HomeSort by relevance Sort by last modified time
    Searched refs:keylen (Results 76 - 100 of 165) sorted by null

1 2 34 5 6 7

  /external/openssl/crypto/evp/
pmeth_gn.c 202 const unsigned char *key, int keylen)
213 keylen, (void *)key) <= 0)
evp_enc.c 596 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
599 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL);
600 if(c->key_len == keylen) return 1;
601 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH))
603 c->key_len = keylen;
  /external/dropbear/libtomcrypt/src/ciphers/
noekeon.c 70 @param keylen The key length in bytes
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
82 if (keylen != 16) {
222 int keylen;
239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
xtea.c 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
42 if (keylen != 16) {
cast5.c 403 @param keylen The key length in bytes
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
425 if (num_rounds == 12 && keylen > 10) {
429 if (keylen < 5 || keylen > 16) {
435 XMEMCPY(buf, key, (size_t)keylen);
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 24 @param keylen The length of the secret key (octets)
39 const unsigned char *key, unsigned long keylen,
93 key, keylen,
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
  /external/wpa_supplicant_8/src/radius/
radius.c 1070 size_t keylen; local
1082 &keylen);
1084 keys->send = decrypt_ms_key(key, keylen,
1093 &keylen);
1095 keys->recv = decrypt_ms_key(key, keylen,
1111 size_t keylen; local
1122 RADIUS_CISCO_AV_PAIR, &keylen);
1123 if (key && keylen == 51 &&
1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
    [all...]
  /external/smali/util/src/main/java/ds/tree/
RadixTreeImpl.java 437 int keylen = key.length(); local
440 while (i < keylen && i < nodelen) {
447 if (i == keylen && i <= nodelen) {
450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) {
452 String ending = key.substring(i, keylen);
  /external/chromium/base/
process_util_posix.cc 403 const unsigned keylen = equals - pair; local
404 if (keylen == j->first.size() &&
405 memcmp(pair, j->first.data(), keylen) == 0) {
442 const unsigned keylen = equals - pair; local
446 if (j->first.size() == keylen &&
447 memcmp(j->first.data(), pair, keylen) == 0) {
450 memcpy(scratch, pair, keylen + 1);
451 scratch += keylen + 1;
480 const unsigned keylen = equals - pair; local
481 if (keylen == j->first.size() &
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/aes/
aes.c 118 @param keylen The key length in bytes
123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
133 if (keylen != 16 && keylen != 24 && keylen != 32) {
137 if (num_rounds != 0 && num_rounds != (10 + ((keylen/8)-2)*2)) {
141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2;
150 if (keylen == 16) {
163 } else if (keylen == 24) {
184 } else if (keylen == 32)
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 340 @param keylen The key length in bytes
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
366 if (keylen != 16 && keylen != 24 && keylen != 32) {
371 k = keylen / 8;
374 for (x = 0; x < keylen; x++) {
456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
459 x = _twofish_setup(key, keylen, num_rounds, skey)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 318 int keylen; local
331 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
543 size_t gtk_len, keylen, rsc_len; local
566 keylen = wpa_cipher_key_len(sm->group_cipher);
575 if (gtk_len < keylen) {
584 if (gtk_elem[2] != keylen) {
587 gtk_elem[2], (unsigned long) keylen);
591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
593 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 223 size_t keylen; local
230 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
234 if (keylen > *len)
235 keylen = *len;
236 os_memcpy(msk, key, keylen);
237 *len = keylen;
  /external/dropbear/libtomcrypt/src/ciphers/safer/
saferp.c 211 @param keylen The key length in bytes
216 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
226 if (keylen != 16 && keylen != 24 && keylen != 32) {
233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) {
238 if (keylen == 16) {
266 } else if (keylen == 24) {
465 int keylen;
503 if ((err = saferp_setup(tests[i].key, tests[i].keylen, 0, &skey)) != CRYPT_OK)
    [all...]
  /external/icu4c/test/perf/collationperf/
CollPerf.pl 197 <td>keylen</td>
244 <td align="left"><b>keylen</b> <i>(ICU)</i></td>
247 <td align="left"><b>keylen</b> <i>(GLIBC)</i></td>
250 <td align="left"><b>keylen</b> <i>(GLIBC-ICU)/ICU)</i></td>
  /external/ipsec-tools/src/racoon/
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
algorithm.c 490 if (f == NULL || f->keylen == NULL)
493 return (f->keylen)(len);
617 if (f == NULL || f->keylen == NULL)
620 return (f->keylen)(len);
  /external/openssl/include/openssl/
tls1.h 339 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
340 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys))
341 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
342 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
    [all...]
  /external/openssl/ssl/
tls1.h 339 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
340 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys))
341 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
342 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 142 int keylen; member in struct:__anon12597
160 int keylen; member in struct:__anon12598
258 sess.keylen = ciphers[i].keylen;
297 sess.mackeylen = digests[i].keylen;
428 ctx->key_len == ciphers[i].keylen) {
444 sess->keylen = ctx->key_len;
670 return digests[i].keylen;
1292 int fd, keylen; local
1300 keylen = BN_num_bits(dh->p)
    [all...]
  /external/openssl/crypto/pem/
pvkfmt.c 726 unsigned int saltlen, unsigned int keylen,
749 enctmp = OPENSSL_malloc(keylen + 8);
762 inlen = keylen - 8;
796 ret = b2i_PrivateKey(&p, keylen);
811 unsigned int saltlen, keylen; local
819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
821 buflen = (int) keylen + saltlen;
834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
  /external/openssl/crypto/pkcs7/
pk7_doit.c 142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
329 int keylen,ivlen; local
338 keylen=EVP_CIPHER_key_length(evp_cipher);
365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
368 OPENSSL_cleanse(key, keylen);
508 int keylen,ivlen;
  /external/openssh/
packet.c 548 packet_set_encryption_key(const u_char *key, u_int keylen, int number)
554 if (keylen < 20)
555 fatal("packet_set_encryption_key: keylen too small: %d", keylen);
556 if (keylen > SSH_SESSION_KEY_LENGTH)
557 fatal("packet_set_encryption_key: keylen too big: %d", keylen);
558 memcpy(active_state->ssh1_key, key, keylen);
559 active_state->ssh1_keylen = keylen;
560 cipher_init(&active_state->send_context, cipher, key, keylen, NULL
    [all...]
  /external/bluetooth/bluedroid/stack/smp/
aes.c 498 return_type aes_set_key( const unsigned char key[], length_type keylen, aes_context ctx[1] )
502 switch( keylen )
506 keylen = 16;
510 keylen = 24;
514 keylen = 32;
520 block_copy_nn(ctx->ksch, key, keylen);
521 hi = (keylen + 28) << 2;
523 for( cc = keylen, rc = 1; cc < hi; cc += 4 )
530 if( cc % keylen == 0 )
539 else if( keylen > 24 && cc % keylen == 16
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_test.c 30 int keylen,
229 if ((err = eax_encrypt_authenticate_memory(idx, tests[x].key, tests[x].keylen,
254 if ((err = eax_decrypt_verify_memory(idx, tests[x].key, tests[x].keylen,

Completed in 2330 milliseconds

1 2 34 5 6 7