/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_init.c | 24 @param keylen Length of secret key in octets 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 50 for (x = 0; (unsigned)x < keylen; x++) { 60 f9->keylen = keylen;
|
f9_memory.c | 23 @param keylen Length of key in octets 31 const unsigned char *key, unsigned long keylen, 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
|
f9_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_init.c | 27 @param keylen The length of the secret key (octets) 30 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) 48 if (keylen == 0) { 66 if(keylen > HMAC_BLOCKSIZE) { 68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { 74 keylen = hashsize; 76 XMEMCPY(hmac->key, key, (size_t)keylen); 77 if(keylen < HMAC_BLOCKSIZE) { 78 zeromem((hmac->key) + keylen, (size_t)(HMAC_BLOCKSIZE - keylen)); [all...] |
hmac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen); 61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) {
|
hmac_file.c | 25 @param keylen The length of the secret key 31 const unsigned char *key, unsigned long keylen, 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 14 const unsigned char *key, unsigned long keylen, 18 const unsigned char *key, unsigned long keylen, 22 unsigned long keylen, 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 42 const unsigned char *key, unsigned long keylen, 46 const unsigned char *key, unsigned long keylen, 50 const unsigned char *key, unsigned long keylen, 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 77 const unsigned char *key, unsigned long keylen, 355 keylen, member in struct:__anon20107 [all...] |
tomcrypt_cipher.h | 102 ulong32 K[32], keylen; member in struct:cast5_key 333 @param keylen The length of the input key (octets) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 443 @param keylen The length of the secret key (octets) 458 const unsigned char *key, unsigned long keylen, 469 @param keylen The length of the secret key 483 const unsigned char *key, unsigned long keylen, 493 @param keylen The key length (octets) 501 const unsigned char *key, unsigned long keylen, 507 @param keylen The key length (octets) [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican_memory.c | 23 @param keylen The length of the key (octets) 29 int pelican_memory(const unsigned char *key, unsigned long keylen, 41 if ((err = pelican_init(pel, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_find_cipher_any.c | 22 @param keylen The minimum length of the key size desired (octets) 25 int find_cipher_any(const char *name, int blocklen, int keylen) 39 if (blocklen <= (int)cipher_descriptor[x].block_length && keylen <= (int)cipher_descriptor[x].max_key_length) {
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_start.c | 25 @param keylen The length of the secret key (octets) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
|
omac_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory.c | 23 @param keylen Length of key in octets 31 const unsigned char *key, unsigned long keylen, 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
xcbc_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_start.c | 25 @param keylen The length of the secret key (octets) 31 int keylen, int num_rounds, symmetric_CBC *cbc) 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_start.c | 26 @param keylen The length of the secret key (octets) 32 int keylen, int num_rounds, symmetric_OFB *ofb) 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key);
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 26 @param keylen The length of the secret key (octets) 34 const unsigned char *key, int keylen, 64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { 70 for (; x < keylen && x < (int)sizeof(tkey); x++) { 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */ 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { 91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_encrypt_authenticate_memory.c | 24 @param keylen The length of the secret key (octets) 37 const unsigned char *key, unsigned long keylen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
|
pmac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_start.c | 26 @param keylen The length of the secret key (octets) 32 int keylen, int num_rounds, symmetric_CFB *cfb) 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_memory.c | 24 @param keylen The length of the secret key 38 const unsigned char *key, unsigned long keylen, 57 (key, keylen, 87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |