HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 51) sorted by null

1 2 3

  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 59 int keylen; local
101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
102 if (keylen > 63) keylen = 63;
103 memcpy(t->key, p + 2, keylen);
  /external/chromium_org/third_party/openssl/openssl/crypto/cmac/
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 87 int keylen, x, y, j; local
94 keylen = prng->rc4.x;
103 if (j == keylen) {
  /external/openssl/crypto/cmac/
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/antlr/antlr-3.4/runtime/ObjC/Framework/
ACBTree.h 55 NSInteger keylen; /* length of key */ variable
71 @property (assign) NSInteger keylen; variable
  /external/chromium_org/third_party/libusb/src/libusb/os/
linux_netlink.c 103 size_t keylen = strlen(key); local
107 if (0 == strncmp(buffer + offset, key, keylen) &&
108 '=' == buffer[offset + keylen]) {
109 return buffer + offset + keylen + 1;
  /external/chromium_org/third_party/openssl/openssl/crypto/hmac/
hm_pmeth.c 227 long keylen; local
228 key = string_to_hex(value, &keylen);
231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
  /external/libppp/src/
pap.c 89 int namelen, keylen, plen; local
92 keylen = strlen(bundle->cfg.auth.key);
93 plen = namelen + keylen + 2;
94 log_Printf(LogDEBUG, "pap_Req: namelen = %d, keylen = %d\n", namelen, keylen);
107 *cp++ = keylen;
108 memcpy(cp, bundle->cfg.auth.key, keylen);
  /external/openssl/crypto/hmac/
hm_pmeth.c 227 long keylen; local
228 key = string_to_hex(value, &keylen);
231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 23 size_t keylen; member in struct:crypto_cipher::__anon30580::__anon30581
61 ctx->u.rc4.keylen = key_len;
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 83 int keylen, unsigned char *out)
96 tkeylen = keylen;
142 h__dump (out, keylen);
149 int keylen, unsigned char *out)
152 keylen, out);
238 unsigned int keylen = 0; local
248 keylen = EVP_CIPHER_CTX_key_length(ctx);
249 OPENSSL_assert(keylen <= sizeof key);
267 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 83 int keylen, unsigned char *out)
96 tkeylen = keylen;
142 h__dump (out, keylen);
149 int keylen, unsigned char *out)
152 keylen, out);
238 unsigned int keylen = 0; local
248 keylen = EVP_CIPHER_CTX_key_length(ctx);
249 OPENSSL_assert(keylen <= sizeof key);
267 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
    [all...]
  /external/chromium_org/third_party/usrsctp/overrides/usrsctplib/netinet/
sctp_auth.h 67 uint32_t keylen; member in struct:sctp_key
134 extern sctp_key_t *sctp_alloc_key(uint32_t keylen);
138 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen);
139 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen);
176 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
178 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
185 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon19193
    [all...]
  /external/grub/stage2/
md5.c 209 int keylen = strlen (key); local
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
248 for (i = keylen; i > 16; i -= 16)
252 for (i = keylen; i > 0; i >>= 1)
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
    [all...]
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /external/smack/src/org/xbill/DNS/
TKEYRecord.java 86 int keylen = in.readU16(); local
87 if (keylen > 0)
88 key = in.readByteArray(keylen);
  /external/smali/util/src/main/java/ds/tree/
RadixTreeImpl.java 437 int keylen = key.length(); local
440 while (i < keylen && i < nodelen) {
447 if (i == keylen && i <= nodelen) {
450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) {
452 String ending = key.substring(i, keylen);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 229 size_t keylen; local
236 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
240 if (keylen > *len)
241 keylen = *len;
242 os_memcpy(msk, key, keylen);
243 *len = keylen;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 318 int keylen; local
331 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
550 size_t gtk_len, keylen, rsc_len; local
573 keylen = wpa_cipher_key_len(sm->group_cipher);
582 if (gtk_len < keylen) {
591 if (gtk_elem[2] != keylen) {
594 gtk_elem[2], (unsigned long) keylen);
598 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
607 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/chromium_org/base/process/
launch_posix.cc 296 const unsigned keylen = equals - pair; local
297 if (keylen == j->first.size() &&
298 memcmp(pair, j->first.data(), keylen) == 0) {
335 const unsigned keylen = equals - pair; local
339 if (j->first.size() == keylen &&
340 memcmp(j->first.data(), pair, keylen) == 0) {
343 memcpy(scratch, pair, keylen + 1);
344 scratch += keylen + 1;
373 const unsigned keylen = equals - pair; local
374 if (keylen == j->first.size() &
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pvkfmt.c 726 unsigned int saltlen, unsigned int keylen,
749 enctmp = OPENSSL_malloc(keylen + 8);
762 inlen = keylen - 8;
796 ret = b2i_PrivateKey(&p, keylen);
811 unsigned int saltlen, keylen; local
819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
821 buflen = (int) keylen + saltlen;
834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pk7_doit.c 142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
329 int keylen,ivlen; local
338 keylen=EVP_CIPHER_key_length(evp_cipher);
365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
368 OPENSSL_cleanse(key, keylen);
508 int keylen,ivlen;

Completed in 859 milliseconds

1 2 3