/hardware/intel/common/libva/va/drm/ |
va_drm_utils.c | 34 int key_len; member in struct:driver_name_map 64 if (drm_version->name_len >= m->key_len && 65 strncmp(drm_version->name, m->key, m->key_len) == 0)
|
/external/boringssl/src/crypto/cipher/ |
internal.h | 75 uint8_t key_len; member in struct:evp_aead_st 82 int (*init)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len, 84 int (*init_with_direction)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len,
|
aead_test.cc | 166 const size_t key_len = EVP_AEAD_key_length(aead); local 167 if (key_len > sizeof(key)) { 172 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len, 181 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len,
|
/external/curl/tests/unit/ |
unit1305.c | 124 size_t key_len; variable 130 key_len = strlen(data_key); 133 nodep = Curl_hash_add(&hp, data_key, key_len+1, data_node);
|
/external/srtp/crypto/include/ |
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local 18 key_len = siglen_map[algorithm]; 20 * 2 * key_len bytes for the n and rr arrays 23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t)); 51 uint64_t key_len; local 57 key_len = key->len; 58 key_len *= sizeof(uint32_t); 61 if (RSA1024NUMBYTES != key_len && 62 RSA2048NUMBYTES != key_len && 63 RSA4096NUMBYTES != key_len & [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 36 const EVP_MD *digest, size_t key_len, 40 if (key_len > sizeof(key)) { 47 key_len, key)) { 53 if (memcmp(key, expected_key, key_len) != 0) { 56 PrintDataHex(expected_key, key_len); 58 PrintDataHex(key, key_len); 165 const size_t key_len = sizeof(key); local 169 1 /* iterations */, digest, key_len, key)) { 180 0 /* iterations */, digest, key_len, key)) {
|
p_rsa.c | 169 const size_t key_len = EVP_PKEY_size(ctx->pkey); local 172 *siglen = key_len; 176 if (*siglen < key_len) { 206 !RSA_sign_raw(rsa, siglen, sig, *siglen, rctx->tbuf, key_len, 226 const size_t key_len = EVP_PKEY_size(ctx->pkey); local 235 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, 249 !RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, siglen, 263 const size_t key_len = EVP_PKEY_size(ctx->pkey); local 266 *outlen = key_len; 270 if (*outlen < key_len) { 295 const size_t key_len = EVP_PKEY_size(ctx->pkey); local [all...] |
/external/curl/lib/ |
hash.h | 62 size_t key_len; member in struct:curl_hash_element 77 void *Curl_hash_add(struct curl_hash *h, void *key, size_t key_len, void *p); 78 int Curl_hash_delete(struct curl_hash *h, void *key, size_t key_len); 79 void *Curl_hash_pick(struct curl_hash *, void * key, size_t key_len);
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 35 size_t key_len; member in struct:crypto_hash 40 size_t key_len) 76 if (key_len > sizeof(k_pad)) { 78 MD5Update(&ctx->u.md5, key, key_len); 81 key_len = 16; 83 os_memcpy(ctx->key, key, key_len); 84 ctx->key_len = key_len; 86 os_memcpy(k_pad, key, key_len); 87 if (key_len < sizeof(k_pad) [all...] |
/external/boringssl/src/crypto/modes/ |
gcm_test.c | 302 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 310 if (!decode_hex(&key, &key_len, test->key, test_num, "key") || 328 if (key_len != 16 && key_len != 24 && key_len != 32) { 342 if (AES_set_encrypt_key(key, key_len*8, &aes_key)) {
|
/external/libchrome/crypto/ |
hmac_unittest.cc | 92 const int key_len; member in struct:__anon15325 151 cases[i].key_len));
|
/external/vboot_reference/tests/ |
rsa_utility_tests.c | 87 uint32_t key_len = RSA1024NUMBYTES << i; local 89 *buf_key_len = key_len / sizeof(uint32_t); 92 buf[8 + key_len - 1] = 101; 93 buf[8 + key_len] = 120; 94 buf[8 + key_len * 2 - 1] = 121; 97 key = RSAPublicKeyFromBuf(buf, 8 + key_len * 2); 103 TEST_EQ(((uint8_t*)key->n)[key_len - 1], 101, 107 TEST_EQ(((uint8_t*)key->rr)[key_len - 1], 121, 112 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 - 1), NULL, 114 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 + 1), NULL [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 152 const int key_len = 64; local 157 key = os_malloc(key_len); 161 os_memset(key, 0x11, key_len / 2); 162 os_memset(key + key_len / 2, 0x22, key_len / 2); 163 *len = key_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/external/avahi/avahi-compat-libdns_sd/ |
txt.c | 118 size_t key_len; local 121 key_len = strlen(key); 122 assert(key_len <= 0xFF); 133 if (key_len > t->size - i - 1) 136 if (key_len <= *p && 137 strncmp(key, (char*) p+1, key_len) == 0 && 138 (key_len == *p || p[1+key_len] == '=')) { 263 size_t key_len; local 265 key_len = strlen(key) [all...] |
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 334 const size_t key_len = EVP_CIPHER_CTX_key_length(ctx); local 335 assert(key_len <= sizeof(key)); 338 ASN1_INTEGER_get(pbkdf2param->keylength) != (int) key_len) { 379 iterations, key_len, key)) {
|
/external/dhcpcd-6.8.2/ |
auth.h | 53 size_t key_len; member in struct:token
|
/external/ipsec-tools/src/racoon/ |
admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/system/gatekeeper/ |
gatekeeper.cpp | 233 uint32_t key_len = 0; local 234 if (GetAuthTokenKey(&auth_token_key, &key_len)) { 236 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len,
|
/external/boringssl/src/ssl/ |
t1_enc.c | 284 size_t key_len, iv_len, mac_secret_len; local 311 key_len = EVP_AEAD_key_length(aead); 316 if (key_len < mac_secret_len + iv_len) { 320 key_len -= mac_secret_len + iv_len; 329 key_data += key_len; 331 key_data += key_len; 356 ssl->s3->tmp.new_cipher, key, key_len, mac_secret, mac_secret_len, iv, 364 ssl->s3->tmp.new_cipher, key, key_len, mac_secret, mac_secret_len, iv, 373 size_t mac_secret_len, fixed_iv_len, variable_iv_len, key_len; local 389 key_len = EVP_AEAD_key_length(aead) [all...] |
/external/boringssl/src/tool/ |
speed.cc | 180 const size_t key_len = EVP_AEAD_key_length(aead); local 184 std::unique_ptr<uint8_t[]> key(new uint8_t[key_len]); 185 memset(key.get(), 0, key_len); 198 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, key.get(), key_len,
|