/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 42 /* set keysize to zero */
|
yarrow.c | 203 if ((err = cipher_descriptor[prng->yarrow.cipher].keysize(&ks)) != CRYPT_OK) {
|
/external/webkit/Source/WebCore/platform/mac/ |
WebCoreSystemInterface.mm | 51 CFStringRef (*wkSignedPublicKeyAndChallengeString)(unsigned keySize, CFStringRef challenge, CFStringRef keyDescription);
|
WebCoreSystemInterface.h | 120 extern CFStringRef (*wkSignedPublicKeyAndChallengeString)(unsigned keySize, CFStringRef challenge, CFStringRef keyDescription);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
key_prot.h | 58 #define KEYSIZE 192
|
nis_object.x | 139 * keysize to 8192 bits. This is consider to be a reasonable limit for
|
/system/media/wilhelm/src/android/ |
android_AudioSfDecoder.h | 67 bool getPcmFormatKeyName(uint32_t index, uint32_t keySize, char* keyName);
|
android_AudioSfDecoder.cpp | 108 bool AudioSfDecoder::getPcmFormatKeyName(uint32_t index, uint32_t keySize, char* keyName) { 113 if (keySize < actualKeySize) {
|
/system/media/wilhelm/tests/examples/ |
slesTestDecodeAac.cpp | 597 SLuint32 keySize, valueSize; 600 keyInfo = NULL; keySize = 0; 602 res = (*mdExtrItf)->GetKeySize(mdExtrItf, i, &keySize); 606 keyInfo = (SLMetadataInfo*) malloc(keySize); 608 res = (*mdExtrItf)->GetKey(mdExtrItf, i, keySize, keyInfo);
|
/external/dropbear/libtomcrypt/src/ciphers/ |
cast5.c | [all...] |
khazad.c | 35 #define KEYSIZE 128 36 #define KEYSIZEB (KEYSIZE/8) [all...] |
des.c | [all...] |
/external/dropbear/ |
packet.c | 332 ses.keys->recv_algo_mac->keysize) 536 ses.keys->trans_algo_mac->keysize) != CRYPT_OK) {
|
options.h | 71 * Including multiple keysize variants the same cipher
|
/external/webkit/Source/WebKit/win/ |
WebURLResponse.cpp | 441 DWORD keySize = sizeof(extension)/sizeof(extension[0]); 442 err = RegQueryValueEx(subKey, TEXT("Extension"), 0, &keyType, (LPBYTE)extension, &keySize);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/ |
key_prot.h | 52 #define KEYSIZE 192
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 631 int mode, err, keysize; local 651 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 652 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 101 "Incorrect keysize parameter");
|
/external/webkit/WebKitLibraries/ |
WebKitSystemInterface.h | 29 CFStringRef WKSignedPublicKeyAndChallengeString(unsigned keySize, CFStringRef challenge, CFStringRef keyDescription);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 104 "Incorrect keysize parameter");
|
/frameworks/base/cmds/keystore/ |
keystore.cpp | 485 static void generateKeyFromPassword(uint8_t* key, ssize_t keySize, Value* pw, uint8_t* salt) { 495 PKCS5_PBKDF2_HMAC_SHA1((char*) pw->value, pw->length, salt, saltSize, 8192, keySize, key);
|
/external/openssl/ssl/ |
ssl_locl.h | 479 RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize); 483 DH *(*dh_tmp_cb)(SSL *ssl,int is_export,int keysize); 488 EC_KEY *(*ecdh_tmp_cb)(SSL *ssl,int is_export,int keysize); [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pk.h | 216 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key);
|
/external/bluetooth/hcidump/parser/ |
lmp.c | 475 uint8_t keysize = LMP_U8(frm); local 478 printf("key size %d\n", keysize);
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 462 int XXX_keysize(int *keysize); 464 Essentially, it will round the input keysize in \textit{keysize} down to the next appropriate key size. This function 471 int keysize, err; 473 /* now given a 20 byte key what keysize does Twofish want to use? */ 474 keysize = 20; 475 if ((err = twofish_keysize(&keysize)) != CRYPT_OK) { 479 printf("Twofish suggested a key size of %d\n", keysize); 484 This should indicate a keysize of sixteen bytes is suggested by storing 16 in \textit{keysize. [all...] |