/external/pdfium/core/src/fxcrt/ |
fx_basic_maps.cpp | 526 int index, key_len = key.GetLength();
local 530 if (!_CompactStringSame(pKey, (FX_LPCBYTE)key, key_len)) {
542 _CompactStringStore(pAllocator, pKey, (FX_LPCBYTE)key, key_len);
547 _CompactStringStore(pAllocator, pKey, (FX_LPCBYTE)key, key_len);
559 int key_len = key.GetLength();
local 564 if (!_CompactStringSame(pKey, (FX_LPCBYTE)key, key_len)) {
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 191 const u8 *key, size_t key_len) 211 if (key && key_len > 0 && key_len < sizeof(cmd.key)) { 212 os_memcpy(cmd.key, key, key_len); 213 cmd.key_len = key_len;
|
/external/bluetooth/bluedroid/stack/smp/ |
smp_api.c | 323 ** key_len - key length 331 BOOLEAN SMP_Encrypt (UINT8 *key, UINT8 key_len, 337 status = smp_encrypt_data(key, key_len, plain_text, pt_len, p_out);
|
/external/chromium_org/chrome/browser/chromeos/power/ |
peripheral_battery_observer.cc | 58 int key_len = path.size() - header_size - end_size; local 59 if (key_len <= 0) 61 std::string reverse_address = path.substr(header_size, key_len);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_chacha20poly1305.c | 72 static int aead_chacha20_poly1305_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, size_t tag_len) 85 if (key_len != sizeof(c20_ctx->key)) 92 memcpy(&c20_ctx->key[0], key, key_len);
|
evp_key.c | 124 nkey=type->key_len; 183 rv = type->key_len;
|
evp_enc.c | 190 ctx->key_len = cipher->key_len; 600 if(c->key_len == keylen) return 1; 603 c->key_len = keylen; 642 if (RAND_bytes(key, ctx->key_len) <= 0)
|
e_des3.c | 292 if (RAND_bytes(ptr, c->key_len) <= 0) 295 if (c->key_len >= 16) 297 if (c->key_len >= 24)
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
aes_cbc.h | 69 int key_len, cipher_direction_t dir);
|
/external/srtp/crypto/kernel/ |
crypto_kernel.c | 412 int key_len) { 426 return ((ct)->alloc(cp, key_len)); 450 int key_len, 465 return ((at)->alloc(ap, key_len, tag_len));
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 196 * @key_len: Length of the key in bytes 208 static void eap_sake_kdf(const u8 *key, size_t key_len, const char *label, 233 hmac_sha1_vector(key, key_len, 4, addr, len, 237 hmac_sha1_vector(key, key_len, 4, addr, len,
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 422 size_t key_len; local 425 key_len = gsm->GTK_len; 426 if (key_len > sizeof(keybuf)) 433 pad_len = key_len % 8; 436 if (key_len + pad_len < 16) 438 if (pad_len && key_len < sizeof(keybuf)) { 439 os_memcpy(keybuf, gsm->GTK[gsm->GN - 1], key_len); 440 os_memset(keybuf + key_len, 0, pad_len); 441 keybuf[key_len] = 0xdd; 442 key_len += pad_len [all...] |
wps_hostapd.c | 359 if (cred->key_len >= 8 && cred->key_len < 64) { 361 bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1); 364 cred->key_len); 367 } else if (cred->key_len == 64) { 421 cred->key, cred->key_len); 448 if (cred->key_len == 0) { 454 hapd->wps->network_key_len < cred->key_len) { 457 hapd->wps->network_key = os_malloc(cred->key_len); 461 hapd->wps->network_key_len = cred->key_len; [all...] |
/external/chromium_org/net/tools/balsa/ |
balsa_headers.cc | 614 const size_t key_len = line.key_end_idx - line.first_char_idx; local 616 if (key_len != key.size()) { 620 key.data(), key_len) == 0) { 634 const size_t key_len = line.key_end_idx - line.first_char_idx; local 636 if (key_len != key.size()) { 640 key.data(), key_len) == 0) { 657 const size_t key_len = line.key_end_idx - line.first_char_idx; local 659 if (key_len != key.size()) { 663 key.data(), key_len) == 0) { 719 const size_t key_len = line.key_end_idx - line.first_char_idx local [all...] |
/external/bluetooth/bluedroid/stack/include/ |
smp_api.h | 286 ** key_len - key length 294 SMP_API extern BOOLEAN SMP_Encrypt (UINT8 *key, UINT8 key_len,
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_test.cc | 47 size_t key_len; member in struct:__anon13442::TestGroupInfo 297 EXPECT_EQ(test_info.key_len, key.length() * 8);
|
aes_128_gcm_12_encrypter_test.cc | 47 size_t key_len; member in struct:__anon13446::TestGroupInfo 248 EXPECT_EQ(test_info.key_len, key.length() * 8);
|
/external/openssl/crypto/evp/ |
evp_key.c | 124 nkey=type->key_len; 183 rv = type->key_len;
|
evp_enc.c | 190 ctx->key_len = cipher->key_len; 600 if(c->key_len == keylen) return 1; 603 c->key_len = keylen; 642 if (RAND_bytes(key, ctx->key_len) <= 0)
|
e_des3.c | 292 if (RAND_bytes(ptr, c->key_len) <= 0) 295 if (c->key_len >= 16) 297 if (c->key_len >= 24)
|
/external/srtp/crypto/include/ |
cipher.h | 81 (cipher_pointer_t *cp, int key_len); 160 int key_len; member in struct:cipher_t
|
/external/bluetooth/bluedroid/stack/hcic/ |
hciblecmds.c | 579 BOOLEAN btsnd_hcic_ble_encrypt (UINT8 *key, UINT8 key_len, 604 if (key_len > HCIC_BLE_ENCRYT_KEY_SIZE) key_len = HCIC_BLE_ENCRYT_KEY_SIZE; 607 ARRAY_TO_STREAM (pp, key, key_len); 608 pp += (HCIC_BLE_ENCRYT_KEY_SIZE - key_len);
|
/external/srtp/crypto/cipher/ |
aes_cbc.c | 58 aes_cbc_alloc(cipher_t **c, int key_len) { 64 "allocating cipher with key length %d", key_len); 66 if (key_len != 16) 84 (*c)->key_len = key_len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 340 cred->key, cred->key_len); 361 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { 364 (unsigned long) cred->key_len); 462 if (cred->key_len == 2 * PMK_LEN) { 471 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) { 473 ssid->passphrase = os_malloc(cred->key_len + 1); 476 os_memcpy(ssid->passphrase, cred->key, cred->key_len); 477 ssid->passphrase[cred->key_len] = '\0' [all...] |
/external/libpng/ |
pngwutil.c | 683 png_uint_32 key_len = 0; local 695 while (*key && key_len < 79) 700 *new_key++ = ch, ++key_len, space = 0; 707 *new_key++ = 32, ++key_len, space = 1; 718 if (key_len > 0 && space) /* trailing space */ 720 --key_len, --new_key; 728 if (key_len == 0) 745 return key_len; 1581 png_uint_32 key_len; local 1624 png_uint_32 key_len; local 1676 png_uint_32 key_len, prefix_len; local [all...] |