/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_openssl.cc | 61 int key_len = i2d_ECPrivateKey(key.get(), NULL); local 62 if (key_len <= 0) { 66 scoped_ptr<uint8[]> private_key(new uint8[key_len]); 72 return string(reinterpret_cast<char*>(private_key.get()), key_len);
|
aes_128_gcm_12_decrypter_test.cc | 47 size_t key_len; member in struct:__anon11301::TestGroupInfo 318 size_t key_len; local 337 DecodeHexString(test_vector[j].key, key, &key_len, sizeof(key))); 348 EXPECT_EQ(test_info.key_len, key_len * 8); 364 ASSERT_TRUE(decrypter.SetKey(StringPiece(key, key_len)));
|
aes_128_gcm_12_encrypter_test.cc | 47 size_t key_len; member in struct:__anon11305::TestGroupInfo 270 size_t key_len; local 289 DecodeHexString(test_vector[j].key, key, &key_len, sizeof(key))); 300 EXPECT_EQ(test_info.key_len, key_len * 8); 308 ASSERT_TRUE(encrypter.SetKey(StringPiece(key, key_len)));
|
/external/chromium_org/third_party/openssl/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
cipher.h | 81 (cipher_pointer_t *cp, int key_len); 160 int key_len; member in struct:cipher_t
|
/external/chromium/crypto/ |
hmac_unittest.cc | 67 const int key_len; member in struct:__anon5297 126 cases[i].key_len)); 212 const int key_len = 80; local 229 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(key), key_len));
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeof(k_pad) [all...] |
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 48 const size_t key_len = strlen(key_id); local 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 51 key_len);
|
/external/chromium_org/crypto/ |
hmac_unittest.cc | 89 const int key_len; member in struct:__anon10568 148 cases[i].key_len));
|
/external/openssh/ |
mac.c | 55 int key_len; /* just for UMAC */ member in struct:__anon25825 83 mac->key_len = mac->mac_len = (u_int)evp_len; 86 mac->key_len = macs[which].key_len / 8; 119 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md);
|
cipher.c | 64 u_int key_len; member in struct:Cipher 107 return (c->key_len); 230 if (keylen < cipher->key_len) 242 if (type->key_len > 0 && type->key_len != keylen) { 244 type->key_len, keylen); 245 type->key_len = keylen;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 151 const int key_len = 64; local 156 key = os_malloc(key_len); 160 os_memset(key, 0x11, key_len / 2); 161 os_memset(key + key_len / 2, 0x22, key_len / 2); 162 *len = key_len;
|
eap_fast_pac.c | 346 size_t key_len; local 348 key = eap_fast_parse_hex(pos, &key_len); 349 if (key == NULL || key_len != EAP_FAST_PAC_KEY_LEN) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/external/chromium_org/chrome/browser/chromeos/power/ |
peripheral_battery_observer.cc | 58 int key_len = path.size() - header_size - end_size; local 59 if (key_len <= 0) 61 std::string reverse_address = path.substr(header_size, key_len);
|
/external/ipsec-tools/src/racoon/ |
admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/external/chromium_org/net/disk_cache/ |
disk_format.h | 109 int32 key_len; member in struct:disk_cache::EntryStore
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 594 int key_len = 0, key_size = 0; local 616 key_len = xmlUTF8Strlen (key); 618 if (key_len == 0) { 635 key_size = xmlUTF8Strsize (key, key_len); 692 int key_len = 0, key_size = 0; local 714 key_len = xmlUTF8Strlen (key); 716 if (key_len == 0) { 732 key_size = xmlUTF8Strsize (key, key_len);
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, 228 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); 230 return hmac_sha256_vector(key, key_len, num_elem, addr, len, 236 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, 256 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], 259 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, 277 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 297 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], 300 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, 318 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, 338 size_t key_len = 16; \/* Only AES-128-CBC is used here *\/ local [all...] |