/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/external/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 18 size_t keylen; member in struct:__anon17936
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 119 int alg_nid, keylen; local 173 keylen = EVP_CIPHER_key_length(cipher); 175 keylen = -1; 181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 224 int prf_nid, int keylen) 258 if(keylen > 0) 262 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2842 u_int keylen, prflen; local [all...] |
ipsec_doi.c | 557 int keylen = 0; local 731 "keylen %d: not multiple of 8\n", 736 keylen++; 860 if (keylen) { 867 "keylen must not be specified " [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon21446::__anon21447 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon21453::__anon21454 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_openssl.c | 123 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 137 !EVP_CIPHER_CTX_set_key_length(&ctx, keylen) || 181 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) 183 switch (keylen) { 620 int keylen; local 635 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); 636 if (keylen < 0) 638 wpabuf_put(res, keylen);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 317 int keylen; local 330 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 547 size_t gtk_len, keylen, rsc_len; local 571 keylen = wpa_cipher_key_len(sm->group_cipher); 580 if (gtk_len < keylen) { 589 if (gtk_elem[2] != keylen) { 592 gtk_elem[2], (unsigned long) keylen); 596 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 605 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
wpa.c | 592 int keylen, rsclen; local 614 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 625 sm->ptk.tk, keylen) < 0) { 628 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 629 alg, keylen, MAC2STR(sm->bssid)); 648 int keylen, int maxkeylen, 664 if (keylen != klen || maxkeylen < klen) { 667 wpa_cipher_txt(group_cipher), keylen, maxkeylen); 716 "the driver (alg=%d keylen=%d keyidx=%d)", 1130 u16 key_info, keylen; local 2819 u8 keylen; \/* plaintext key len *\/ local [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
UnixCrypt.java | 420 int keylen = key.length(); local 424 keyword = (keyword << 8) | ((i < keylen) ? 2 * key.charAt(i) : 0);
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 257 size_t keylen; local 266 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 273 if (keylen > *len) 274 keylen = *len; 275 os_memcpy(msk, key, keylen); 276 *len = keylen;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 279 size_t keylen; local 287 keylen = EAP_MSK_LEN; 288 res = eapol_sm_get_key(sm, key, keylen); 295 if (keylen > *len) 296 keylen = *len; 297 os_memcpy(msk, key, keylen); 298 *len = keylen;
|
/external/iproute2/ip/ |
ipxfrm.c | 518 int keylen; local 534 keylen = algo->alg_key_len / 8; 535 if (len < keylen) { 541 for (i = 0; i < keylen; i ++)
|
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1111 size_t keylen; local 1123 &keylen); 1125 keys->send = decrypt_ms_key(key, keylen, 1138 &keylen); 1140 keys->recv = decrypt_ms_key(key, keylen, 1160 size_t keylen; local 1171 RADIUS_CISCO_AV_PAIR, &keylen); 1172 if (key && keylen == 51 && 1174 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/icu/icu4c/source/common/ |
uloc_tag.c | 918 int32_t keylen; local 939 keylen = (int32_t)uprv_strlen(key); 940 isBcpUExt = (keylen > 1); 1041 if (!_isExtensionSingleton(key, keylen) || !_isExtensionSubtags(buf, len)) { [all...] |
/external/libvncserver/libvncclient/ |
rfbproto.c | 827 size_t keylen; local 858 keylen = 256*len[0]+len[1]; 859 mod = (uint8_t*)malloc(keylen*4); 865 resp = mod+keylen; 866 pub = resp+keylen; 867 key = pub+keylen; 869 if (!ReadFromRFBServer(client, (char *)mod, keylen)) 871 if (!ReadFromRFBServer(client, (char *)resp, keylen)) 880 error = gcry_mpi_scan(&modmpi, GCRYMPI_FMT_USG, mod, keylen, NULL); 886 error = gcry_mpi_scan(&respmpi, GCRYMPI_FMT_USG, resp, keylen, NULL) [all...] |
/external/openssh/ |
packet.c | 792 ssh_packet_set_encryption_key(struct ssh *ssh, const u_char *key, u_int keylen, int number) 802 if (keylen < 20) 803 fatal("%s: keylen too small: %d", __func__, keylen); 804 if (keylen > SSH_SESSION_KEY_LENGTH) 805 fatal("%s: keylen too big: %d", __func__, keylen); 806 memcpy(state->ssh1_key, key, keylen); 807 state->ssh1_keylen = keylen; 808 if ((r = cipher_init(&state->send_context, cipher, key, keylen, 2483 size_t keylen, ivlen, maclen; local [all...] |
sshconnect2.c | 1583 size_t siglen = 0, keylen = 0; local [all...] |