/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.c | 259 * allocate structure space for a key of length keylen 262 sctp_alloc_key(uint32_t keylen) 266 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 272 new_key->keylen = keylen; 292 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 293 if (key->keylen) { 294 for (i = 0; i < key->keylen; i++) 311 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 312 if (key->keylen) { 422 uint32_t keylen; local 1457 uint32_t keylen; local 1997 uint16_t keylen; local 2115 uint32_t keylen; local [all...] |
sctp_auth.h | 61 uint32_t keylen; member in struct:sctp_key 128 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 132 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 133 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 170 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 172 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 179 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
/external/openssl/crypto/cms/ |
cms_enc.c | 160 ec->keylen = tkeylen; 169 if (ec->keylen != tkeylen) 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 186 OPENSSL_cleanse(ec->key, ec->keylen); 189 ec->keylen = tkeylen; 224 OPENSSL_cleanse(ec->key, ec->keylen); 241 const unsigned char *key, size_t keylen) 246 ec->key = OPENSSL_malloc(keylen); 249 memcpy(ec->key, key, keylen); 251 ec->keylen = keylen [all...] |
cms_env.c | 336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) 348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 425 OPENSSL_cleanse(ec->key, ec->keylen); 430 ec->keylen = eklen; 482 unsigned char *key, size_t keylen, 497 switch (keylen) 530 if (keylen != exp_keylen) 567 kekri->keylen = keylen; 631 unsigned char *key, size_t keylen) [all...] |
cms_pwri.c | 334 size_t keylen; local 405 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) 408 key = OPENSSL_malloc(keylen); 413 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) 416 pwri->encryptedKey->length = keylen; 428 if (!kek_unwrap_key(key, &keylen, 438 ec->keylen = keylen; [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
e_aes.c | 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 417 static const EVP_CIPHER aesni_##keylen##_##mode = { \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 425 static const EVP_CIPHER aes_##keylen##_##mode = { \ 426 nid##_##keylen##_##nmode,blocksize, \ 427 keylen/8,ivlen, \ 434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ 435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 164 h__dump (out, keylen); 171 int keylen, unsigned char *out) 174 keylen, out); 260 unsigned int keylen = 0; local 270 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 OPENSSL_assert(keylen <= sizeof key); 289 keylen = EVP_CIPHER_CTX_key_length(ctx); 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
e_aes.c | 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 417 static const EVP_CIPHER aesni_##keylen##_##mode = { \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 425 static const EVP_CIPHER aes_##keylen##_##mode = { \ 426 nid##_##keylen##_##nmode,blocksize, \ 427 keylen/8,ivlen, \ 434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ 435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; [all...] |
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/external/chromium_org/third_party/smhasher/src/ |
KeysetTest.cpp | 230 for(int keylen = 2; keylen <= maxlen; keylen++) 231 for(int byteA = 0; byteA < keylen; byteA++) 237 c(key,keylen); 246 for(int keylen = 2; keylen <= maxlen; keylen++) 247 for(int byteA = 0; byteA < keylen-1; byteA++) 248 for(int byteB = byteA+1; byteB < keylen; byteB++ [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/cmac/ |
cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
/external/openssl/crypto/cmac/ |
cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/openssl/include/openssl/ |
cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
/external/e2fsprogs/lib/ext2fs/ |
tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 210 if ((keyname == NULL) || (keylen == 0)) { 216 key.dsize = keylen; 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 229 if ((keyname == NULL) || (keylen == 0)) { 240 key.dsize = keylen; 252 static void show_tdb(char *keyname, size_t keylen) 256 if ((keyname == NULL) || (keylen == 0)) { 262 key.dsize = keylen; 277 static void delete_tdb(char *keyname, size_t keylen) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 31 if (kpos >= keylen)
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
p5_pbev2.c | 94 int alg_nid, keylen; 150 keylen = EVP_CIPHER_key_length(cipher); 152 keylen = -1; 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 201 int prf_nid, int keylen) 235 if(keylen > 0) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 94 int alg_nid, keylen; 150 keylen = EVP_CIPHER_key_length(cipher); 152 keylen = -1; 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 201 int prf_nid, int keylen) 235 if(keylen > 0) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 279 size_t keylen; local 287 keylen = EAP_MSK_LEN; 288 res = eapol_sm_get_key(sm, key, keylen); 295 if (keylen > *len) 296 keylen = *len; 297 os_memcpy(msk, key, keylen); 298 *len = keylen;
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
/external/chromium_org/third_party/leveldatabase/src/include/leveldb/ |
c.h | 82 const char* key, size_t keylen, 89 const char* key, size_t keylen, 103 const char* key, size_t keylen,
|