HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 42) sorted by null

1 2

  /hardware/broadcom/wlan/bcm4329/dhdutil/
miniopt.c 57 int keylen; local
99 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
100 if (keylen > 63) keylen = 63;
101 memcpy(t->key, p + 2, keylen);
  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 57 int keylen; local
99 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
100 if (keylen > 63) keylen = 63;
101 memcpy(t->key, p + 2, keylen);
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 87 int keylen, x, y, j; local
94 keylen = prng->rc4.x;
103 if (j == keylen) {
  /external/ipsec-tools/src/racoon/
localconf.c 179 size_t keylen; local
212 keylen = 0;
214 keylen++;
219 k = str2val(p + 2, 16, &keylen);
228 key = vmalloc(keylen);
privsep.c 505 int keylen; local
512 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
517 memcpy(&keylen, bufs[1], sizeof(keylen));
520 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
522 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
1046 privsep_getpsk(str, keylen)
1048 int keylen;
1057 return getpsk(str, keylen);
1059 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
  /external/openssl/crypto/hmac/
hm_pmeth.c 223 long keylen; local
224 key = string_to_hex(value, &keylen);
227 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 29 size_t keylen; member in struct:crypto_cipher::__anon14225::__anon14226
68 ctx->u.rc4.keylen = key_len;
124 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
189 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_openssl.c 142 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
156 !EVP_CIPHER_CTX_set_key_length(&ctx, keylen) ||
468 int keylen; local
483 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh);
484 if (keylen < 0)
486 wpabuf_put(res, keylen);
crypto_libtomcrypt.c 297 size_t keylen; member in struct:crypto_cipher::__anon14232::__anon14233
341 ctx->u.rc4.keylen = key_len;
364 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
388 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/openssl/crypto/evp/
p5_crpt2.c 82 int keylen, unsigned char *out)
95 tkeylen = keylen;
137 h__dump (out, keylen);
144 int keylen, unsigned char *out)
147 keylen, out);
174 unsigned int keylen; local
220 keylen = EVP_CIPHER_CTX_key_length(ctx);
221 OPENSSL_assert(keylen <= sizeof key);
244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
279 keylen, key)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon5550
    [all...]
  /external/grub/stage2/
md5.c 209 int keylen = strlen (key); local
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
248 for (i = keylen; i > 16; i -= 16)
252 for (i = keylen; i > 0; i >>= 1)
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
    [all...]
  /external/wpa_supplicant/
crypto_internal.c 236 size_t keylen; member in struct:crypto_cipher::__anon13844::__anon13845
270 ctx->u.rc4.keylen = key_len;
318 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
369 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 298 size_t keylen; member in struct:crypto_cipher::__anon13849::__anon13850
342 ctx->u.rc4.keylen = key_len;
365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 395 int keylen; local
404 keylen = 16;
408 keylen = 32;
417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
599 size_t gtk_len, keylen, rsc_len; local
624 keylen = 16;
629 keylen = 32;
634 keylen = 13;
639 keylen = 5;
649 if (gtk_len < keylen) {
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 196 size_t keylen; local
203 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
207 if (keylen > *len)
208 keylen = *len;
209 os_memcpy(msk, key, keylen);
210 *len = keylen;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 501 int keylen; local
510 keylen = 16;
514 keylen = 32;
523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
732 size_t gtk_len, keylen, rsc_len; local
757 keylen = 16;
762 keylen = 32;
767 keylen = 13;
772 keylen = 5;
782 if (gtk_len < keylen) {
    [all...]
  /external/openssl/crypto/pem/
pvkfmt.c 723 unsigned int saltlen, unsigned int keylen,
745 enctmp = OPENSSL_malloc(keylen + 8);
758 inlen = keylen - 8;
789 ret = b2i_PrivateKey(&p, keylen);
803 unsigned int saltlen, keylen; local
811 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
813 buflen = (int) keylen + saltlen;
826 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
  /external/openssl/crypto/pkcs7/
pk7_doit.c 142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
322 int keylen,ivlen; local
331 keylen=EVP_CIPHER_key_length(evp_cipher);
358 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
361 OPENSSL_cleanse(key, keylen);
499 int keylen,ivlen;
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_internal.c 237 size_t keylen; member in struct:crypto_cipher::__anon14010::__anon14011
271 ctx->u.rc4.keylen = key_len;
319 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
370 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 298 size_t keylen; member in struct:crypto_cipher::__anon14015::__anon14016
342 ctx->u.rc4.keylen = key_len;
365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/bluetooth/bluez/tools/
bccmd.c 277 uint16_t handle, keylen; local
295 keylen = array[2] | (array[3] << 8);
297 printf("Crypt key length: %d bit\n", keylen * 8);
1075 { "keylen", cmd_keylen, "<handle>", "Get current crypt key length" },
  /external/chromium/base/
process_util_posix.cc 399 const unsigned keylen = equals - pair; local
400 if (keylen == j->first.size() &&
401 memcmp(pair, j->first.data(), keylen) == 0) {
438 const unsigned keylen = equals - pair; local
442 if (j->first.size() == keylen &&
443 memcmp(j->first.data(), pair, keylen) == 0) {
446 memcpy(scratch, pair, keylen + 1);
447 scratch += keylen + 1;
476 const unsigned keylen = equals - pair; local
477 if (keylen == j->first.size() &
    [all...]
  /external/iproute2/ip/
ipxfrm.c 511 int keylen; local
527 keylen = algo->alg_key_len / 8;
528 if (len < keylen) {
534 for (i = 0; i < keylen; i ++)

Completed in 1432 milliseconds

1 2