/external/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
cipher.h | 81 (cipher_pointer_t *cp, int key_len); 160 int key_len; member in struct:cipher_t
|
/external/chromium/crypto/ |
hmac_unittest.cc | 67 const int key_len; member in struct:__anon4834 126 cases[i].key_len)); 212 const int key_len = 80; local 229 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(key), key_len));
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeof(k_pad) [all...] |
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 48 const size_t key_len = strlen(key_id); local 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 51 key_len);
|
/external/openssh/ |
mac.c | 55 int key_len; /* just for UMAC */ member in struct:__anon12440 83 mac->key_len = mac->mac_len = (u_int)evp_len; 86 mac->key_len = macs[which].key_len / 8; 119 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md);
|
cipher.c | 64 u_int key_len; member in struct:Cipher 107 return (c->key_len); 230 if (keylen < cipher->key_len) 242 if (type->key_len > 0 && type->key_len != keylen) { 244 type->key_len, keylen); 245 type->key_len = keylen;
|
kex.h | 91 u_int key_len; member in struct:Enc 101 u_int key_len; member in struct:Mac
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 151 const int key_len = 64; local 156 key = os_malloc(key_len); 160 os_memset(key, 0x11, key_len / 2); 161 os_memset(key + key_len / 2, 0x22, key_len / 2); 162 *len = key_len;
|
eap_fast_pac.c | 346 size_t key_len; local 348 key = eap_fast_parse_hex(pos, &key_len); 349 if (key == NULL || key_len != EAP_FAST_PAC_KEY_LEN) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/external/ipsec-tools/src/racoon/ |
admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 141 uint32_t key_len = 0; local 174 key_len += sizeof(metadata); 176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len); 177 key_len += metadata.lenpubmod; 189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len); 190 key_len += metadata.lenpubexp; 196 metadata.rsacrtpriv.lenp = BN_bn2bin(rsa->p, kbuf + key_len); 197 key_len += metadata.rsacrtpriv.lenp; 198 metadata.rsacrtpriv.lenq = BN_bn2bin(rsa->q, kbuf + key_len); 199 key_len += metadata.rsacrtpriv.lenq [all...] |
/external/kernel-headers/original/linux/nfsd/ |
nfsfh.h | 193 static inline int key_len(int type) function
|
/external/libpng/ |
pngset.c | 716 png_size_t text_length, key_len; local 723 key_len = png_strlen(text_ptr[i].key); 771 (key_len + text_length + lang_len + lang_key_len + 4)); 776 (key_len + lang_len + lang_key_len + text_length + 4), 779 png_memcpy(textp->key, text_ptr[i].key,(png_size_t)(key_len)); 780 *(textp->key + key_len) = '\0'; 784 textp->lang = textp->key + key_len + 1; 799 textp->text = textp->key + key_len + 1; [all...] |
/external/qemu/distrib/libpng-1.2.19/ |
pngset.c | 782 png_size_t text_length,key_len; local 789 key_len = png_strlen(text_ptr[i].key); 833 (png_uint_32)(key_len + text_length + lang_len + lang_key_len + 4)); 837 (png_uint_32)(key_len + lang_len + lang_key_len + text_length + 4), 841 (png_size_t)(key_len)); 842 *(textp->key+key_len) = '\0'; 846 textp->lang=textp->key + key_len + 1; 861 textp->text=textp->key + key_len + 1; [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 822 size_t len, key_len; local 877 key_len = 32; 879 key_len = 16; 883 rsc, sizeof(rsc), _key, key_len) < 0) { [all...] |
/external/bluetooth/bluedroid/btif/src/ |
btif_config_util.cpp | 403 int key_len = strlen(key); local 409 if(i + key_len + 1 > size) 411 if(memcmp(map + i, key, key_len) == 0) 413 read_file_line(map, i + key_len + 1, size, value_size); 415 return map + i + key_len + 1;
|
/external/chromium/net/disk_cache/ |
disk_format.h | 120 int32 key_len; member in struct:disk_cache::EntryStore
|
/external/chromium/net/tools/flip_server/ |
balsa_frame.cc | 819 const size_t key_len = key_end - key_begin; local 822 LOG(INFO) << "[" << i << "]: " << std::string(key_begin, key_len) 823 << " c: '" << c << "' key_len: " << key_len; local [all...] |