/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_init.c | 43 @param keylen The length of the secret key (octets) 46 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen) 78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 87 int keylen, x, y, j; local 94 keylen = prng->rc4.x; 103 if (j == keylen) {
|
/external/icu4c/tools/ctestfw/ |
datamap.cpp | 86 int32_t keyLen = 0; 90 key = ures_getStringByIndex(headers, i, &keyLen, &status); 91 fData->put(UnicodeString(key, keyLen), new ResourceBundle(t, status), status);
|
/external/openssl/crypto/cmac/ |
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
cmac.c | 152 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, 171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL); 175 if (!key && !cipher && !impl && keylen == 0) 195 if (!EVP_CIPHER_CTX_set_key_length(&ctx->cctx, keylen))
|
/external/smack/src/org/xbill/DNS/ |
TKEYRecord.java | 86 int keylen = in.readU16(); local 87 if (keylen > 0) 88 key = in.readByteArray(keylen);
|
/external/dropbear/libtomcrypt/src/ciphers/ |
noekeon.c | 70 @param keylen The key length in bytes 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 82 if (keylen != 16) { 222 int keylen; 239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
|
cast5.c | 403 @param keylen The key length in bytes 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 425 if (num_rounds == 12 && keylen > 10) { 429 if (keylen < 5 || keylen > 16) { 435 XMEMCPY(buf, key, (size_t)keylen); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 318 int keylen; local 331 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 543 size_t gtk_len, keylen, rsc_len; local 566 keylen = wpa_cipher_key_len(sm->group_cipher); 575 if (gtk_len < keylen) { 584 if (gtk_elem[2] != keylen) { 587 gtk_elem[2], (unsigned long) keylen); 591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 593 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
/external/ipsec-tools/src/racoon/ |
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 223 size_t keylen; local 230 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 234 if (keylen > *len) 235 keylen = *len; 236 os_memcpy(msk, key, keylen); 237 *len = keylen;
|
/frameworks/av/media/libstagefright/rtsp/ |
AMPEG4AudioAssembler.cpp | 38 size_t keyLen = strlen(key); 50 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) { 51 value->setTo(&s[keyLen + 1], len - keyLen - 1);
|
APacketSource.cpp | 47 size_t keyLen = strlen(key); 59 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) { 60 value->setTo(&s[keyLen + 1], len - keyLen - 1);
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 340 @param keylen The key length in bytes 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 366 if (keylen != 16 && keylen != 24 && keylen != 32) { 371 k = keylen / 8; 374 for (x = 0; x < keylen; x++) { 456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 459 x = _twofish_setup(key, keylen, num_rounds, skey) [all...] |
/external/openssl/crypto/hmac/ |
hm_pmeth.c | 227 long keylen; local 228 key = string_to_hex(value, &keylen); 231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 24 @param keylen The length of the secret key (octets) 39 const unsigned char *key, unsigned long keylen, 93 key, keylen, 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_done.c | 52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) {
|
/external/icu4c/test/perf/collationperf/ |
CollPerf.pl | 197 <td>keylen</td> 244 <td align="left"><b>keylen</b> <i>(ICU)</i></td> 247 <td align="left"><b>keylen</b> <i>(GLIBC)</i></td> 250 <td align="left"><b>keylen</b> <i>(GLIBC-ICU)/ICU)</i></td>
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1070 size_t keylen; local 1082 &keylen); 1084 keys->send = decrypt_ms_key(key, keylen, 1093 &keylen); 1095 keys->recv = decrypt_ms_key(key, keylen, 1111 size_t keylen; local 1122 RADIUS_CISCO_AV_PAIR, &keylen); 1123 if (key && keylen == 51 && 1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/chromium/base/ |
process_util_posix.cc | 403 const unsigned keylen = equals - pair; local 404 if (keylen == j->first.size() && 405 memcmp(pair, j->first.data(), keylen) == 0) { 442 const unsigned keylen = equals - pair; local 446 if (j->first.size() == keylen && 447 memcmp(j->first.data(), pair, keylen) == 0) { 450 memcpy(scratch, pair, keylen + 1); 451 scratch += keylen + 1; 480 const unsigned keylen = equals - pair; local 481 if (keylen == j->first.size() & [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 142 int keylen; member in struct:__anon12597 160 int keylen; member in struct:__anon12598 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen = BN_num_bits(dh->p) [all...] |
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_test.c | 30 int keylen, msglen; 89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican_test.c | 27 int keylen, ptlen; 92 if ((err = pelican_init(&pel, tests[x].K, tests[x].keylen)) != CRYPT_OK) {
|
/external/openssl/crypto/dh/ |
dh_pmeth.c | 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) 216 *keylen = ret;
|
/external/openssl/crypto/evp/ |
pmeth_gn.c | 202 const unsigned char *key, int keylen) 213 keylen, (void *)key) <= 0)
|