/external/wpa_supplicant_8/src/crypto/ |
aes-ccm.c | 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 159 aes = aes_encrypt_init(key, key_len); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, 190 aes = aes_encrypt_init(key, key_len);
|
crypto_cryptoapi.c | 353 size_t key_len) 384 key_blob.len = key_len; 385 if (key_len > sizeof(key_blob.key)) 387 os_memcpy(key_blob.key, key, key_len); 509 size_t key_len) 522 key_blob.len = key_len; 523 if (key_len > sizeof(key_blob.key)) 525 os_memcpy(key_blob.key, key, key_len); 529 if (key_len == 32) 531 else if (key_len == 24 [all...] |
crypto_libtomcrypt.c | 154 size_t key_len) 174 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != 179 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != 299 size_t key_len) 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 338 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
|
/external/srtp/crypto/cipher/ |
aes_icm.c | 93 aes_icm_alloc_ismacryp(cipher_t **c, int key_len, int forIsmacryp) { 99 "allocating cipher with key length %d", key_len); 103 * salt so this function is called with key_len = 24. 104 * The check for key_len = 30 does not apply. Our usage 105 * of aes functions with key_len = values other than 30 109 if (!forIsmacryp && key_len != 30) 127 (*c)->key_len = key_len; 132 err_status_t aes_icm_alloc(cipher_t **c, int key_len, int forIsmacryp) { 133 return aes_icm_alloc_ismacryp(c, key_len, 0) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, 228 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); 230 return hmac_sha256_vector(key, key_len, num_elem, addr, len, 236 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, 256 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], 259 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, 277 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 297 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], 300 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, 318 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, 338 size_t key_len = 16; \/* Only AES-128-CBC is used here *\/ local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
externalhmac.h | 67 err_status_t external_hmac_alloc(auth_t** a, int key_len, int out_len); 73 int key_len);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
null_cipher.h | 65 null_cipher_init(null_cipher_ctx_t *c, const uint8_t *key, int key_len);
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 594 int key_len = 0, key_size = 0; local 616 key_len = xmlUTF8Strlen (key); 618 if (key_len == 0) { 635 key_size = xmlUTF8Strsize (key, key_len); 692 int key_len = 0, key_size = 0; local 714 key_len = xmlUTF8Strlen (key); 716 if (key_len == 0) { 732 key_size = xmlUTF8Strsize (key, key_len);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/lldb/source/Interpreter/ |
OptionValueProperties.cpp | 140 size_t key_len = ::strcspn (name, ".[{"); local 142 if (name[key_len]) 144 key.SetCStringWithLength (name, key_len); 145 sub_name = name + key_len; 666 size_t key_len = ::strcspn (name, ".[{"); local 668 if (name[key_len]) 670 key.SetCStringWithLength (name, key_len); 671 sub_name = name + key_len;
|
/external/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/chromium_org/third_party/libsrtp/srtp/ |
TODO | 26 Eliminate key_len from auth_init()
|
/external/chromium_org/third_party/libsrtp/srtp/test/ |
dtls_srtp_driver.c | 134 unsigned int key_len, salt_len; local 180 key_len = srtp_profile_get_master_key_length(profile); 182 memset(key, 0xff, key_len); 184 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/srtp/ |
TODO | 26 Eliminate key_len from auth_init()
|
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.h | 58 const u8 *key, size_t key_len);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
messagedigest.h | 98 // implementation and |key_len| bytes of |key| to key the HMAC, and outputs 102 size_t ComputeHmac(MessageDigest* digest, const void* key, size_t key_len, 108 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
|
/external/chromium_org/third_party/openssl/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/chromium_org/third_party/webrtc/base/ |
messagedigest.h | 81 // implementation and |key_len| bytes of |key| to key the HMAC, and outputs 85 size_t ComputeHmac(MessageDigest* digest, const void* key, size_t key_len, 91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
|
/external/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/chromium_org/net/disk_cache/blockfile/ |
entry_impl.cc | 421 entry_store->key_len = static_cast<int32>(key.size()); 422 if (entry_store->key_len > kMaxInternalKeyLength) { 424 if (!CreateBlock(entry_store->key_len + 1, &address)) 455 static_cast<size_t>(entry_.Data()->key_len) != key.size()) 506 backend_->ModifyStorageSize(entry_.Data()->key_len, 0); 577 if (!stored->rankings_node || stored->key_len <= 0) 598 if ((stored->key_len <= kMaxInternalKeyLength && key_addr.is_initialized()) || 599 (stored->key_len > kMaxInternalKeyLength && !key_addr.is_initialized())) 606 ((stored->key_len < kMaxBlockSize && key_addr.is_separate_file()) || 607 (stored->key_len >= kMaxBlockSize && key_addr.is_block_file())) 764 int key_len = entry->Data()->key_len; local [all...] |
entry_impl_v3.cc | 276 entry_store->key_len = static_cast<int32>(key.size()); 277 if (entry_store->key_len > kMaxInternalKeyLength) { 279 if (!CreateBlock(entry_store->key_len + 1, &address)) 314 static_cast<size_t>(entry_.Data()->key_len) != key.size()) 339 if (!stored->rankings_node || stored->key_len <= 0) 360 if ((stored->key_len <= kMaxInternalKeyLength && key_addr.is_initialized()) || 361 (stored->key_len > kMaxInternalKeyLength && !key_addr.is_initialized())) 368 ((stored->key_len < kMaxBlockSize && key_addr.is_separate_file()) || 369 (stored->key_len >= kMaxBlockSize && key_addr.is_block_file()))) 372 int num_blocks = NumBlocksForEntry(stored->key_len); 477 int key_len = entry->Data()->key_len; local [all...] |
/external/chromium_org/third_party/openssl/openssl/patches/ |
tls1_change_cipher_state_rewrite.patch | 58 + const unsigned char *key, unsigned key_len, 107 - c->nid,c->block_size,c->key_len,c->iv_len); 298 + key /* secret */, key_len /* secret length */, 342 - printf("\tkey= "); for (i=0; i<c->key_len; i++) printf("%02x", key[i]); 429 + unsigned key_len, iv_len, mac_secret_len; 486 + key_len = EVP_CIPHER_key_length(cipher); 487 + if (is_export && key_len > SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) 488 + key_len = SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher); 498 + client_write_key = key_data; key_data += key_len; 499 + server_write_key = key_data; key_data += key_len; [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_enc.c | 339 const unsigned char *key, unsigned key_len, 358 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len, 390 const unsigned char *key, unsigned key_len, 471 key /* secret */, key_len /* secret length */, 560 unsigned key_len, iv_len, mac_secret_len; local 619 key_len = EVP_AEAD_key_length(aead); 624 key_len = EVP_CIPHER_key_length(cipher); 625 if (is_export && key_len > SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher)) 626 key_len = SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher); 637 client_write_key = key_data; key_data += key_len; 692 unsigned key_len, iv_len; local [all...] |