HomeSort by relevance Sort by last modified time
    Searched refs:key_length (Results 1 - 25 of 31) sorted by null

1 2

  /external/chromium/crypto/
hmac_win.cc 98 bool HMAC::Init(const unsigned char* key, int key_length) {
106 if (key_length < SHA256_LENGTH / 2)
108 plat_->raw_key_.assign(key, key + key_length);
130 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length,
138 key_blob->key_size = key_length;
139 memcpy(key_blob->key_data, key, key_length);
149 SecureZeroMemory(key_blob->key_data, key_length);
hmac.h 33 // Initializes this instance using |key| of the length |key_length|. Call Init
35 bool Init(const unsigned char* key, int key_length);
hmac_mac.cc 23 bool HMAC::Init(const unsigned char *key, int key_length) {
30 plat_->key_.assign(reinterpret_cast<const char*>(key), key_length); local
hmac_openssl.cc 29 bool HMAC::Init(const unsigned char* key, int key_length) {
33 plat_->key.assign(key, key + key_length);
hmac_nss.cc 42 bool HMAC::Init(const unsigned char *key, int key_length) {
60 key_item.len = key_length;
  /external/openssl/crypto/hmac/
hmac.c 90 &ctx->key_length))
97 ctx->key_length=len;
99 if(ctx->key_length != HMAC_MAX_MD_CBLOCK)
100 memset(&ctx->key[ctx->key_length], 0,
101 HMAC_MAX_MD_CBLOCK - ctx->key_length);
173 dctx->key_length = sctx->key_length;
hmac.h 81 unsigned int key_length; member in struct:hmac_ctx_st
  /external/webkit/Source/JavaScriptCore/wtf/
RandomNumberSeed.h 43 void init_by_array(unsigned long init_key[],int key_length);
  /external/openssl/include/openssl/
hmac.h 81 unsigned int key_length; member in struct:hmac_ctx_st
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.h 32 u16 key_length; member in struct:ieee802_1x_eapol_key
45 * key field (of key_length bytes) contains the key in encrypted form;
46 * if packet body length = 44, key field is absent and key_length
wpa_auth.c 1184 WPA_PUT_BE16(key->key_length, 16);
1187 WPA_PUT_BE16(key->key_length, 32);
1190 WPA_PUT_BE16(key->key_length, 5);
1193 WPA_PUT_BE16(key->key_length, 13);
1197 WPA_PUT_BE16(key->key_length, 0);
    [all...]
  /external/openssl/crypto/asn1/
x_pkey.c 117 ret->key_length=0;
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.c 176 WPA_PUT_BE16(reply->key_length, 0);
339 WPA_PUT_BE16(reply->key_length, 0);
341 os_memcpy(reply->key_length, key->key_length, 2);
924 WPA_PUT_BE16(reply->key_length, 0);
926 os_memcpy(reply->key_length, key->key_length, 2);
988 keylen = WPA_GET_BE16(key->key_length);
1104 gd->gtk_len = WPA_GET_BE16(key->key_length);
    [all...]
peerkey.c 93 WPA_PUT_BE16(err->key_length, 0);
153 WPA_PUT_BE16(reply->key_length, 0);
361 WPA_PUT_BE16(msg->key_length, 16);
363 WPA_PUT_BE16(msg->key_length, 32);
421 WPA_PUT_BE16(msg->key_length, 16);
423 WPA_PUT_BE16(msg->key_length, 32);
1093 WPA_PUT_BE16(req->key_length, 0);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 94 WPA_PUT_BE16(err->key_length, 0);
154 WPA_PUT_BE16(reply->key_length, 0);
362 WPA_PUT_BE16(msg->key_length, 16);
364 WPA_PUT_BE16(msg->key_length, 32);
422 WPA_PUT_BE16(msg->key_length, 16);
424 WPA_PUT_BE16(msg->key_length, 32);
1096 WPA_PUT_BE16(req->key_length, 0);
    [all...]
wpa.c 126 WPA_PUT_BE16(reply->key_length, 0);
331 WPA_PUT_BE16(reply->key_length, 0);
333 os_memcpy(reply->key_length, key->key_length, 2);
1053 WPA_PUT_BE16(reply->key_length, 0);
1055 os_memcpy(reply->key_length, key->key_length, 2);
1120 keylen = WPA_GET_BE16(key->key_length);
    [all...]
  /external/wpa_supplicant/
wpa.c 169 /* Note: key_info, key_length, and key_data_length are unaligned */
171 u8 key_length[2]; member in struct:wpa_eapol_key
1014 WPA_PUT_BE16(reply->key_length, 0);
1131 WPA_PUT_BE16(req->key_length, 0);
    [all...]
eapol_sm.c 161 /* Note: key_length is unaligned */
162 u8 key_length[2]; member in struct:ieee802_1x_eapol_key
176 * key field (of key_length bytes) contains the key in encrypted form;
177 * if packet body length = 44, key field is absent and key_length
647 rx_key_length = WPA_GET_BE16(key->key_length);
649 "EAPOL-Key: type=%d key_length=%d key_index=0x%x",
741 "(key_length=%d)", key_len, rx_key_length);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 150 /* Note: key_info, key_length, and key_data_length are unaligned */
152 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
  /external/wpa_supplicant_8/src/common/
wpa_common.h 158 /* Note: key_info, key_length, and key_data_length are unaligned */
160 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
  /hardware/broadcom/wlan/bcm4329/dhdutil/include/proto/
bt_amp_hci.h 94 uint8 key_length; member in struct:phy_link_cmd_parms
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
bt_amp_hci.h 94 uint8 key_length; member in struct:phy_link_cmd_parms
  /external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
eapol_supp_sm.c 161 /* Note: key_length is unaligned */
162 u8 key_length[2]; member in struct:ieee802_1x_eapol_key
176 * key field (of key_length bytes) contains the key in encrypted form;
177 * if packet body length = 44, key field is absent and key_length
672 rx_key_length = WPA_GET_BE16(key->key_length);
674 "EAPOL-Key: type=%d key_length=%d key_index=0x%x",
766 "(key_length=%d)", key_len, rx_key_length);
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 161 /* Note: key_length is unaligned */
162 u8 key_length[2]; member in struct:ieee802_1x_eapol_key
176 * key field (of key_length bytes) contains the key in encrypted form;
177 * if packet body length = 44, key field is absent and key_length
680 rx_key_length = WPA_GET_BE16(key->key_length);
682 "EAPOL-Key: type=%d key_length=%d key_index=0x%x",
774 "(key_length=%d)", key_len, rx_key_length);
    [all...]
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
reiserfs_fs.h 419 int key_length; /* 3 in all cases but direct2indirect and member in struct:cpu_key
    [all...]

Completed in 1084 milliseconds

1 2