HomeSort by relevance Sort by last modified time
    Searched full:key_len (Results 26 - 50 of 327) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 45 size_t key_len)
57 if (key_len > sizeof(ctx->u.rc4.key)) {
61 ctx->u.rc4.keylen = key_len;
62 os_memcpy(ctx->u.rc4.key, key, key_len);
65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len);
70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len);
79 if (key_len != 24) {
87 if (key_len != 8) {
  /external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/
null_cipher.c 56 null_cipher_alloc(cipher_t **c, int key_len) {
61 "allocating cipher with key length %d", key_len);
74 (*c)->key_len = key_len;
102 null_cipher_init(null_cipher_ctx_t *ctx, const uint8_t *key, int key_len) {
  /external/chromium_org/third_party/libsrtp/srtp/crypto/hash/
null_auth.c 56 null_auth_alloc(auth_t **a, int key_len, int out_len) {
60 debug_print(mod_auth, "allocating auth func with key length %d", key_len);
74 (*a)->key_len = key_len;
100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
  /external/srtp/crypto/hash/
null_auth.c 56 null_auth_alloc(auth_t **a, int key_len, int out_len) {
60 debug_print(mod_auth, "allocating auth func with key length %d", key_len);
74 (*a)->key_len = key_len;
100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
63 if (key_len != 20)
65 hmac_sha1(key, key_len, data, data_len, tmphash);
69 if (key_len != 16)
71 hmac_md5(key, key_len, data, data_len, tmphash);
95 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash);
104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
114 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
144 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1]
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 141 uint32_t key_len = 0; local
174 key_len += sizeof(metadata);
176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len);
177 key_len += metadata.lenpubmod;
189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len);
190 key_len += metadata.lenpubexp;
196 metadata.rsacrtpriv.lenp = BN_bn2bin(rsa->p, kbuf + key_len);
197 key_len += metadata.rsacrtpriv.lenp;
198 metadata.rsacrtpriv.lenq = BN_bn2bin(rsa->q, kbuf + key_len);
199 key_len += metadata.rsacrtpriv.lenq
    [all...]
  /external/chromium_org/crypto/
hmac_win.cc 45 void ComputeHMACSHA256(const unsigned char* key, size_t key_len,
52 if (key_len > SHA256_BLOCK_SIZE) {
54 Wrapped_SHA256_Update(&ctx, key, key_len);
58 memcpy(key0, key, key_len);
59 if (key_len < SHA256_BLOCK_SIZE)
60 memset(key0 + key_len, 0, SHA256_BLOCK_SIZE - key_len);
  /external/wpa_supplicant_8/src/drivers/
driver_openbsd.c 73 size_t seq_len, const u8 *key, size_t key_len)
78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
85 memcpy(keyavail.i_key, key, key_len);
  /hardware/intel/common/libva/va/drm/
va_drm_utils.c 34 int key_len; member in struct:driver_name_map
64 if (drm_version->name_len >= m->key_len &&
65 strncmp(drm_version->name, m->key, m->key_len) == 0)
  /libcore/luni/src/test/native/
test_openssl_engine.cpp 48 const size_t key_len = strlen(key_id); local
49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) {
51 key_len);
  /external/chromium_org/net/quic/crypto/
p256_key_exchange_openssl.cc 61 int key_len = i2d_ECPrivateKey(key.get(), NULL); local
62 if (key_len <= 0) {
66 scoped_ptr<uint8[]> private_key(new uint8[key_len]);
72 return string(reinterpret_cast<char*>(private_key.get()), key_len);
  /external/chromium_org/third_party/libsrtp/srtp/crypto/include/
xfm.h 112 unsigned key_len; member in struct:xfm_ctx_t
119 #define xfm_get_key_len(xfm) ((xfm)->key_len)
152 unsigned key_len; member in struct:cryptoalg_ctx_t
160 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
aes.h 64 int key_len,
69 int key_len,
hmac.h 59 hmac_alloc(auth_t **a, int key_len, int out_len);
65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
null_auth.h 55 null_auth_alloc(auth_t **a, int key_len, int out_len);
61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
  /external/srtp/crypto/cipher/
null_cipher.c 56 null_cipher_alloc(cipher_t **c, int key_len) {
61 "allocating cipher with key length %d", key_len);
74 (*c)->key_len = key_len;
  /external/srtp/crypto/include/
aes_icm.h 52 int key_len,
auth.h 56 (auth_pointer_t *ap, int key_len, int out_len);
59 (void *state, const uint8_t *key, int key_len);
78 (((a)->type)->init((a)->state, (key), ((a)->key_len)))
138 int key_len; /* length of key in octets */ member in struct:auth_t
hmac.h 59 hmac_alloc(auth_t **a, int key_len, int out_len);
65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
null_auth.h 55 null_auth_alloc(auth_t **a, int key_len, int out_len);
61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 53 size_t key_len; member in struct:privsep_cmd_set_key
  /external/chromium_org/net/data/cache_tests/bad_entry/
contents.txt 20 key_len: 13
41 key_len: 14
  /external/chromium_org/net/data/cache_tests/bad_rankings/
contents.txt 20 key_len: 13
41 key_len: 14
  /external/chromium_org/net/data/cache_tests/bad_rankings2/
contents.txt 20 key_len: 13
41 key_len: 14
  /external/chromium_org/third_party/libjingle/source/talk/base/
messagedigest.cc 125 const void* key, size_t key_len,
137 if (key_len > block_len) {
138 ComputeDigest(digest, key, key_len, new_key.get(), block_len);
141 memcpy(new_key.get(), key, key_len);
142 memset(new_key.get() + key_len, 0, block_len - key_len);
161 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
168 return ComputeHmac(digest.get(), key, key_len,

Completed in 1105 milliseconds

12 3 4 5 6 7 8 91011>>