HomeSort by relevance Sort by last modified time
    Searched defs:key_len (Results 1 - 25 of 119) sorted by null

1 2 3 4 5

  /hardware/intel/common/libva/va/drm/
va_drm_utils.c 34 int key_len; member in struct:driver_name_map
64 if (drm_version->name_len >= m->key_len &&
65 strncmp(drm_version->name, m->key, m->key_len) == 0)
  /external/boringssl/src/crypto/cipher/
internal.h 75 uint8_t key_len; member in struct:evp_aead_st
82 int (*init)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len,
84 int (*init_with_direction)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len,
aead_test.cc 166 const size_t key_len = EVP_AEAD_key_length(aead); local
167 if (key_len > sizeof(key)) {
172 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len,
181 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len,
  /external/curl/tests/unit/
unit1305.c 124 size_t key_len; variable
130 key_len = strlen(data_key);
133 nodep = Curl_hash_add(&hp, data_key, key_len+1, data_node);
  /external/srtp/crypto/include/
cryptoalg.h 106 unsigned key_len; member in struct:cryptoalg_ctx_t
114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
xfm.h 77 unsigned key_len; member in struct:xfm_ctx_t
84 #define xfm_get_key_len(xfm) ((xfm)->key_len)
117 unsigned key_len; member in struct:cryptoalg_ctx_t
125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
auth.h 56 (auth_pointer_t *ap, int key_len, int out_len);
59 (void *state, const uint8_t *key, int key_len);
78 (((a)->type)->init((a)->state, (key), ((a)->key_len)))
138 int key_len; /* length of key in octets */ member in struct:auth_t
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local
18 key_len = siglen_map[algorithm];
20 * 2 * key_len bytes for the n and rr arrays
23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t));
51 uint64_t key_len; local
57 key_len = key->len;
58 key_len *= sizeof(uint32_t);
61 if (RSA1024NUMBYTES != key_len &&
62 RSA2048NUMBYTES != key_len &&
63 RSA4096NUMBYTES != key_len &
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf_test.cc 36 const EVP_MD *digest, size_t key_len,
40 if (key_len > sizeof(key)) {
47 key_len, key)) {
53 if (memcmp(key, expected_key, key_len) != 0) {
56 PrintDataHex(expected_key, key_len);
58 PrintDataHex(key, key_len);
165 const size_t key_len = sizeof(key); local
169 1 /* iterations */, digest, key_len, key)) {
180 0 /* iterations */, digest, key_len, key)) {
p_rsa.c 169 const size_t key_len = EVP_PKEY_size(ctx->pkey); local
172 *siglen = key_len;
176 if (*siglen < key_len) {
206 !RSA_sign_raw(rsa, siglen, sig, *siglen, rctx->tbuf, key_len,
226 const size_t key_len = EVP_PKEY_size(ctx->pkey); local
235 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen,
249 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen,
263 const size_t key_len = EVP_PKEY_size(ctx->pkey); local
266 *outlen = key_len;
270 if (*outlen < key_len) {
295 const size_t key_len = EVP_PKEY_size(ctx->pkey); local
    [all...]
  /external/curl/lib/
hash.h 62 size_t key_len; member in struct:curl_hash_element
77 void *Curl_hash_add(struct curl_hash *h, void *key, size_t key_len, void *p);
78 int Curl_hash_delete(struct curl_hash *h, void *key, size_t key_len);
79 void *Curl_hash_pick(struct curl_hash *, void * key, size_t key_len);
  /external/srtp/test/
dtls_srtp_driver.c 127 unsigned int key_len, salt_len; local
173 key_len = srtp_profile_get_master_key_length(profile);
175 memset(key, 0xff, key_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/wpa_supplicant_8/src/crypto/
