/external/openssl/crypto/ec/ |
ec_pmeth.c | 170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) 185 *keylen = (EC_GROUP_get_degree(group) + 7)/8; 195 outlen = *keylen; 200 *keylen = ret;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon31493::__anon31494 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_parser.y | 483 mDNSs32 keylen; 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } 517 mDNSs32 keylen; 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 525 if (keylen < 0) { free(authInfo); err = 1; goto exit; }
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
dh_pmeth.c | 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) 216 *keylen = ret;
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
pmeth_gn.c | 202 const unsigned char *key, int keylen) 213 keylen, (void *)key) <= 0)
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
safer.c | 180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 189 if (keylen != 8) { 197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 206 if (keylen != 8) { 214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 223 if (keylen != 16) { 231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 240 if (keylen != 16) {
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_init.c | 43 @param keylen The length of the secret key (octets) 48 const unsigned char *key, unsigned long keylen, const unsigned char *nonce) 73 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &ocb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_test.c | 30 int keylen, msglen; 89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 28 @param keylen The length of the secret key (octets) 31 int pelican_init(pelican_state *pelmac, const unsigned char *key, unsigned long keylen) 44 if ((err = aes_setup(key, keylen, 0, &pelmac->K)) != CRYPT_OK) {
|
pelican_test.c | 27 int keylen, ptlen; 92 if ((err = pelican_init(&pel, tests[x].K, tests[x].keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_init.c | 43 @param keylen The length of the secret key (octets) 46 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen) 78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_test.c | 26 int keylen, msglen; 63 if ((err = ctr_start(idx, tests[x].IV, tests[x].key, tests[x].keylen, 0, CTR_COUNTER_BIG_ENDIAN|LTC_CTR_RFC3686, &ctr)) != CRYPT_OK) {
|
/external/openssl/crypto/dh/ |
dh_pmeth.c | 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) 216 *keylen = ret;
|
/external/openssl/crypto/evp/ |
pmeth_gn.c | 202 const unsigned char *key, int keylen) 213 keylen, (void *)key) <= 0)
|
/external/dropbear/libtomcrypt/src/ciphers/ |
noekeon.c | 70 @param keylen The key length in bytes 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 82 if (keylen != 16) { 222 int keylen; 239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 24 @param keylen The length of the secret key (octets) 39 const unsigned char *key, unsigned long keylen, 93 key, keylen, 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1070 size_t keylen; local 1082 &keylen); 1084 keys->send = decrypt_ms_key(key, keylen, 1093 &keylen); 1095 keys->recv = decrypt_ms_key(key, keylen, 1111 size_t keylen; local 1122 RADIUS_CISCO_AV_PAIR, &keylen); 1123 if (key && keylen == 51 && 1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/smali/util/src/main/java/ds/tree/ |
RadixTreeImpl.java | 437 int keylen = key.length(); local 440 while (i < keylen && i < nodelen) { 447 if (i == keylen && i <= nodelen) { 450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) { 452 String ending = key.substring(i, keylen);
|
/external/chromium/base/ |
process_util_posix.cc | 403 const unsigned keylen = equals - pair; local 404 if (keylen == j->first.size() && 405 memcmp(pair, j->first.data(), keylen) == 0) { 442 const unsigned keylen = equals - pair; local 446 if (j->first.size() == keylen && 447 memcmp(j->first.data(), pair, keylen) == 0) { 450 memcpy(scratch, pair, keylen + 1); 451 scratch += keylen + 1; 480 const unsigned keylen = equals - pair; local 481 if (keylen == j->first.size() & [all...] |
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
aes.c | 118 @param keylen The key length in bytes 123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 133 if (keylen != 16 && keylen != 24 && keylen != 32) { 137 if (num_rounds != 0 && num_rounds != (10 + ((keylen/8)-2)*2)) { 141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2; 150 if (keylen == 16) { 163 } else if (keylen == 24) { 184 } else if (keylen == 32) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 340 @param keylen The key length in bytes 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 366 if (keylen != 16 && keylen != 24 && keylen != 32) { 371 k = keylen / 8; 374 for (x = 0; x < keylen; x++) { 456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 459 x = _twofish_setup(key, keylen, num_rounds, skey) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 318 int keylen; local 331 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 550 size_t gtk_len, keylen, rsc_len; local 573 keylen = wpa_cipher_key_len(sm->group_cipher); 582 if (gtk_len < keylen) { 591 if (gtk_elem[2] != keylen) { 594 gtk_elem[2], (unsigned long) keylen); 598 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 607 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
/external/chromium_org/third_party/leveldatabase/src/db/ |
c.cc | 173 const char* key, size_t keylen, 177 db->rep->Put(options->rep, Slice(key, keylen), Slice(val, vallen))); 183 const char* key, size_t keylen, 185 SaveError(errptr, db->rep->Delete(options->rep, Slice(key, keylen))); 200 const char* key, size_t keylen, 205 Status s = db->rep->Get(options->rep, Slice(key, keylen), &tmp);
|