HomeSort by relevance Sort by last modified time
    Searched refs:keylen (Results 76 - 100 of 216) sorted by null

1 2 34 5 6 7 8 9

  /external/openssl/crypto/ec/
ec_pmeth.c 170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
185 *keylen = (EC_GROUP_get_degree(group) + 7)/8;
195 outlen = *keylen;
200 *keylen = ret;
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 23 size_t keylen; member in struct:crypto_cipher::__anon31493::__anon31494
61 ctx->u.rc4.keylen = key_len;
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
  /external/mdnsresponder/mDNSShared/
dnsextd_parser.y 483 mDNSs32 keylen;
490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
491 if (keylen < 0) { free(authInfo); err = 1; goto exit; }
517 mDNSs32 keylen;
524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
525 if (keylen < 0) { free(authInfo); err = 1; goto exit; }
  /external/ipsec-tools/src/racoon/
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
  /external/antlr/antlr-3.4/runtime/ObjC/Framework/
ACBTree.h 55 NSInteger keylen; /* length of key */ variable
71 @property (assign) NSInteger keylen; variable
  /external/chromium_org/third_party/openssl/openssl/crypto/dh/
dh_pmeth.c 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
216 *keylen = ret;
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
pmeth_gn.c 202 const unsigned char *key, int keylen)
213 keylen, (void *)key) <= 0)
  /external/dropbear/libtomcrypt/src/ciphers/safer/
safer.c 180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
189 if (keylen != 8) {
197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
206 if (keylen != 8) {
214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
223 if (keylen != 16) {
231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
240 if (keylen != 16) {
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_init.c 43 @param keylen The length of the secret key (octets)
48 const unsigned char *key, unsigned long keylen, const unsigned char *nonce)
73 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &ocb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_test.c 30 int keylen, msglen;
89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 28 @param keylen The length of the secret key (octets)
31 int pelican_init(pelican_state *pelmac, const unsigned char *key, unsigned long keylen)
44 if ((err = aes_setup(key, keylen, 0, &pelmac->K)) != CRYPT_OK) {
pelican_test.c 27 int keylen, ptlen;
92 if ((err = pelican_init(&pel, tests[x].K, tests[x].keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_init.c 43 @param keylen The length of the secret key (octets)
46 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen)
78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_test.c 26 int keylen, msglen;
63 if ((err = ctr_start(idx, tests[x].IV, tests[x].key, tests[x].keylen, 0, CTR_COUNTER_BIG_ENDIAN|LTC_CTR_RFC3686, &ctr)) != CRYPT_OK) {
  /external/openssl/crypto/dh/
dh_pmeth.c 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)
216 *keylen = ret;
  /external/openssl/crypto/evp/
pmeth_gn.c 202 const unsigned char *key, int keylen)
213 keylen, (void *)key) <= 0)
  /external/dropbear/libtomcrypt/src/ciphers/
noekeon.c 70 @param keylen The key length in bytes
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
82 if (keylen != 16) {
222 int keylen;
239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 24 @param keylen The length of the secret key (octets)
39 const unsigned char *key, unsigned long keylen,
93 key, keylen,
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
  /external/wpa_supplicant_8/src/radius/
radius.c 1070 size_t keylen; local
1082 &keylen);
1084 keys->send = decrypt_ms_key(key, keylen,
1093 &keylen);
1095 keys->recv = decrypt_ms_key(key, keylen,
1111 size_t keylen; local
1122 RADIUS_CISCO_AV_PAIR, &keylen);
1123 if (key && keylen == 51 &&
1125 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
    [all...]
  /external/smali/util/src/main/java/ds/tree/
RadixTreeImpl.java 437 int keylen = key.length(); local
440 while (i < keylen && i < nodelen) {
447 if (i == keylen && i <= nodelen) {
450 else if (nodelen == 0 || (i < keylen && i >= nodelen)) {
452 String ending = key.substring(i, keylen);
  /external/chromium/base/
process_util_posix.cc 403 const unsigned keylen = equals - pair; local
404 if (keylen == j->first.size() &&
405 memcmp(pair, j->first.data(), keylen) == 0) {
442 const unsigned keylen = equals - pair; local
446 if (j->first.size() == keylen &&
447 memcmp(j->first.data(), pair, keylen) == 0) {
450 memcpy(scratch, pair, keylen + 1);
451 scratch += keylen + 1;
480 const unsigned keylen = equals - pair; local
481 if (keylen == j->first.size() &
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/aes/
aes.c 118 @param keylen The key length in bytes
123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
133 if (keylen != 16 && keylen != 24 && keylen != 32) {
137 if (num_rounds != 0 && num_rounds != (10 + ((keylen/8)-2)*2)) {
141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2;
150 if (keylen == 16) {
163 } else if (keylen == 24) {
184 } else if (keylen == 32)
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 340 @param keylen The key length in bytes
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
366 if (keylen != 16 && keylen != 24 && keylen != 32) {
371 k = keylen / 8;
374 for (x = 0; x < keylen; x++) {
456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
459 x = _twofish_setup(key, keylen, num_rounds, skey)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 318 int keylen; local
331 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
550 size_t gtk_len, keylen, rsc_len; local
573 keylen = wpa_cipher_key_len(sm->group_cipher);
582 if (gtk_len < keylen) {
591 if (gtk_elem[2] != keylen) {
594 gtk_elem[2], (unsigned long) keylen);
598 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
607 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/chromium_org/third_party/leveldatabase/src/db/
c.cc 173 const char* key, size_t keylen,
177 db->rep->Put(options->rep, Slice(key, keylen), Slice(val, vallen)));
183 const char* key, size_t keylen,
185 SaveError(errptr, db->rep->Delete(options->rep, Slice(key, keylen)));
200 const char* key, size_t keylen,
205 Status s = db->rep->Get(options->rep, Slice(key, keylen), &tmp);

Completed in 2072 milliseconds

1 2 34 5 6 7 8 9