HomeSort by relevance Sort by last modified time
    Searched refs:keylen (Results 1 - 25 of 159) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_auth.c 259 * allocate structure space for a key of length keylen
262 sctp_alloc_key(uint32_t keylen)
266 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen,
272 new_key->keylen = keylen;
292 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
293 if (key->keylen) {
294 for (i = 0; i < key->keylen; i++)
311 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
312 if (key->keylen) {
422 uint32_t keylen; local
1457 uint32_t keylen; local
1997 uint16_t keylen; local
2115 uint32_t keylen; local
    [all...]
sctp_auth.h 61 uint32_t keylen; member in struct:sctp_key
128 extern sctp_key_t *sctp_alloc_key(uint32_t keylen);
132 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen);
133 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen);
170 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
172 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
179 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
  /external/openssl/crypto/cms/
cms_enc.c 160 ec->keylen = tkeylen;
169 if (ec->keylen != tkeylen)
172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0)
186 OPENSSL_cleanse(ec->key, ec->keylen);
189 ec->keylen = tkeylen;
224 OPENSSL_cleanse(ec->key, ec->keylen);
241 const unsigned char *key, size_t keylen)
246 ec->key = OPENSSL_malloc(keylen);
249 memcpy(ec->key, key, keylen);
251 ec->keylen = keylen
    [all...]
cms_env.c 336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
425 OPENSSL_cleanse(ec->key, ec->keylen);
430 ec->keylen = eklen;
482 unsigned char *key, size_t keylen,
497 switch (keylen)
530 if (keylen != exp_keylen)
567 kekri->keylen = keylen;
631 unsigned char *key, size_t keylen)
    [all...]
cms_pwri.c 334 size_t keylen; local
405 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx))
408 key = OPENSSL_malloc(keylen);
413 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx))
416 pwri->encryptedKey->length = keylen;
428 if (!kek_unwrap_key(key, &keylen,
438 ec->keylen = keylen;
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 83 int keylen, unsigned char *out)
96 tkeylen = keylen;
142 h__dump (out, keylen);
149 int keylen, unsigned char *out)
152 keylen, out);
238 unsigned int keylen = 0; local
248 keylen = EVP_CIPHER_CTX_key_length(ctx);
249 OPENSSL_assert(keylen <= sizeof key);
267 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
    [all...]
e_aes.c 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
417 static const EVP_CIPHER aesni_##keylen##_##mode = { \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
425 static const EVP_CIPHER aes_##keylen##_##mode = { \
426 nid##_##keylen##_##nmode,blocksize, \
427 keylen/8,ivlen, \
434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \
435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode;
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 83 int keylen, unsigned char *out)
96 tkeylen = keylen;
164 h__dump (out, keylen);
171 int keylen, unsigned char *out)
174 keylen, out);
260 unsigned int keylen = 0; local
270 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 OPENSSL_assert(keylen <= sizeof key);
289 keylen = EVP_CIPHER_CTX_key_length(ctx);
293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
    [all...]
e_aes.c 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
417 static const EVP_CIPHER aesni_##keylen##_##mode = { \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
425 static const EVP_CIPHER aes_##keylen##_##mode = { \
426 nid##_##keylen##_##nmode,blocksize, \
427 keylen/8,ivlen, \
434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \
435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode;
    [all...]
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 59 int keylen; local
101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
102 if (keylen > 63) keylen = 63;
103 memcpy(t->key, p + 2, keylen);
  /external/chromium_org/third_party/smhasher/src/
KeysetTest.cpp 230 for(int keylen = 2; keylen <= maxlen; keylen++)
231 for(int byteA = 0; byteA < keylen; byteA++)
237 c(key,keylen);
246 for(int keylen = 2; keylen <= maxlen; keylen++)
247 for(int byteA = 0; byteA < keylen-1; byteA++)
248 for(int byteB = byteA+1; byteB < keylen; byteB++
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/cmac/
cmac.h 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
cmac.h 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
  /external/openssl/crypto/cmac/
cmac.h 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
cm_pmeth.c 180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
  /external/openssl/include/openssl/
cmac.h 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
  /external/e2fsprogs/lib/ext2fs/
tdbtool.c 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen)
210 if ((keyname == NULL) || (keylen == 0)) {
216 key.dsize = keylen;
225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen)
229 if ((keyname == NULL) || (keylen == 0)) {
240 key.dsize = keylen;
252 static void show_tdb(char *keyname, size_t keylen)
256 if ((keyname == NULL) || (keylen == 0)) {
262 key.dsize = keylen;
277 static void delete_tdb(char *keyname, size_t keylen)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
rc4.c 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
31 if (kpos >= keylen)
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
p5_pbev2.c 94 int alg_nid, keylen;
150 keylen = EVP_CIPHER_key_length(cipher);
152 keylen = -1;
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
201 int prf_nid, int keylen)
235 if(keylen > 0)
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
  /external/openssl/crypto/asn1/
p5_pbev2.c 94 int alg_nid, keylen;
150 keylen = EVP_CIPHER_key_length(cipher);
152 keylen = -1;
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
201 int prf_nid, int keylen)
235 if(keylen > 0)
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 279 size_t keylen; local
287 keylen = EAP_MSK_LEN;
288 res = eapol_sm_get_key(sm, key, keylen);
295 if (keylen > *len)
296 keylen = *len;
297 os_memcpy(msk, key, keylen);
298 *len = keylen;
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
  /external/chromium_org/third_party/leveldatabase/src/include/leveldb/
c.h 82 const char* key, size_t keylen,
89 const char* key, size_t keylen,
103 const char* key, size_t keylen,

Completed in 1424 milliseconds

1 2 3 4 5 6 7