/external/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
cipher.h | 81 (cipher_pointer_t *cp, int key_len); 160 int key_len; member in struct:cipher_t
|
/external/wpa_supplicant/tests/ |
test_sha256.c | 47 size_t key_len; member in struct:hmac_test 292 hmac_sha256(t->key, t->key_len, t->data, t->data_len, hash); 301 hmac_sha256_vector(t->key, t->key_len, 1, addr, len, hash); 313 hmac_sha256_vector(t->key, t->key_len, 2, addr, len,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha256.c | 47 size_t key_len; member in struct:hmac_test 292 hmac_sha256(t->key, t->key_len, t->data, t->data_len, hash); 301 hmac_sha256_vector(t->key, t->key_len, 1, addr, len, hash); 313 hmac_sha256_vector(t->key, t->key_len, 2, addr, len,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 29 size_t key_len; member in struct:crypto_hash 34 size_t key_len) 55 if (key_len > sizeof(k_pad)) { 57 MD5Update(&ctx->u.md5, key, key_len); 60 key_len = 16; 62 os_memcpy(ctx->key, key, key_len); 63 ctx->key_len = key_len; 65 os_memcpy(k_pad, key, key_len); 66 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
/external/chromium/crypto/ |
hmac_unittest.cc | 67 const int key_len; member in struct:__anon3485 126 cases[i].key_len)); 212 const int key_len = 80; local 229 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(key), key_len));
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant/ |
eap_vendor_test.c | 160 const int key_len = 64; local 165 key = os_malloc(key_len); 169 os_memset(key, 0x11, key_len / 2); 170 os_memset(key + key_len / 2, 0x22, key_len / 2); 171 *len = key_len;
|
crypto_internal.c | 62 size_t key_len; member in struct:crypto_hash 67 size_t key_len) 88 if (key_len > sizeof(k_pad)) { 90 MD5Update(&ctx->u.md5, key, key_len); 93 key_len = 16; 95 os_memcpy(ctx->key, key, key_len); 96 ctx->key_len = key_len; 98 os_memcpy(k_pad, key, key_len); 99 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
driver_atmel.c | 89 u16 key_len; member in struct:atmel_param 195 const u8 *key, size_t key_len) 228 "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx, 229 (unsigned long) seq_len, (unsigned long) key_len); 234 blen = sizeof(*param) + key_len; 253 param->key_len = key_len; 254 os_memcpy((u8 *)param->key, key, key_len);
|
driver_ndiswrapper.c | 45 size_t key_len; member in struct:wpa_key 117 const u8 *key, size_t key_len) 133 wpa_key.key_len = key_len; 150 seq, seq_len, key, key_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_vendor_test.c | 157 const int key_len = 64; local 162 key = os_malloc(key_len); 166 os_memset(key, 0x11, key_len / 2); 167 os_memset(key + key_len / 2, 0x22, key_len / 2); 168 *len = key_len;
|
eap_fast_pac.c | 352 size_t key_len; local 354 key = eap_fast_parse_hex(pos, &key_len); 355 if (key == NULL || key_len != EAP_FAST_PAC_KEY_LEN) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_vendor_test.c | 150 const int key_len = 64; local 155 key = os_malloc(key_len); 159 os_memset(key, 0x11, key_len / 2); 160 os_memset(key + key_len / 2, 0x22, key_len / 2); 161 *len = key_len;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 157 const int key_len = 64; local 162 key = os_malloc(key_len); 166 os_memset(key, 0x11, key_len / 2); 167 os_memset(key + key_len / 2, 0x22, key_len / 2); 168 *len = key_len;
|
eap_fast_pac.c | 352 size_t key_len; local 354 key = eap_fast_parse_hex(pos, &key_len); 355 if (key == NULL || key_len != EAP_FAST_PAC_KEY_LEN) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 150 const int key_len = 64; local 155 key = os_malloc(key_len); 159 os_memset(key, 0x11, key_len / 2); 160 os_memset(key + key_len / 2, 0x22, key_len / 2); 161 *len = key_len;
|
/external/ipsec-tools/src/racoon/ |
admin.h | 123 size_t key_len; member in struct:admin_com_psk
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
privsep_commands.h | 61 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_atmel.c | 88 u16 key_len; member in struct:atmel_param 194 const u8 *key, size_t key_len) 227 "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx, 228 (unsigned long) seq_len, (unsigned long) key_len); 233 blen = sizeof(*param) + key_len; 252 param->key_len = key_len; 253 os_memcpy((u8 *)param->key, key, key_len);
|
driver_ndiswrapper.c | 45 size_t key_len; member in struct:wpa_key 117 const u8 *key, size_t key_len) 133 wpa_key.key_len = key_len; 150 seq, seq_len, key, key_len);
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 59 size_t key_len; member in struct:privsep_cmd_set_key
|