/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/cmac/ |
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 87 int keylen, x, y, j; local 94 keylen = prng->rc4.x; 103 if (j == keylen) {
|
/external/openssl/crypto/cmac/ |
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
linux_netlink.c | 103 size_t keylen = strlen(key); local 107 if (0 == strncmp(buffer + offset, key, keylen) && 108 '=' == buffer[offset + keylen]) { 109 return buffer + offset + keylen + 1;
|
/external/chromium_org/third_party/openssl/openssl/crypto/hmac/ |
hm_pmeth.c | 227 long keylen; local 228 key = string_to_hex(value, &keylen); 231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
/external/libppp/src/ |
pap.c | 89 int namelen, keylen, plen; local 92 keylen = strlen(bundle->cfg.auth.key); 93 plen = namelen + keylen + 2; 94 log_Printf(LogDEBUG, "pap_Req: namelen = %d, keylen = %d\n", namelen, keylen); 107 *cp++ = keylen; 108 memcpy(cp, bundle->cfg.auth.key, keylen);
|
/external/openssl/crypto/hmac/ |
hm_pmeth.c | 227 long keylen; local 228 key = string_to_hex(value, &keylen); 231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon30587::__anon30588 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
/external/chromium_org/third_party/usrsctp/overrides/usrsctplib/netinet/ |
sctp_auth.h | 67 uint32_t keylen; member in struct:sctp_key 134 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 138 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 139 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 176 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 178 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 185 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 14 const unsigned char *key, unsigned long keylen, 18 const unsigned char *key, unsigned long keylen, 22 unsigned long keylen, 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 42 const unsigned char *key, unsigned long keylen, 46 const unsigned char *key, unsigned long keylen, 50 const unsigned char *key, unsigned long keylen, 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 77 const unsigned char *key, unsigned long keylen, 355 keylen, member in struct:__anon19195 [all...] |
/external/grub/stage2/ |
md5.c | 209 int keylen = strlen (key); local 238 md5_update (key, keylen); 240 md5_update (key, keylen); 246 md5_update (key, keylen); 248 for (i = keylen; i > 16; i -= 16) 252 for (i = keylen; i > 0; i >>= 1) 253 md5_update (key + ((i & 1) ? keylen : 0), 1); 263 md5_update (key, keylen); 271 md5_update (key, keylen); 276 md5_update (key, keylen); [all...] |
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/external/smack/src/org/xbill/DNS/ |
TKEYRecord.java | 86 int keylen = in.readU16(); local 87 if (keylen > 0) 88 key = in.readByteArray(keylen);
|
/external/smali/util/src/main/java/ds/tree/ |
RadixTreeImpl.java | 437 int keylen = key.length(); local 440 while (i < keylen && i < nodelen) { 447 if (i == keylen && i <= nodelen) { 450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) { 452 String ending = key.substring(i, keylen);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 229 size_t keylen; local 236 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 240 if (keylen > *len) 241 keylen = *len; 242 os_memcpy(msk, key, keylen); 243 *len = keylen;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 318 int keylen; local 331 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 550 size_t gtk_len, keylen, rsc_len; local 573 keylen = wpa_cipher_key_len(sm->group_cipher); 582 if (gtk_len < keylen) { 591 if (gtk_elem[2] != keylen) { 594 gtk_elem[2], (unsigned long) keylen); 598 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 607 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
/external/chromium_org/base/process/ |
launch_posix.cc | 296 const unsigned keylen = equals - pair; local 297 if (keylen == j->first.size() && 298 memcmp(pair, j->first.data(), keylen) == 0) { 335 const unsigned keylen = equals - pair; local 339 if (j->first.size() == keylen && 340 memcmp(j->first.data(), pair, keylen) == 0) { 343 memcpy(scratch, pair, keylen + 1); 344 scratch += keylen + 1; 373 const unsigned keylen = equals - pair; local 374 if (keylen == j->first.size() & [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pvkfmt.c | 726 unsigned int saltlen, unsigned int keylen, 749 enctmp = OPENSSL_malloc(keylen + 8); 762 inlen = keylen - 8; 796 ret = b2i_PrivateKey(&p, keylen); 811 unsigned int saltlen, keylen; local 819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 821 buflen = (int) keylen + saltlen; 834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 329 int keylen,ivlen; local 338 keylen=EVP_CIPHER_key_length(evp_cipher); 365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 368 OPENSSL_cleanse(key, keylen); 508 int keylen,ivlen;
|