/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
aes_calc.c | 73 int key_len, len; local 110 key_len = len/2; 136 status = aes_expand_encryption_key(key, key_len, &exp_key); 147 printf("key:\t\t%s\n", octet_string_hex_string(key, key_len));
|
/hardware/intel/common/libva/va/drm/ |
va_drm_utils.c | 34 int key_len; member in struct:driver_name_map 64 if (drm_version->name_len >= m->key_len && 65 strncmp(drm_version->name, m->key, m->key_len) == 0)
|
/external/chromium_org/net/quic/crypto/ |
p256_key_exchange_openssl.cc | 61 int key_len = i2d_ECPrivateKey(key.get(), NULL); local 62 if (key_len <= 0) { 66 scoped_ptr<uint8[]> private_key(new uint8[key_len]); 72 return string(reinterpret_cast<char*>(private_key.get()), key_len);
|
aes_128_gcm_12_decrypter_test.cc | 47 size_t key_len; member in struct:__anon13442::TestGroupInfo 297 EXPECT_EQ(test_info.key_len, key.length() * 8);
|
aes_128_gcm_12_encrypter_test.cc | 47 size_t key_len; member in struct:__anon13446::TestGroupInfo 248 EXPECT_EQ(test_info.key_len, key.length() * 8);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 112 unsigned key_len; member in struct:xfm_ctx_t 119 #define xfm_get_key_len(xfm) ((xfm)->key_len) 152 unsigned key_len; member in struct:cryptoalg_ctx_t 160 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 58 (auth_pointer_t *ap, int key_len, int out_len); 61 (void *state, const uint8_t *key, int key_len); 80 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 141 int key_len; /* length of key in octets */ member in struct:auth_t
|
cipher.h | 83 (cipher_pointer_t *cp, int key_len); 91 (void *state, const uint8_t *key, int key_len, cipher_direction_t dir); 162 int key_len; member in struct:cipher_t 174 #define cipher_init(c, k, dir) (((c)->type)->init(((c)->state), (k), ((c)->key_len), (dir)))
|
/external/chromium_org/third_party/openssl/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/openssl/crypto/hmac/ |
hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
/external/chromium_org/third_party/libsrtp/srtp/test/ |
dtls_srtp_driver.c | 134 unsigned int key_len, salt_len; local 180 key_len = srtp_profile_get_master_key_length(profile); 182 memset(key, 0xff, key_len); 184 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeof(k_pad) [all...] |
/libcore/luni/src/test/native/ |
test_openssl_engine.cpp | 48 const size_t key_len = strlen(key_id); local 49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) { 51 key_len);
|
/external/chromium_org/crypto/ |
hmac_unittest.cc | 89 const int key_len; member in struct:__anon12197 148 cases[i].key_len));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 151 const int key_len = 64; local 156 key = os_malloc(key_len); 160 os_memset(key, 0x11, key_len / 2); 161 os_memset(key + key_len / 2, 0x22, key_len / 2); 162 *len = key_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/external/chromium_org/chrome/browser/chromeos/power/ |
peripheral_battery_observer.cc | 58 int key_len = path.size() - header_size - end_size; local 59 if (key_len <= 0) 61 std::string reverse_address = path.substr(header_size, key_len);
|
/external/ipsec-tools/src/racoon/ |
admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/bootable/recovery/ |
verifier.cpp | 408 int key_len; local 412 if (fscanf(f, " %i , { %u", &key_len, &byte) != 2) goto exit; 413 if (key_len != P256_NBYTES) { 414 LOGE("Key length (%d) does not match expected size %d\n", key_len, P256_NBYTES);
|
/external/chromium_org/net/disk_cache/blockfile/ |
disk_format.h | 109 int32 key_len; member in struct:disk_cache::EntryStore
|