/external/vboot_reference/tests/ |
gen_test_vbpubks.sh | 14 for keylen in ${key_lengths[@]} 19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
|
run_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
vb2_rsa_tests.sh | 19 for keylen in ${key_lengths[@]} 23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:" 25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
|
gen_test_cases.sh | 20 for keylen in ${key_lengths[@]} 28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \ 29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
|
run_vbutil_tests.sh | 16 local keylen=$2 19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:" 23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \ 43 for keylen in ${key_lengths[@]} 47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
|
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/ |
hmac.h | 59 * @param keylen The length of the key, in bytes 61 void av_hmac_init(AVHMAC *ctx, const uint8_t *key, unsigned int keylen); 86 * @param keylen The length of the key, in bytes 92 const uint8_t *key, unsigned int keylen,
|
/external/curl/lib/ |
hmac.c | 50 unsigned int keylen) 71 if(keylen > hashparams->hmac_maxkeylen) { 73 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); 77 keylen = hashparams->hmac_resultlen; 84 for(i = 0; i < keylen; i++) {
|
curl_hmac.h | 59 unsigned int keylen);
|
curl_ntlm_core.h | 78 CURLcode Curl_hmac_md5(const unsigned char *key, unsigned int keylen,
|
/toolchain/binutils/binutils-2.25/include/vms/ |
lbr.h | 142 unsigned char keylen[2]; member in struct:vms_idd 197 unsigned char keylen; member in struct:vms_idx 198 /* The length of this field is in fact keylen. */ 208 unsigned char keylen[2]; member in struct:vms_elfidx 266 unsigned char keylen[2]; member in struct:vms_kbn
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
dnsextd_parser.y | 483 mDNSs32 keylen; 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } 517 mDNSs32 keylen; 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 525 if (keylen < 0) { free(authInfo); err = 1; goto exit; }
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/external/icu/icu4j/perf-tests/ |
collationperf.pl | 124 Locale Data file strcoll keygen keylen strcoll keygen keylen coll keygen keylen
|
/external/e2fsprogs/lib/ext2fs/ |
tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 210 if ((keyname == NULL) || (keylen == 0)) { 216 key.dsize = keylen; 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 229 if ((keyname == NULL) || (keylen == 0)) { 240 key.dsize = keylen; 252 static void show_tdb(char *keyname, size_t keylen) 256 if ((keyname == NULL) || (keylen == 0)) { 262 key.dsize = keylen; 277 static void delete_tdb(char *keyname, size_t keylen) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 31 if (kpos >= keylen)
|
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon27473::__anon27474 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/pdfium/core/include/fdrm/ |
fx_crypt.h | 19 FX_DWORD keylen); 25 FX_DWORD keylen,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 279 size_t keylen; local 287 keylen = EAP_MSK_LEN; 288 res = eapol_sm_get_key(sm, key, keylen); 295 if (keylen > *len) 296 keylen = *len; 297 os_memcpy(msk, key, keylen); 298 *len = keylen;
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
/external/boringssl/src/crypto/evp/ |
p_ec.c | 152 size_t *keylen) { 168 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; 176 outlen = *keylen; 182 *keylen = ret;
|
/system/bt/stack/smp/ |
aes.h | 84 length_type keylen,
|
/system/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 18 size_t keylen; member in struct:__anon73496
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 121 int alg_nid, keylen; local 175 keylen = EVP_CIPHER_key_length(cipher); 177 keylen = -1; 183 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 226 int prf_nid, int keylen) 260 if(keylen > 0) 264 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
fpdf_parser_encrypt.cpp | 21 int keylen, 47 FX_DWORD copy_len = keylen; 56 FXSYS_memset(key, 0, keylen); 112 int& keylen) { 115 keylen = 0; 140 keylen = nKeyBits / 8; 147 keylen = Version > 1 ? pEncryptDict->GetInteger("Length", 40) / 8 : 5; 149 if (keylen > 32 || keylen < 0) { 200 int& keylen) { [all...] |