/external/libppp/src/ |
mppe.c | 101 unsigned keylen; /* 8 or 16 bytes */ member in struct:mppe_state 150 GetNewKeyFromSHA(mp->mastkey, mp->sesskey, mp->keylen, InterimKey); 151 RC4_set_key(&RC4Key, mp->keylen, InterimKey); 152 RC4(&RC4Key, mp->keylen, InterimKey, mp->sesskey); 205 RC4_set_key(&mop->rc4key, mop->keylen, mop->sesskey); 354 RC4_set_key(&mip->rc4key, mip->keylen, mip->sesskey); 655 mp->keylen = 16; 659 mp->keylen = 8; 663 mp->keylen = 8; 697 if (mip->keylen > bundle->radius.mppe.recvkeylen [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 726 unsigned int saltlen, unsigned int keylen, 749 enctmp = OPENSSL_malloc(keylen + 8); 762 inlen = keylen - 8; 796 ret = b2i_PrivateKey(&p, keylen); 811 unsigned int saltlen, keylen; local 819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 821 buflen = (int) keylen + saltlen; 834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 329 int keylen,ivlen; local 338 keylen=EVP_CIPHER_key_length(evp_cipher); 365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 368 OPENSSL_cleanse(key, keylen); 508 int keylen,ivlen;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon30587::__anon30588 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_openssl.c | 137 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 151 !EVP_CIPHER_CTX_set_key_length(&ctx, keylen) || 195 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) 197 switch (keylen) { 553 int keylen; local 568 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); 569 if (keylen < 0) 571 wpabuf_put(res, keylen);
|
/external/chromium/base/ |
process_util_posix.cc | 403 const unsigned keylen = equals - pair; local 404 if (keylen == j->first.size() && 405 memcmp(pair, j->first.data(), keylen) == 0) { 442 const unsigned keylen = equals - pair; local 446 if (j->first.size() == keylen && 447 memcmp(j->first.data(), pair, keylen) == 0) { 450 memcpy(scratch, pair, keylen + 1); 451 scratch += keylen + 1; 480 const unsigned keylen = equals - pair; local 481 if (keylen == j->first.size() & [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
eng_cryptodev.c | 142 int keylen; member in struct:__anon15534 160 int keylen; member in struct:__anon15535 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen = BN_num_bits(dh->p) [all...] |
/external/iproute2/ip/ |
ipxfrm.c | 518 int keylen; local 534 keylen = algo->alg_key_len / 8; 535 if (len < keylen) { 541 for (i = 0; i < keylen; i ++)
|
/external/ipsec-tools/src/racoon/ |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2788 u_int keylen, prflen; local [all...] |
ipsec_doi.c | 557 int keylen = 0; local 731 "keylen %d: not multiple of 8\n", 736 keylen++; 860 if (keylen) { 867 "keylen must not be specified " [all...] |
/external/openssh/ |
monitor_wrap.c | 609 u_int ivlen, keylen; local 616 keylen = packet_get_encryption_key(NULL); 617 key = xmalloc(keylen+1); /* add 1 if keylen == 0 */ 618 keylen = packet_get_encryption_key(key); 619 buffer_put_string(&m, key, keylen); 620 memset(key, 0, keylen); [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 142 int keylen; member in struct:__anon25980 160 int keylen; member in struct:__anon25981 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen = BN_num_bits(dh->p) [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
req.c | 1599 long keylen = -1; local [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 102 ulong32 K[32], keylen; member in struct:cast5_key 333 @param keylen The length of the input key (octets) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 443 @param keylen The length of the secret key (octets) 458 const unsigned char *key, unsigned long keylen, 469 @param keylen The length of the secret key 483 const unsigned char *key, unsigned long keylen, 493 @param keylen The key length (octets) 501 const unsigned char *key, unsigned long keylen, 507 @param keylen The key length (octets) [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 1323 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local [all...] |
/external/openssl/apps/ |
req.c | 1599 long keylen = -1; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1070 size_t keylen; local 1082 &keylen); 1084 keys->send = decrypt_ms_key(key, keylen, 1093 &keylen); 1095 keys->recv = decrypt_ms_key(key, keylen, 1111 size_t keylen; local 1122 RADIUS_CISCO_AV_PAIR, &keylen); 1123 if (key && keylen == 51 && 1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 513 int keylen, rsclen; local 535 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 546 (u8 *) sm->ptk.tk1, keylen) < 0) { 549 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 550 alg, keylen, MAC2STR(sm->bssid)); 566 int keylen, int maxkeylen, 582 if (keylen != klen || maxkeylen < klen) { 585 wpa_cipher_txt(group_cipher), keylen, maxkeylen); 633 "the driver (alg=%d keylen=%d keyidx=%d)", 1037 u16 key_info, keylen, len local 2642 u8 keylen; \/* plaintext key len *\/ local [all...] |
/external/chromium_org/third_party/icu/source/common/ |
uloc_tag.c | 559 _ldmlKeyToBCP47(const char* key, int32_t keyLen, 571 if (keyLen < 0) { 572 keyLen = (int32_t)uprv_strlen(key); 575 if (keyLen >= sizeof(keyBuf)) { 581 uprv_memcpy(keyBuf, key, keyLen); 582 keyBuf[keyLen] = 0; 585 for (i = 0; i < keyLen; i++) { 603 if (_isLDMLKey(key, keyLen)) { 604 uprv_memcpy(bcpKeyBuf, key, keyLen); 605 bcpKeyBuf[keyLen] = 0 1204 int32_t keylen; local [all...] |
/external/icu4c/common/ |
uloc_tag.c | 622 _ldmlKeyToBCP47(const char* key, int32_t keyLen, 634 if (keyLen < 0) { 635 keyLen = (int32_t)uprv_strlen(key); 638 if (keyLen >= sizeof(keyBuf)) { 644 uprv_memcpy(keyBuf, key, keyLen); 645 keyBuf[keyLen] = 0; 648 for (i = 0; i < keyLen; i++) { 666 if (_isLDMLKey(key, keyLen)) { 667 uprv_memcpy(bcpKeyBuf, key, keyLen); 668 bcpKeyBuf[keyLen] = 0 1284 int32_t keylen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.c | 135 size_t keylen; local 157 keylen = 16; 162 keylen = 16; 169 keylen = 32; 181 return wpa_drv_set_key(wpa_s, alg, NULL, 0, 1, seq, 6, key, keylen); [all...] |
/external/iproute2/misc/ |
ss.c | 2430 int keylen = strlen(key); local [all...] |
/external/opencv/cxcore/src/ |
cxpersistence.cpp | 1326 int i, keylen = 0; local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.mortbay.jetty.server_6.1.23.v201004211559.jar | |