HomeSort by relevance Sort by last modified time
    Searched full:keylen (Results 1 - 25 of 197) sorted by null

1 2 3 4 5 6 7 8

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
KeyParameter.java 19 int keyLen)
21 this.key = new byte[keyLen];
23 System.arraycopy(key, keyOff, this.key, 0, keyLen);
  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_init.c 27 @param keylen The length of the secret key (octets)
30 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen)
48 if (keylen == 0) {
66 if(keylen > HMAC_BLOCKSIZE) {
68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) {
74 keylen = hashsize;
76 XMEMCPY(hmac->key, key, (size_t)keylen);
77 if(keylen < HMAC_BLOCKSIZE) {
78 zeromem((hmac->key) + keylen, (size_t)(HMAC_BLOCKSIZE - keylen));
    [all...]
hmac_memory.c 24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen);
61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_init.c 24 @param keylen Length of secret key in octets
27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen)
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
50 for (x = 0; (unsigned)x < keylen; x++) {
60 f9->keylen = keylen;
f9_memory.c 23 @param keylen Length of key in octets
31 const unsigned char *key, unsigned long keylen,
45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen);
53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
f9_file.c 24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon7177
    [all...]
tomcrypt_cipher.h 102 ulong32 K[32], keylen; member in struct:cast5_key
333 @param keylen The length of the input key (octets)
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
443 @param keylen The length of the secret key (octets)
458 const unsigned char *key, unsigned long keylen,
469 @param keylen The length of the secret key
483 const unsigned char *key, unsigned long keylen,
493 @param keylen The key length (octets)
501 const unsigned char *key, unsigned long keylen,
507 @param keylen The key length (octets)
    [all...]
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_memory.c 23 @param keylen Length of key in octets
31 const unsigned char *key, unsigned long keylen,
45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen);
53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
xcbc_file.c 24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican_memory.c 23 @param keylen The length of the key (octets)
29 int pelican_memory(const unsigned char *key, unsigned long keylen,
41 if ((err = pelican_init(pel, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/misc/crypt/
crypt_find_cipher_any.c 22 @param keylen The minimum length of the key size desired (octets)
25 int find_cipher_any(const char *name, int blocklen, int keylen)
39 if (blocklen <= (int)cipher_descriptor[x].block_length && keylen <= (int)cipher_descriptor[x].max_key_length) {
  /external/dropbear/libtomcrypt/src/modes/ecb/
ecb_start.c 25 @param keylen The length of the secret key (octets)
30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb)
41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_start.c 26 @param keylen The length of the secret key (octets)
34 const unsigned char *key, int keylen,
64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) {
70 for (; x < keylen && x < (int)sizeof(tkey); x++) {
74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) {
91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
  /frameworks/base/libs/androidfw/
BackupData.cpp 120 ssize_t keyLen;
122 keyLen = k.length();
125 header.keyLen = tolel(keyLen);
136 if (DEBUG) ALOGI("writing entity header key, %d bytes", keyLen+1);
137 amt = write(m_fd, k.string(), keyLen+1);
138 if (amt != keyLen+1) {
144 amt = write_padding_for(keyLen+1);
262 m_header.entity.keyLen = fromlel(m_header.entity.keyLen);
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_init.c 25 @param keylen The length of the secret key (octets)
33 const unsigned char *key, unsigned long keylen,
71 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
93 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) {
111 if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_OK) {
116 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_file.c 24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
omac_memory.c 24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen);
61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_file.c 24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
pmac_memory.c 24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/cbc/
cbc_start.c 25 @param keylen The length of the secret key (octets)
31 int keylen, int num_rounds, symmetric_CBC *cbc)
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_start.c 26 @param keylen The length of the secret key (octets)
32 int keylen, int num_rounds, symmetric_CFB *cfb)
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/ofb/
ofb_start.c 26 @param keylen The length of the secret key (octets)
32 int keylen, int num_rounds, symmetric_OFB *ofb)
53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key);
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /external/openssh/
cipher.c 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
225 if (keylen > 8)
226 keylen = 8;
230 if (keylen < cipher->key_len)
232 keylen, cipher->name);
242 if (type->key_len > 0 && type->key_len != keylen) {
243 debug("cipher_init: set keylen (%d -> %d)",
244 type->key_len, keylen);
245 type->key_len = keylen;
255 if (klen > 0 && keylen != (u_int)klen)
    [all...]

Completed in 272 milliseconds

1 2 3 4 5 6 7 8