/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 45 size_t key_len) 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 79 if (key_len != 24) { 87 if (key_len != 8) {
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/ |
null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len; 102 null_cipher_init(null_cipher_ctx_t *ctx, const uint8_t *key, int key_len) {
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
|
/external/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 63 if (key_len != 20) 65 hmac_sha1(key, key_len, data, data_len, tmphash); 69 if (key_len != 16) 71 hmac_md5(key, key_len, data, data_len, tmphash); 95 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); 104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); 114 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 144 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1] [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 141 uint32_t key_len = 0; local 174 key_len += sizeof(metadata); 176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len); 177 key_len += metadata.lenpubmod; 189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len); 190 key_len += metadata.lenpubexp; 196 metadata.rsacrtpriv.lenp = BN_bn2bin(rsa->p, kbuf + key_len); 197 key_len += metadata.rsacrtpriv.lenp; 198 metadata.rsacrtpriv.lenq = BN_bn2bin(rsa->q, kbuf + key_len); 199 key_len += metadata.rsacrtpriv.lenq [all...] |
/external/chromium_org/crypto/ |
hmac_win.cc | 45 void ComputeHMACSHA256(const unsigned char* key, size_t key_len, 52 if (key_len > SHA256_BLOCK_SIZE) { 54 Wrapped_SHA256_Update(&ctx, key, key_len); 58 memcpy(key0, key, key_len); 59 if (key_len < SHA256_BLOCK_SIZE) 60 memset(key0 + key_len, 0, SHA256_BLOCK_SIZE - key_len);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_openbsd.c | 73 size_t seq_len, const u8 *key, size_t key_len) 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN) 85 memcpy(keyavail.i_key, key, key_len);
|
/hardware/intel/common/libva/va/drm/ |
va_drm_utils.c | 34 int key_len; member in struct:driver_name_map 64 if (drm_version->name_len >= m->key_len && 65 strncmp(drm_version->name, m->key, m->key_len) == 0)
|
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 48 const size_t key_len = strlen(key_id); local 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 51 key_len);
|
/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_openssl.cc | 61 int key_len = i2d_ECPrivateKey(key.get(), NULL); local 62 if (key_len <= 0) { 66 scoped_ptr<uint8[]> private_key(new uint8[key_len]); 72 return string(reinterpret_cast<char*>(private_key.get()), key_len);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
xfm.h | 112 unsigned key_len; member in struct:xfm_ctx_t 119 #define xfm_get_key_len(xfm) ((xfm)->key_len) 152 unsigned key_len; member in struct:cryptoalg_ctx_t 160 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
aes.h | 64 int key_len, 69 int key_len,
|
hmac.h | 59 hmac_alloc(auth_t **a, int key_len, int out_len); 65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
|
null_auth.h | 55 null_auth_alloc(auth_t **a, int key_len, int out_len); 61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
|
/external/srtp/crypto/cipher/ |
null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len;
|
/external/srtp/crypto/include/ |
aes_icm.h | 52 int key_len,
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
hmac.h | 59 hmac_alloc(auth_t **a, int key_len, int out_len); 65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
|
null_auth.h | 55 null_auth_alloc(auth_t **a, int key_len, int out_len); 61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/chromium_org/net/data/cache_tests/bad_entry/ |
contents.txt | 20 key_len: 13 41 key_len: 14
|
/external/chromium_org/net/data/cache_tests/bad_rankings/ |
contents.txt | 20 key_len: 13 41 key_len: 14
|
/external/chromium_org/net/data/cache_tests/bad_rankings2/ |
contents.txt | 20 key_len: 13 41 key_len: 14
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
messagedigest.cc | 125 const void* key, size_t key_len, 137 if (key_len > block_len) { 138 ComputeDigest(digest, key, key_len, new_key.get(), block_len); 141 memcpy(new_key.get(), key, key_len); 142 memset(new_key.get() + key_len, 0, block_len - key_len); 161 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len, 168 return ComputeHmac(digest.get(), key, key_len,
|