crypto_internal.c 35 size_t key_len; member in struct:crypto_hash
40 size_t key_len)
76 if (key_len > sizeof(k_pad)) {
78 MD5Update(&ctx->u.md5, key, key_len);
81 key_len = 16;
83 os_memcpy(ctx->key, key, key_len);
84 ctx->key_len = key_len;
86 os_memcpy(k_pad, key, key_len);
87 if (key_len < sizeof(k_pad)
    [all...]
  /external/boringssl/src/crypto/modes/
gcm_test.c 302 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local
310 if (!decode_hex(&key, &key_len, test->key, test_num, "key") ||
328 if (key_len != 16 && key_len != 24 && key_len != 32) {
342 if (AES_set_encrypt_key(key, key_len*8, &aes_key)) {
  /external/libchrome/crypto/
hmac_unittest.cc 92 const int key_len; member in struct:__anon15325
151 cases[i].key_len));
  /external/vboot_reference/tests/
rsa_utility_tests.c 87 uint32_t key_len = RSA1024NUMBYTES << i; local
89 *buf_key_len = key_len / sizeof(uint32_t);
92 buf[8 + key_len - 1] = 101;
93 buf[8 + key_len] = 120;
94 buf[8 + key_len * 2 - 1] = 121;
97 key = RSAPublicKeyFromBuf(buf, 8 + key_len * 2);
103 TEST_EQ(((uint8_t*)key->n)[key_len - 1], 101,
107 TEST_EQ(((uint8_t*)key->rr)[key_len - 1], 121,
112 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 - 1), NULL,
114 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 + 1), NULL
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_vendor_test.c 152 const int key_len = 64; local
157 key = os_malloc(key_len);
161 os_memset(key, 0x11, key_len / 2);
162 os_memset(key + key_len / 2, 0x22, key_len / 2);
163 *len = key_len;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_vendor_test.c 144 const int key_len = 64; local
149 key = os_malloc(key_len);
153 os_memset(key, 0x11, key_len / 2);
154 os_memset(key + key_len / 2, 0x22, key_len / 2);
155 *len = key_len;
  /external/avahi/avahi-compat-libdns_sd/
txt.c 118 size_t key_len; local
121 key_len = strlen(key);
122 assert(key_len <= 0xFF);
133 if (key_len > t->size - i - 1)
136 if (key_len <= *p &&
137 strncmp(key, (char*) p+1, key_len) == 0 &&
138 (key_len == *p || p[1+key_len] == '=')) {
263 size_t key_len; local
265 key_len = strlen(key)
    [all...]
  /external/boringssl/src/crypto/pkcs8/
p5_pbev2.c 334 const size_t key_len = EVP_CIPHER_CTX_key_length(ctx); local
335 assert(key_len <= sizeof(key));
338 ASN1_INTEGER_get(pbkdf2param->keylength) != (int) key_len) {
379 iterations, key_len, key)) {
  /external/dhcpcd-6.8.2/
auth.h 53 size_t key_len; member in struct:token
  /external/ipsec-tools/src/racoon/
admin.h 108 size_t key_len; member in struct:admin_com_psk
  /system/gatekeeper/
gatekeeper.cpp 233 uint32_t key_len = 0; local
234 if (GetAuthTokenKey(&auth_token_key, &key_len)) {
236 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len,
  /external/boringssl/src/ssl/
t1_enc.c 284 size_t key_len, iv_len, mac_secret_len; local
311 key_len = EVP_AEAD_key_length(aead);
316 if (key_len < mac_secret_len + iv_len) {
320 key_len -= mac_secret_len + iv_len;
329 key_data += key_len;
331 key_data += key_len;
356 ssl->s3->tmp.new_cipher, key, key_len, mac_secret, mac_secret_len, iv,
364 ssl->s3->tmp.new_cipher, key, key_len, mac_secret, mac_secret_len, iv,
373 size_t mac_secret_len, fixed_iv_len, variable_iv_len, key_len; local
389 key_len = EVP_AEAD_key_length(aead)
    [all...]
  /external/boringssl/src/tool/
speed.cc 180 const size_t key_len = EVP_AEAD_key_length(aead); local
184 std::unique_ptr<uint8_t[]> key(new uint8_t[key_len]);
185 memset(key.get(), 0, key_len);
198 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, key.get(), key_len,

Completed in 930 milliseconds

1 2 3 4 5