/external/openssl/crypto/pem/ |
pem_pk8.c | 71 char *kstr, int klen, 75 char *kstr, int klen, 85 char *kstr, int klen, 88 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); 92 char *kstr, int klen, 95 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); 99 char *kstr, int klen, 102 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); 106 char *kstr, int klen, 109 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u) 156 int klen; local [all...] |
pem_all.c | 199 unsigned char *kstr, int klen, 211 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 217 PEM_STRING_RSA,bp,x,enc,kstr,klen,cb,u); 222 unsigned char *kstr, int klen, 235 ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u); 241 PEM_STRING_RSA,fp,x,enc,kstr,klen,cb,u); 283 unsigned char *kstr, int klen, 295 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 301 PEM_STRING_DSA,bp,x,enc,kstr,klen,cb,u); 306 unsigned char *kstr, int klen, [all...] |
pem_pkey.c | 101 int klen; local 105 if (cb) klen=cb(psbuf,PEM_BUFSIZE,0,u); 106 else klen=PEM_def_callback(psbuf,PEM_BUFSIZE,0,u); 107 if (klen <= 0) { 113 p8inf = PKCS8_decrypt(p8, psbuf, klen); 141 unsigned char *kstr, int klen, 147 (char *)kstr, klen, 152 pem_str,bp,x,enc,kstr,klen,cb,u); 226 unsigned char *kstr, int klen, 237 ret=PEM_write_bio_PrivateKey(b, x, enc, kstr, klen, cb, u) [all...] |
pem.h | 242 unsigned char *kstr, int klen, pem_password_cb *cb, \ 245 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 250 unsigned char *kstr, int klen, pem_password_cb *cb, \ 253 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 278 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 280 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,enc,kstr,klen,cb,u); \ 285 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 287 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,enc,kstr,klen,cb,u); \ 343 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); 359 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) [all...] |
pem_lib.c | 316 int klen, pem_password_cb *callback, void *u) 327 ret=PEM_ASN1_write_bio(i2d,name,b,x,enc,kstr,klen,callback,u); 335 int klen, pem_password_cb *callback, void *u) 377 klen=PEM_def_callback(buf,PEM_BUFSIZE,1,u); 379 klen=(*callback)(buf,PEM_BUFSIZE,1,u); 380 if (klen <= 0) 387 ebcdic2ascii(buf, buf, klen); 397 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL)) 443 int i,j,o,klen; local 453 klen=PEM_def_callback(buf,PEM_BUFSIZE,0,u) [all...] |
pem_info.c | 314 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) 383 enc,kstr,klen,cb,u)<=0)
|
/external/openssh/ |
kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; local 112 klen = (EC_GROUP_get_degree(group) + 7) / 8; 113 kbuf = xmalloc(klen); 114 if (ECDH_compute_key(kbuf, klen, server_public, 115 client_key, NULL) != (int)klen) 119 dump_digest("shared secret", kbuf, klen); 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 125 memset(kbuf, 0, klen);
|
kexecdhs.c | 61 u_int klen, slen, sbloblen, hashlen; local 104 klen = (EC_GROUP_get_degree(group) + 7) / 8; 105 kbuf = xmalloc(klen); 106 if (ECDH_compute_key(kbuf, klen, client_public, 107 server_key, NULL) != (int)klen) 111 dump_digest("shared secret", kbuf, klen); 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 117 memset(kbuf, 0, klen);
|
kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 116 klen = DH_size(dh); 117 kbuf = xmalloc(klen); 127 memset(kbuf, 0, klen);
|
kexdhs.c | 57 u_int sbloblen, klen, hashlen, slen; local 109 klen = DH_size(dh); 110 kbuf = xmalloc(klen); 120 memset(kbuf, 0, klen);
