/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 118 int alg_nid, keylen; local 172 keylen = EVP_CIPHER_key_length(cipher); 174 keylen = -1; 180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 223 int prf_nid, int keylen) 257 if(keylen > 0) 261 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/openssl/crypto/cmac/ |
cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2788 u_int keylen, prflen; local [all...] |
ipsec_doi.c | 557 int keylen = 0; local 731 "keylen %d: not multiple of 8\n", 736 keylen++; 860 if (keylen) { 867 "keylen must not be specified " [all...] |
/external/openssl/crypto/cms/ |
cms_pwri.c | 335 size_t keylen; local 406 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) 409 key = OPENSSL_malloc(keylen); 414 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) 417 pwri->encryptedKey->length = keylen; 429 if (!kek_unwrap_key(key, &keylen, 439 ec->keylen = keylen; [all...] |
cms_lcl.h | 177 size_t keylen; member in struct:CMS_EncryptedContentInfo_st 262 size_t keylen; member in struct:CMS_KEKRecipientInfo_st 457 const unsigned char *key, size_t keylen);
|
/external/openssl/crypto/hmac/ |
hm_pmeth.c | 227 long keylen; local 228 key = string_to_hex(value, &keylen); 231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
linux_netlink.c | 182 size_t keylen = strlen(key); local 186 if (0 == strncmp(buffer + offset, key, keylen) && 187 '=' == buffer[offset + keylen]) { 188 return buffer + offset + keylen + 1;
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.h | 61 uint32_t keylen; member in struct:sctp_key 127 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 131 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 132 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 169 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 171 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 178 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
sctp_auth.c | 244 * allocate structure space for a key of length keylen 247 sctp_alloc_key(uint32_t keylen) 251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 257 new_key->keylen = keylen; 277 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 278 if (key->keylen) { 279 for (i = 0; i < key->keylen; i++) 296 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 297 if (key->keylen) { 407 uint32_t keylen; local 1442 uint32_t keylen; local 1982 uint16_t keylen; local 2100 uint32_t keylen; local [all...] |
sctp_pcb.c | 7104 uint32_t keylen; local [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 164 h__dump (out, keylen); 171 int keylen, unsigned char *out) 174 keylen, out); 260 unsigned int keylen = 0; local 270 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 OPENSSL_assert(keylen <= sizeof key); 289 keylen = EVP_CIPHER_CTX_key_length(ctx); 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ [all...] |
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 726 unsigned int saltlen, unsigned int keylen, 749 enctmp = OPENSSL_malloc(keylen + 8); 762 if (keylen < 8) 767 inlen = keylen - 8; 801 ret = b2i_PrivateKey(&p, keylen); 816 unsigned int saltlen, keylen; local 824 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 826 buflen = (int) keylen + saltlen; 839 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 329 int keylen,ivlen; local 338 keylen=EVP_CIPHER_key_length(evp_cipher); 365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 368 OPENSSL_cleanse(key, keylen); 513 int keylen,ivlen;
|
/external/iproute2/ip/ |
ipxfrm.c | 518 int keylen; local 534 keylen = algo->alg_key_len / 8; 535 if (len < keylen) { 541 for (i = 0; i < keylen; i ++)
|
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 142 int keylen; member in struct:__anon7821 160 int keylen; member in struct:__anon7822 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen = BN_num_bits(dh->p) [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 1323 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local [all...] |
/external/openssl/apps/ |
req.c | 1609 long keylen = -1; local [all...] |
/external/chromium_org/third_party/icu/source/common/ |
uloc_tag.c | 622 _ldmlKeyToBCP47(const char* key, int32_t keyLen, 634 if (keyLen < 0) { 635 keyLen = (int32_t)uprv_strlen(key); 638 if (keyLen >= sizeof(keyBuf)) { 644 uprv_memcpy(keyBuf, key, keyLen); 645 keyBuf[keyLen] = 0; 648 for (i = 0; i < keyLen; i++) { 666 if (_isLDMLKey(key, keyLen)) { 667 uprv_memcpy(bcpKeyBuf, key, keyLen); 668 bcpKeyBuf[keyLen] = 0 1284 int32_t keylen; local [all...] |
/external/icu/icu4c/source/common/ |
uloc_tag.c | 622 _ldmlKeyToBCP47(const char* key, int32_t keyLen, 634 if (keyLen < 0) { 635 keyLen = (int32_t)uprv_strlen(key); 638 if (keyLen >= sizeof(keyBuf)) { 644 uprv_memcpy(keyBuf, key, keyLen); 645 keyBuf[keyLen] = 0; 648 for (i = 0; i < keyLen; i++) { 666 if (_isLDMLKey(key, keyLen)) { 667 uprv_memcpy(bcpKeyBuf, key, keyLen); 668 bcpKeyBuf[keyLen] = 0 1284 int32_t keylen; local [all...] |