HomeSort by relevance Sort by last modified time
    Searched full:keylen (Results 76 - 100 of 197) sorted by null

1 2 34 5 6 7 8

  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_init.c 43 @param keylen The length of the secret key (octets)
46 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen)
78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 87 int keylen, x, y, j; local
94 keylen = prng->rc4.x;
103 if (j == keylen) {
  /external/icu4c/tools/ctestfw/
datamap.cpp 86 int32_t keyLen = 0;
90 key = ures_getStringByIndex(headers, i, &keyLen, &status);
91 fData->put(UnicodeString(key, keyLen), new ResourceBundle(t, status), status);
  /external/openssl/crypto/cmac/
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
cmac.c 152 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL);
175 if (!key && !cipher && !impl && keylen == 0)
195 if (!EVP_CIPHER_CTX_set_key_length(&ctx->cctx, keylen))
  /external/smack/src/org/xbill/DNS/
TKEYRecord.java 86 int keylen = in.readU16(); local
87 if (keylen > 0)
88 key = in.readByteArray(keylen);
  /external/dropbear/libtomcrypt/src/ciphers/
noekeon.c 70 @param keylen The key length in bytes
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
82 if (keylen != 16) {
222 int keylen;
239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
cast5.c 403 @param keylen The key length in bytes
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
425 if (num_rounds == 12 && keylen > 10) {
429 if (keylen < 5 || keylen > 16) {
435 XMEMCPY(buf, key, (size_t)keylen);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 318 int keylen; local
331 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
543 size_t gtk_len, keylen, rsc_len; local
566 keylen = wpa_cipher_key_len(sm->group_cipher);
575 if (gtk_len < keylen) {
584 if (gtk_elem[2] != keylen) {
587 gtk_elem[2], (unsigned long) keylen);
591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
593 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/ipsec-tools/src/racoon/
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 223 size_t keylen; local
230 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
234 if (keylen > *len)
235 keylen = *len;
236 os_memcpy(msk, key, keylen);
237 *len = keylen;
  /frameworks/av/media/libstagefright/rtsp/
AMPEG4AudioAssembler.cpp 38 size_t keyLen = strlen(key);
50 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) {
51 value->setTo(&s[keyLen + 1], len - keyLen - 1);
APacketSource.cpp 47 size_t keyLen = strlen(key);
59 if (len >= keyLen + 1 && s[keyLen] == '=' && !strncmp(s, key, keyLen)) {
60 value->setTo(&s[keyLen + 1], len - keyLen - 1);
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 340 @param keylen The key length in bytes
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
366 if (keylen != 16 && keylen != 24 && keylen != 32) {
371 k = keylen / 8;
374 for (x = 0; x < keylen; x++) {
456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
459 x = _twofish_setup(key, keylen, num_rounds, skey)
    [all...]
  /external/openssl/crypto/hmac/
hm_pmeth.c 227 long keylen; local
228 key = string_to_hex(value, &keylen);
231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 24 @param keylen The length of the secret key (octets)
39 const unsigned char *key, unsigned long keylen,
93 key, keylen,
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_done.c 52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) {
  /external/icu4c/test/perf/collationperf/
CollPerf.pl 197 <td>keylen</td>
244 <td align="left"><b>keylen</b> <i>(ICU)</i></td>
247 <td align="left"><b>keylen</b> <i>(GLIBC)</i></td>
250 <td align="left"><b>keylen</b> <i>(GLIBC-ICU)/ICU)</i></td>
  /external/wpa_supplicant_8/src/radius/
radius.c 1070 size_t keylen; local
1082 &keylen);
1084 keys->send = decrypt_ms_key(key, keylen,
1093 &keylen);
1095 keys->recv = decrypt_ms_key(key, keylen,
1111 size_t keylen; local
1122 RADIUS_CISCO_AV_PAIR, &keylen);
1123 if (key && keylen == 51 &&
1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
    [all...]
  /external/chromium/base/
process_util_posix.cc 403 const unsigned keylen = equals - pair; local
404 if (keylen == j->first.size() &&
405 memcmp(pair, j->first.data(), keylen) == 0) {
442 const unsigned keylen = equals - pair; local
446 if (j->first.size() == keylen &&
447 memcmp(j->first.data(), pair, keylen) == 0) {
450 memcpy(scratch, pair, keylen + 1);
451 scratch += keylen + 1;
480 const unsigned keylen = equals - pair; local
481 if (keylen == j->first.size() &
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 142 int keylen; member in struct:__anon12597
160 int keylen; member in struct:__anon12598
258 sess.keylen = ciphers[i].keylen;
297 sess.mackeylen = digests[i].keylen;
428 ctx->key_len == ciphers[i].keylen) {
444 sess->keylen = ctx->key_len;
670 return digests[i].keylen;
1292 int fd, keylen; local
1300 keylen = BN_num_bits(dh->p)
    [all...]
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_test.c 30 int keylen, msglen;
89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican_test.c 27 int keylen, ptlen;
92 if ((err = pelican_init(&pel, tests[x].K, tests[x].keylen)) != CRYPT_OK) {
  /external/openssl/crypto/dh/
dh_pmeth.c 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
216 *keylen = ret;
  /external/openssl/crypto/evp/
pmeth_gn.c 202 const unsigned char *key, int keylen)
213 keylen, (void *)key) <= 0)

Completed in 7294 milliseconds

1 2 34 5 6 7 8