.key, 0, keyLen);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
keyDeriveWep.c | 115 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 116 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 117 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232)) 120 ("DeriveWep_derive: ERROR: it is not WEP key lenghth (len=%d) !!!\n", pEncodedKey->keyLen)); 126 key.encLen = (UINT16)pEncodedKey->keyLen; 127 os_memoryCopy(pKeyDerive->hOs, (void *)key.encKey, pEncodedKey->pData, pEncodedKey->keyLen); 164 key.encLen = (UINT16)pKeyDerive->key.keyLen; 196 if ((pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_40) && 197 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_104) && 198 (pEncodedKey->keyLen != DERIVE_WEP_KEY_LEN_232) [all...] |
keyDeriveAes.c | 115 if (pEncodedKey->keyLen < sizeof(keyMaterialAes_t)) 119 pEncodedKey->keyLen)); 178 if (pEncodedKey->keyLen != DERIVE_AES_KEY_LEN) 186 key.encLen = (UINT16)pEncodedKey->keyLen;
|
/frameworks/base/libs/utils/ |
BackupData.cpp | 116 ssize_t keyLen; 118 keyLen = k.length(); 121 header.keyLen = tolel(keyLen); 131 amt = write(m_fd, k.string(), keyLen+1); 132 if (amt != keyLen+1) { 138 amt = write_padding_for(keyLen+1); 250 m_header.entity.keyLen = fromlel(m_header.entity.keyLen); 251 if (m_header.entity.keyLen <= 0) [all...] |
/external/chromium/net/third_party/nss/ssl/ |
preenc.h | 80 unsigned char keyLen[2]; 89 unsigned char keyLen[2]; 98 +GetInt2(header->keyIDLen)+GetInt2(header->keyLen)]) 104 +GetInt2(header->serialLen)+GetInt2(header->keyLen)])
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-api-fst.h | 55 int keyLen; /* Length of the key */ 84 int rijndael_makeKey(keyInstance *key, u_int8_t direction, int keyLen, char *keyMaterial);
|
/frameworks/base/media/libstagefright/rtsp/ |
AAMRAssembler.cpp | 36 size_t keyLen = strlen(key); 44 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) { 45 value->setTo(&s[keyLen + 1], len - keyLen - 1); 48 if (len == keyLen && !strncmp(s, key, keyLen)) {
|
AMPEG4ElementaryAssembler.cpp | 40 size_t keyLen = strlen(key); 52 if (len >= keyLen + 1 && s[keyLen] == '=' 53 && !strncasecmp(s, key, keyLen)) { 54 value->setTo(&s[keyLen + 1], len - keyLen - 1);
|
/external/qemu/android/utils/ |
ini.c | 65 iniFile_addPair( IniFile* i, const char* key, int keyLen, 80 AARRAY_NEW(pair->key, keyLen + valueLen + 2); 81 memcpy(pair->key, key, keyLen); 82 pair->key[keyLen] = 0; 84 pair->value = pair->key + keyLen + 1; 182 int keyLen; 209 keyLen = p - key; 235 iniFile_addPair(ini, key, keyLen, value, valueLen); 237 keyLen, key, valueLen, value);
|