HomeSort by relevance Sort by last modified time
    Searched full:key_len (Results 76 - 100 of 327) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/crypto/
aes-ccm.c 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
159 aes = aes_encrypt_init(key, key_len);
178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
190 aes = aes_encrypt_init(key, key_len);
crypto_cryptoapi.c 353 size_t key_len)
384 key_blob.len = key_len;
385 if (key_len > sizeof(key_blob.key))
387 os_memcpy(key_blob.key, key, key_len);
509 size_t key_len)
522 key_blob.len = key_len;
523 if (key_len > sizeof(key_blob.key))
525 os_memcpy(key_blob.key, key, key_len);
529 if (key_len == 32)
531 else if (key_len == 24
    [all...]
crypto_libtomcrypt.c 154 size_t key_len)
174 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) !=
179 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) !=
299 size_t key_len)
331 if (key_len > sizeof(ctx->u.rc4.key)) {
335 ctx->u.rc4.keylen = key_len;
336 os_memcpy(ctx->u.rc4.key, key, key_len);
338 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
  /external/srtp/crypto/cipher/
aes_icm.c 93 aes_icm_alloc_ismacryp(cipher_t **c, int key_len, int forIsmacryp) {
99 "allocating cipher with key length %d", key_len);
103 * salt so this function is called with key_len = 24.
104 * The check for key_len = 30 does not apply. Our usage
105 * of aes functions with key_len = values other than 30
109 if (!forIsmacryp && key_len != 30)
127 (*c)->key_len = key_len;
132 err_status_t aes_icm_alloc(cipher_t **c, int key_len, int forIsmacryp) {
133 return aes_icm_alloc_ismacryp(c, key_len, 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data,
228 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res);
230 return hmac_sha256_vector(key, key_len, num_elem, addr, len,
236 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data,
256 ret = hmac_sha1_vector(key, key_len, 2, &addr[1],
259 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen,
277 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
297 ret = hmac_sha256_vector(key, key_len, 2, &addr[1],
300 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen,
318 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len,
338 size_t key_len = 16; \/* Only AES-128-CBC is used here *\/ local
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/session/media/
externalhmac.h 67 err_status_t external_hmac_alloc(auth_t** a, int key_len, int out_len);
73 int key_len);
  /external/chromium_org/third_party/libsrtp/srtp/crypto/include/
cryptoalg.h 106 unsigned key_len; member in struct:cryptoalg_ctx_t
114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
null_cipher.h 65 null_cipher_init(null_cipher_ctx_t *c, const uint8_t *key, int key_len);
  /external/chromium_org/third_party/libxslt/libexslt/
crypto.c 594 int key_len = 0, key_size = 0; local
616 key_len = xmlUTF8Strlen (key);
618 if (key_len == 0) {
635 key_size = xmlUTF8Strsize (key, key_len);
692 int key_len = 0, key_size = 0; local
714 key_len = xmlUTF8Strlen (key);
716 if (key_len == 0) {
732 key_size = xmlUTF8Strsize (key, key_len);
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p_enc.c 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len,
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
  /external/lldb/source/Interpreter/
OptionValueProperties.cpp 140 size_t key_len = ::strcspn (name, ".[{"); local
142 if (name[key_len])
144 key.SetCStringWithLength (name, key_len);
145 sub_name = name + key_len;
666 size_t key_len = ::strcspn (name, ".[{"); local
668 if (name[key_len])
670 key.SetCStringWithLength (name, key_len);
671 sub_name = name + key_len;
  /external/openssl/crypto/evp/
p_enc.c 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len,
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
  /external/srtp/crypto/include/
cryptoalg.h 106 unsigned key_len; member in struct:cryptoalg_ctx_t
114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
  /external/chromium_org/third_party/libsrtp/srtp/
TODO 26 Eliminate key_len from auth_init()
  /external/chromium_org/third_party/libsrtp/srtp/test/
dtls_srtp_driver.c 134 unsigned int key_len, salt_len; local