|
kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; local 154 klen = DH_size(dh); 155 kbuf = xmalloc(klen); 165 memset(kbuf, 0, klen);
|
kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; local 146 klen = DH_size(dh); 147 kbuf = xmalloc(klen); 157 memset(kbuf, 0, klen);
|
cipher.c | 215 int klen; local 254 klen = EVP_CIPHER_CTX_key_length(&cc->evp); 255 if (klen > 0 && keylen != (u_int)klen) { 256 debug2("cipher_init: set keylen (%d -> %d)", klen, keylen); 259 klen, keylen);
|
/external/openssl/include/openssl/ |
pem.h | 242 unsigned char *kstr, int klen, pem_password_cb *cb, \ 245 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 250 unsigned char *kstr, int klen, pem_password_cb *cb, \ 253 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ 278 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 280 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,enc,kstr,klen,cb,u); \ 285 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 287 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,enc,kstr,klen,cb,u); \ 343 unsigned char *kstr, int klen, pem_password_cb *cb, void *u); 359 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) [all...] |
/external/srtp/crypto/include/ |
auth.h | 74 #define auth_type_alloc(at, a, klen, outlen) \ 75 ((at)->alloc((a), (klen), (outlen)))
|
cipher.h | 168 #define cipher_type_alloc(ct, c, klen) ((ct)->alloc((c), (klen)))
|
/external/srtp/crypto/test/ |
cipher_driver.c | 78 int klen, int num_cipher); 92 cipher_type_t *ctype, int klen); 346 cipher_type_t *ctype, int klen) { 361 key = crypto_alloc(klen); 371 status = cipher_type_alloc(ctype, cipher_array, klen); 376 for (j=0; j < klen; j++) 475 int klen, int num_cipher) { 479 status = cipher_array_alloc_init(&ca, num_cipher, ct, klen);
|
/external/libppp/src/ |
pap.c | 184 u_char nlen, klen, *key; local 254 bp = mbuf_Read(bp, &klen, 1); 255 if (m_length(bp) < klen) { 259 if ((key = malloc(klen+1)) == NULL) { 263 bp = mbuf_Read(bp, key, klen); 264 key[klen] = '\0';
|
chap.c | 133 size_t nlen, klen; local 136 klen = strlen(key); 157 for (f = 0; f < klen; f++) { 167 MD4Update(&MD4context, expkey, klen << 1); 203 for (f = 0; f < klen; f++) { 211 NtPasswordHash(expkey, klen * 2, pwdhash); 216 expkey, klen * 2, ntresponse); 222 GenerateAuthenticatorResponse(expkey, klen * 2, ntresponse, 240 MD5Update(&MD5context, key, klen);
|
radius.c | 894 const char *key, int klen, const char *nchallenge, 950 if (rad_put_attr(r->cx.rad, RAD_USER_PASSWORD, key, klen) != 0) { 962 if (rad_put_attr(r->cx.rad, RAD_CHAP_PASSWORD, key, klen) != 0 || 974 if (klen != 50) { 975 log_Printf(LogERROR, "CHAP80: Unrecognised key length %d\n", klen); 993 if (klen != sizeof(*keyv2) + 1) { 994 log_Printf(LogERROR, "CHAP81: Unrecognised key length %d\n", klen); [all...] |
/external/openssl/crypto/evp/ |
openbsd_hw.c | 131 const unsigned char *key,int klen) 140 memcpy(CDATA(ctx)->key,key,klen); 143 CDATA(ctx)->keylen=klen;
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 754 int klen; local 758 klen = wpa_cipher_key_len(sm->pairwise); 772 sm->PTK.tk1, klen)) [all...] |
wpa_auth.c | 2050 int klen = wpa_cipher_key_len(sm->pairwise); local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 572 int klen; local 583 klen = wpa_cipher_key_len(group_cipher); 584 if (keylen != klen || maxkeylen < klen) { [all...] |
/packages/inputmethods/OpenWnn/libs/libwnnDictionary/engine/ |
ndldic.c | 1808 NJ_UINT16 klen; local [all...] |