HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 33) sorted by null

1 2

  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 59 int keylen; local
101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
102 if (keylen > 63) keylen = 63;
103 memcpy(t->key, p + 2, keylen);
  /external/sepolicy/tools/sepolicy-analyze/
sepolicy-analyze.c 18 size_t keylen; member in struct:__anon17936
  /external/boringssl/src/crypto/pkcs8/
p5_pbev2.c 119 int alg_nid, keylen; local
173 keylen = EVP_CIPHER_key_length(cipher);
175 keylen = -1;
181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
224 int prf_nid, int keylen)
258 if(keylen > 0)
262 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
  /external/antlr/antlr-3.4/runtime/ObjC/Framework/
ACBTree.h 55 NSInteger keylen; /* length of key */ variable
71 @property (assign) NSInteger keylen; variable
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
oakley.c 2842 u_int keylen, prflen; local
    [all...]
ipsec_doi.c 557 int keylen = 0; local
731 "keylen %d: not multiple of 8\n",
736 keylen++;
860 if (keylen) {
867 "keylen must not be specified "
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 23 size_t keylen; member in struct:crypto_cipher::__anon21446::__anon21447
61 ctx->u.rc4.keylen = key_len;
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 291 size_t keylen; member in struct:crypto_cipher::__anon21453::__anon21454
335 ctx->u.rc4.keylen = key_len;
358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_openssl.c 123 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
137 !EVP_CIPHER_CTX_set_key_length(&ctx, keylen) ||
181 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen)
183 switch (keylen) {
620 int keylen; local
635 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh);
636 if (keylen < 0)
638 wpabuf_put(res, keylen);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 317 int keylen; local
330 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) {
547 size_t gtk_len, keylen, rsc_len; local
571 keylen = wpa_cipher_key_len(sm->group_cipher);
580 if (gtk_len < keylen) {
589 if (gtk_elem[2] != keylen) {
592 gtk_elem[2], (unsigned long) keylen);
596 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
605 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
wpa.c 592 int keylen, rsclen; local
614 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
625 sm->ptk.tk, keylen) < 0) {
628 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
629 alg, keylen, MAC2STR(sm->bssid));
648 int keylen, int maxkeylen,
664 if (keylen != klen || maxkeylen < klen) {
667 wpa_cipher_txt(group_cipher), keylen, maxkeylen);
716 "the driver (alg=%d keylen=%d keyidx=%d)",
1130 u16 key_info, keylen; local
2819 u8 keylen; \/* plaintext key len *\/ local
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/util/security/
UnixCrypt.java 420 int keylen = key.length(); local
424 keyword = (keyword << 8) | ((i < keylen) ? 2 * key.charAt(i) : 0);
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 257 size_t keylen; local
266 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
273 if (keylen > *len)
274 keylen = *len;
275 os_memcpy(msk, key, keylen);
276 *len = keylen;
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 279 size_t keylen; local
287 keylen = EAP_MSK_LEN;
288 res = eapol_sm_get_key(sm, key, keylen);
295 if (keylen > *len)
296 keylen = *len;
297 os_memcpy(msk, key, keylen);
298 *len = keylen;
  /external/iproute2/ip/
ipxfrm.c 518 int keylen; local
534 keylen = algo->alg_key_len / 8;
535 if (len < keylen) {
541 for (i = 0; i < keylen; i ++)
  /external/mdnsresponder/mDNSCore/
DNSDigest.c 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius.c 1111 size_t keylen; local
1123 &keylen);
1125 keys->send = decrypt_ms_key(key, keylen,
1138 &keylen);
1140 keys->recv = decrypt_ms_key(key, keylen,
1160 size_t keylen; local
1171 RADIUS_CISCO_AV_PAIR, &keylen);
1172 if (key && keylen == 51 &&
1174 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
    [all...]
  /external/icu/icu4c/source/common/
uloc_tag.c 918 int32_t keylen; local
939 keylen = (int32_t)uprv_strlen(key);
940 isBcpUExt = (keylen > 1);
1041 if (!_isExtensionSingleton(key, keylen) || !_isExtensionSubtags(buf, len)) {
    [all...]
  /external/libvncserver/libvncclient/
rfbproto.c 827 size_t keylen; local
858 keylen = 256*len[0]+len[1];
859 mod = (uint8_t*)malloc(keylen*4);
865 resp = mod+keylen;
866 pub = resp+keylen;
867 key = pub+keylen;
869 if (!ReadFromRFBServer(client, (char *)mod, keylen))
871 if (!ReadFromRFBServer(client, (char *)resp, keylen))
880 error = gcry_mpi_scan(&modmpi, GCRYMPI_FMT_USG, mod, keylen, NULL);
886 error = gcry_mpi_scan(&respmpi, GCRYMPI_FMT_USG, resp, keylen, NULL)
    [all...]
  /external/openssh/
packet.c 792 ssh_packet_set_encryption_key(struct ssh *ssh, const u_char *key, u_int keylen, int number)
802 if (keylen < 20)
803 fatal("%s: keylen too small: %d", __func__, keylen);
804 if (keylen > SSH_SESSION_KEY_LENGTH)
805 fatal("%s: keylen too big: %d", __func__, keylen);
806 memcpy(state->ssh1_key, key, keylen);
807 state->ssh1_keylen = keylen;
808 if ((r = cipher_init(&state->send_context, cipher, key, keylen,
2483 size_t keylen, ivlen, maclen; local
    [all...]
sshconnect2.c 1583 size_t siglen = 0, keylen = 0; local
    [all...]

Completed in 840 milliseconds

1 2