HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 39) sorted by null

1 2

  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 59 int keylen; local
101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
102 if (keylen > 63) keylen = 63;
103 memcpy(t->key, p + 2, keylen);
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 87 int keylen, x, y, j; local
94 keylen = prng->rc4.x;
103 if (j == keylen) {
  /external/openssl/crypto/cmac/
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/antlr/antlr-3.4/runtime/ObjC/Framework/
ACBTree.h 55 NSInteger keylen; /* length of key */ variable
71 @property (assign) NSInteger keylen; variable
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
  /external/libppp/src/
pap.c 89 int namelen, keylen, plen; local
92 keylen = strlen(bundle->cfg.auth.key);
93 plen = namelen + keylen + 2;
94 log_Printf(LogDEBUG, "pap_Req: namelen = %d, keylen = %d\n", namelen, keylen);
107 *cp++ = keylen;
108 memcpy(cp, bundle->cfg.auth.key, keylen);
mppe.c 101 unsigned keylen; /* 8 or 16 bytes */ member in struct:mppe_state
150 GetNewKeyFromSHA(mp->mastkey, mp->sesskey, mp->keylen, InterimKey);
151 RC4_set_key(&RC4Key, mp->keylen, InterimKey);
152 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey);
205 RC4_set_key(&mop->rc4key, mop->keylen, mop->sesskey);
354 RC4_set_key(&mip->rc4key, mip->keylen, mip->sesskey);
655 mp->keylen = 16;
659 mp->keylen = 8;
663 mp->keylen = 8;
697 if (mip->keylen > bundle->radius.mppe.recvkeylen
    [all...]
  /external/openssl/crypto/hmac/
hm_pmeth.c 227 long keylen; local
228 key = string_to_hex(value, &keylen);
231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 23 size_t keylen; member in struct:crypto_cipher::__anon18433::__anon18434
61 ctx->u.rc4.keylen = key_len;
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 291 size_t keylen; member in struct:crypto_cipher::__anon18440::__anon18441
335 ctx->u.rc4.keylen = key_len;
358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/openssl/crypto/evp/
p5_crpt2.c 83 int keylen, unsigned char *out)
96 tkeylen = keylen;
142 h__dump (out, keylen);
149 int keylen, unsigned char *out)
152 keylen, out);
238 unsigned int keylen = 0; local
248 keylen = EVP_CIPHER_CTX_key_length(ctx);
249 OPENSSL_assert(keylen <= sizeof key);
267 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 318 int keylen; local
331 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
543 size_t gtk_len, keylen, rsc_len; local
566 keylen = wpa_cipher_key_len(sm->group_cipher);
575 if (gtk_len < keylen) {
584 if (gtk_elem[2] != keylen) {
587 gtk_elem[2], (unsigned long) keylen);
591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
593 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon7177
    [all...]
  /external/grub/stage2/
md5.c 209 int keylen = strlen (key); local
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
248 for (i = keylen; i > 16; i -= 16)
252 for (i = keylen; i > 0; i >>= 1)
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
    [all...]
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /external/smack/src/org/xbill/DNS/
TKEYRecord.java 86 int keylen = in.readU16(); local
87 if (keylen > 0)
88 key = in.readByteArray(keylen);
  /external/smali/util/src/main/java/ds/tree/
RadixTreeImpl.java 437 int keylen = key.length(); local
440 while (i < keylen && i < nodelen) {
447 if (i == keylen && i <= nodelen) {
450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) {
452 String ending = key.substring(i, keylen);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 223 size_t keylen; local
230 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
234 if (keylen > *len)
235 keylen = *len;
236 os_memcpy(msk, key, keylen);
237 *len = keylen;
  /external/openssl/crypto/pem/
pvkfmt.c 726 unsigned int saltlen, unsigned int keylen,
749 enctmp = OPENSSL_malloc(keylen + 8);
762 inlen = keylen - 8;
796 ret = b2i_PrivateKey(&p, keylen);
811 unsigned int saltlen, keylen; local
819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
821 buflen = (int) keylen + saltlen;
834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
  /external/openssl/crypto/pkcs7/
pk7_doit.c 142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
329 int keylen,ivlen; local
338 keylen=EVP_CIPHER_key_length(evp_cipher);
365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
368 OPENSSL_cleanse(key, keylen);
508 int keylen,ivlen;
  /external/chromium/base/
process_util_posix.cc 403 const unsigned keylen = equals - pair; local
404 if (keylen == j->first.size() &&
405 memcmp(pair, j->first.data(), keylen) == 0) {
442 const unsigned keylen = equals - pair; local
446 if (j->first.size() == keylen &&
447 memcmp(j->first.data(), pair, keylen) == 0) {
450 memcpy(scratch, pair, keylen + 1);
451 scratch += keylen + 1;
480 const unsigned keylen = equals - pair; local
481 if (keylen == j->first.size() &
    [all...]
  /external/iproute2/ip/
ipxfrm.c 511 int keylen; local
527 keylen = algo->alg_key_len / 8;
528 if (len < keylen) {
534 for (i = 0; i < keylen; i ++)
  /external/openssh/
monitor_wrap.c 609 u_int ivlen, keylen; local
616 keylen = packet_get_encryption_key(NULL);
617 key = xmalloc(keylen+1); /* add 1 if keylen == 0 */
618 keylen = packet_get_encryption_key(key);
619 buffer_put_string(&m, key, keylen);
620 memset(key, 0, keylen);
    [all...]

Completed in 648 milliseconds

1 2