/external/openssl/crypto/evp/ |
pmeth_gn.c | 202 const unsigned char *key, int keylen) 213 keylen, (void *)key) <= 0)
|
evp_enc.c | 596 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) 599 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL); 600 if(c->key_len == keylen) return 1; 601 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) 603 c->key_len = keylen;
|
/external/dropbear/libtomcrypt/src/ciphers/ |
noekeon.c | 70 @param keylen The key length in bytes 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 82 if (keylen != 16) { 222 int keylen; 239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
|
xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 42 if (keylen != 16) {
|
cast5.c | 403 @param keylen The key length in bytes 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 425 if (num_rounds == 12 && keylen > 10) { 429 if (keylen < 5 || keylen > 16) { 435 XMEMCPY(buf, key, (size_t)keylen); [all...] |
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 24 @param keylen The length of the secret key (octets) 39 const unsigned char *key, unsigned long keylen, 93 key, keylen, 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1070 size_t keylen; local 1082 &keylen); 1084 keys->send = decrypt_ms_key(key, keylen, 1093 &keylen); 1095 keys->recv = decrypt_ms_key(key, keylen, 1111 size_t keylen; local 1122 RADIUS_CISCO_AV_PAIR, &keylen); 1123 if (key && keylen == 51 && 1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/smali/util/src/main/java/ds/tree/ |
RadixTreeImpl.java | 437 int keylen = key.length(); local 440 while (i < keylen && i < nodelen) { 447 if (i == keylen && i <= nodelen) { 450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) { 452 String ending = key.substring(i, keylen);
|
/external/chromium/base/ |
process_util_posix.cc | 403 const unsigned keylen = equals - pair; local 404 if (keylen == j->first.size() && 405 memcmp(pair, j->first.data(), keylen) == 0) { 442 const unsigned keylen = equals - pair; local 446 if (j->first.size() == keylen && 447 memcmp(j->first.data(), pair, keylen) == 0) { 450 memcpy(scratch, pair, keylen + 1); 451 scratch += keylen + 1; 480 const unsigned keylen = equals - pair; local 481 if (keylen == j->first.size() & [all...] |
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
aes.c | 118 @param keylen The key length in bytes 123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 133 if (keylen != 16 && keylen != 24 && keylen != 32) { 137 if (num_rounds != 0 && num_rounds != (10 + ((keylen/8)-2)*2)) { 141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2; 150 if (keylen == 16) { 163 } else if (keylen == 24) { 184 } else if (keylen == 32) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 340 @param keylen The key length in bytes 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 366 if (keylen != 16 && keylen != 24 && keylen != 32) { 371 k = keylen / 8; 374 for (x = 0; x < keylen; x++) { 456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 459 x = _twofish_setup(key, keylen, num_rounds, skey) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 318 int keylen; local 331 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 543 size_t gtk_len, keylen, rsc_len; local 566 keylen = wpa_cipher_key_len(sm->group_cipher); 575 if (gtk_len < keylen) { 584 if (gtk_elem[2] != keylen) { 587 gtk_elem[2], (unsigned long) keylen); 591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 593 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 223 size_t keylen; local 230 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 234 if (keylen > *len) 235 keylen = *len; 236 os_memcpy(msk, key, keylen); 237 *len = keylen;
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
saferp.c | 211 @param keylen The key length in bytes 216 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 226 if (keylen != 16 && keylen != 24 && keylen != 32) { 233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { 238 if (keylen == 16) { 266 } else if (keylen == 24) { 465 int keylen; 503 if ((err = saferp_setup(tests[i].key, tests[i].keylen, 0, &skey)) != CRYPT_OK) [all...] |
/external/icu4c/test/perf/collationperf/ |
CollPerf.pl | 197 <td>keylen</td> 244 <td align="left"><b>keylen</b> <i>(ICU)</i></td> 247 <td align="left"><b>keylen</b> <i>(GLIBC)</i></td> 250 <td align="left"><b>keylen</b> <i>(GLIBC-ICU)/ICU)</i></td>
|
/external/ipsec-tools/src/racoon/ |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
algorithm.c | 490 if (f == NULL || f->keylen == NULL) 493 return (f->keylen)(len); 617 if (f == NULL || f->keylen == NULL) 620 return (f->keylen)(len);
|
/external/openssl/include/openssl/ |
tls1.h | 339 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ 340 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) 341 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ 342 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys)) [all...] |
/external/openssl/ssl/ |
tls1.h | 339 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ 340 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) 341 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ 342 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys)) [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 142 int keylen; member in struct:__anon12597 160 int keylen; member in struct:__anon12598 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen = BN_num_bits(dh->p) [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 726 unsigned int saltlen, unsigned int keylen, 749 enctmp = OPENSSL_malloc(keylen + 8); 762 inlen = keylen - 8; 796 ret = b2i_PrivateKey(&p, keylen); 811 unsigned int saltlen, keylen; local 819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 821 buflen = (int) keylen + saltlen; 834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 329 int keylen,ivlen; local 338 keylen=EVP_CIPHER_key_length(evp_cipher); 365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 368 OPENSSL_cleanse(key, keylen); 508 int keylen,ivlen;
|
/external/openssh/ |
packet.c | 548 packet_set_encryption_key(const u_char *key, u_int keylen, int number) 554 if (keylen < 20) 555 fatal("packet_set_encryption_key: keylen too small: %d", keylen); 556 if (keylen > SSH_SESSION_KEY_LENGTH) 557 fatal("packet_set_encryption_key: keylen too big: %d", keylen); 558 memcpy(active_state->ssh1_key, key, keylen); 559 active_state->ssh1_keylen = keylen; 560 cipher_init(&active_state->send_context, cipher, key, keylen, NULL [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
aes.c | 498 return_type aes_set_key( const unsigned char key[], length_type keylen, aes_context ctx[1] ) 502 switch( keylen ) 506 keylen = 16; 510 keylen = 24; 514 keylen = 32; 520 block_copy_nn(ctx->ksch, key, keylen); 521 hi = (keylen + 28) << 2; 523 for( cc = keylen, rc = 1; cc < hi; cc += 4 ) 530 if( cc % keylen == 0 ) 539 else if( keylen > 24 && cc % keylen == 16 [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_test.c | 30 int keylen, 229 if ((err = eax_encrypt_authenticate_memory(idx, tests[x].key, tests[x].keylen, 254 if ((err = eax_decrypt_verify_memory(idx, tests[x].key, tests[x].keylen,
|