180 key_len = srtp_profile_get_master_key_length(profile);
182 memset(key, 0xff, key_len);
184 append_salt_to_key(key, key_len, salt, salt_len);
  /external/srtp/
TODO 26 Eliminate key_len from auth_init()
  /external/wpa_supplicant_8/src/drivers/
driver_wext.h 58 const u8 *key, size_t key_len);
  /external/chromium_org/third_party/libjingle/source/talk/base/
messagedigest.h 98 // implementation and |key_len| bytes of |key| to key the HMAC, and outputs
102 size_t ComputeHmac(MessageDigest* digest, const void* key, size_t key_len,
108 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
  /external/chromium_org/third_party/openssl/openssl/crypto/hmac/
hmactest.c 85 int key_len; member in struct:test_st
139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
146 test[i].key, test[i].key_len,
  /external/chromium_org/third_party/webrtc/base/
messagedigest.h 81 // implementation and |key_len| bytes of |key| to key the HMAC, and outputs
85 size_t ComputeHmac(MessageDigest* digest, const void* key, size_t key_len,
91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
  /external/openssl/crypto/hmac/
hmactest.c 85 int key_len; member in struct:test_st
139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
146 test[i].key, test[i].key_len,
  /external/chromium_org/net/disk_cache/blockfile/
entry_impl.cc 421 entry_store->key_len = static_cast<int32>(key.size());
422 if (entry_store->key_len > kMaxInternalKeyLength) {
424 if (!CreateBlock(entry_store->key_len + 1, &address))
455 static_cast<size_t>(entry_.Data()->key_len) != key.size())
506 backend_->ModifyStorageSize(entry_.Data()->key_len, 0);
577 if (!stored->rankings_node || stored->key_len <= 0)
598 if ((stored->key_len <= kMaxInternalKeyLength && key_addr.is_initialized()) ||
599 (stored->key_len > kMaxInternalKeyLength && !key_addr.is_initialized()))
606 ((stored->key_len < kMaxBlockSize && key_addr.is_separate_file()) ||
607 (stored->key_len >= kMaxBlockSize && key_addr.is_block_file()))
764 int key_len = entry->Data()->key_len; local
    [all...]
entry_impl_v3.cc 276 entry_store->key_len = static_cast<int32>(key.size());
277 if (entry_store->key_len > kMaxInternalKeyLength) {
279 if (!CreateBlock(entry_store->key_len + 1, &address))
314 static_cast<size_t>(entry_.Data()->key_len) != key.size())
339 if (!stored->rankings_node || stored->key_len <= 0)
360 if ((stored->key_len <= kMaxInternalKeyLength && key_addr.is_initialized()) ||
361 (stored->key_len > kMaxInternalKeyLength && !key_addr.is_initialized()))
368 ((stored->key_len < kMaxBlockSize && key_addr.is_separate_file()) ||
369 (stored->key_len >= kMaxBlockSize && key_addr.is_block_file())))
372 int num_blocks = NumBlocksForEntry(stored->key_len);
477 int key_len = entry->Data()->key_len; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/patches/
tls1_change_cipher_state_rewrite.patch 58 + const unsigned char *key, unsigned key_len,
107 - c->nid,c->block_size,c->key_len,c->iv_len);
298 + key /* secret */, key_len /* secret length */,
342 - printf("\tkey= "); for (i=0; i<c->key_len; i++) printf("%02x", key[i]);
429 + unsigned key_len, iv_len, mac_secret_len;
486 + key_len = EVP_CIPHER_key_length(cipher);
487 + if (is_export && key_len > SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher))
488 + key_len = SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher);
498 + client_write_key = key_data; key_data += key_len;
499 + server_write_key = key_data; key_data += key_len;
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
t1_enc.c 339 const unsigned char *key, unsigned key_len,
358 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len,
390 const unsigned char *key, unsigned key_len,
471 key /* secret */, key_len /* secret length */,
560 unsigned key_len, iv_len, mac_secret_len; local
619 key_len = EVP_AEAD_key_length(aead);
624 key_len = EVP_CIPHER_key_length(cipher);
625 if (is_export && key_len > SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher))
626 key_len = SSL_C_EXPORT_KEYLENGTH(s->s3->tmp.new_cipher);
637 client_write_key = key_data; key_data += key_len;
692 unsigned key_len, iv_len; local
    [all...]

Completed in 2501 milliseconds

1 2 34 5 6 7 8 91011>>