/external/ipsec-tools/src/racoon/ |
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
algorithm.c | 490 if (f == NULL || f->keylen == NULL) 493 return (f->keylen)(len); 617 if (f == NULL || f->keylen == NULL) 620 return (f->keylen)(len);
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/toolchain/binutils/binutils-2.25/bfd/ |
vms-lib.c | 248 unsigned int keylen; local 260 keylen = ridx->keylen; 271 keylen = bfd_getl16 (ridx->keylen); 283 p = keyname + keylen; 306 if (keylen != sizeof (struct vms_kbn)) 310 keylen = bfd_getl16 (kbn->keylen); 312 name = bfd_alloc (abfd, keylen + 1) [all...] |
/prebuilts/go/darwin-x86/src/crypto/hmac/ |
hmac_test.go | 222 []byte("Sample message for keylen=blocklen"), 234 []byte("Sample message for keylen<blocklen"), 256 []byte("Sample message for keylen=blocklen"), 273 []byte("Sample message for keylen=blocklen"), 286 []byte("Sample message for keylen<blocklen"), 308 []byte("Sample message for keylen=blocklen"), 325 []byte("Sample message for keylen=blocklen"), 338 []byte("Sample message for keylen<blocklen"), 360 []byte("Sample message for keylen=blocklen"), 385 []byte("Sample message for keylen=blocklen") [all...] |
/prebuilts/go/linux-x86/src/crypto/hmac/ |
hmac_test.go | 222 []byte("Sample message for keylen=blocklen"), 234 []byte("Sample message for keylen<blocklen"), 256 []byte("Sample message for keylen=blocklen"), 273 []byte("Sample message for keylen=blocklen"), 286 []byte("Sample message for keylen<blocklen"), 308 []byte("Sample message for keylen=blocklen"), 325 []byte("Sample message for keylen=blocklen"), 338 []byte("Sample message for keylen<blocklen"), 360 []byte("Sample message for keylen=blocklen"), 385 []byte("Sample message for keylen=blocklen") [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 315 int keylen; local 328 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 545 size_t gtk_len, keylen, rsc_len; local 569 keylen = wpa_cipher_key_len(sm->group_cipher); 578 if (gtk_len < keylen) { 587 if (gtk_elem[2] != keylen) { 590 gtk_elem[2], (unsigned long) keylen); 594 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 603 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
wpa.c | 614 int keylen, rsclen; local 641 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 652 sm->ptk.tk, keylen) < 0) { 655 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 656 alg, keylen, MAC2STR(sm->bssid)); 676 int keylen, int maxkeylen, 692 if (keylen != klen || maxkeylen < klen) { 695 wpa_cipher_txt(group_cipher), keylen, maxkeylen); 744 "the driver (alg=%d keylen=%d keyidx=%d)", 1191 u16 key_info, keylen; local 2912 u8 keylen; \/* plaintext key len *\/ local [all...] |
/external/icu/icu4c/source/test/perf/collationperf/ |
CollPerf.pl | 197 <td>keylen</td> 244 <td align="left"><b>keylen</b> <i>(ICU)</i></td> 247 <td align="left"><b>keylen</b> <i>(GLIBC)</i></td> 250 <td align="left"><b>keylen</b> <i>(GLIBC-ICU)/ICU)</i></td>
|
/external/iw/ |
util.c | 393 int pos = 0, keylen; local 419 keylen = 5; 425 keylen = 13; 434 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata);
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1100 size_t keylen; local 1112 &keylen); 1114 keys->send = decrypt_ms_key(key, keylen, 1127 &keylen); 1129 keys->recv = decrypt_ms_key(key, keylen, 1149 size_t keylen; local 1160 RADIUS_CISCO_AV_PAIR, &keylen); 1161 if (key && keylen == 51 && 1163 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/external/libvncserver/libvncclient/ |
rfbproto.c | 848 size_t keylen; local 879 keylen = 256*len[0]+len[1]; 880 mod = (uint8_t*)malloc(keylen*4); 886 resp = mod+keylen; 887 pub = resp+keylen; 888 key = pub+keylen; 890 if (!ReadFromRFBServer(client, (char *)mod, keylen)) 892 if (!ReadFromRFBServer(client, (char *)resp, keylen)) 901 error = gcry_mpi_scan(&modmpi, GCRYMPI_FMT_USG, mod, keylen, NULL); 907 error = gcry_mpi_scan(&respmpi, GCRYMPI_FMT_USG, resp, keylen, NULL) [all...] |
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 207 * keylen is the unit of bit. 213 ipsec_check_keylen(supported, alg_id, keylen) 216 u_int keylen; 233 return ipsec_check_keylen2(satype, alg_id, keylen); 239 * keylen is the unit of bit. 245 ipsec_check_keylen2(satype, alg_id, keylen) 248 u_int keylen; 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/prebuilts/go/darwin-x86/src/strings/ |
replace.go | 193 func (r *genericReplacer) lookup(s string, ignoreRoot bool) (val string, keylen int, found bool) { 194 // Iterate down the trie to the end, and grab the value and keylen with 203 keylen = n 327 val, keylen, match := r.lookup(s[i:], prevMatchEmpty) 328 prevMatchEmpty = match && keylen == 0 340 i += keylen
|
/prebuilts/go/linux-x86/src/strings/ |
replace.go | 193 func (r *genericReplacer) lookup(s string, ignoreRoot bool) (val string, keylen int, found bool) { 194 // Iterate down the trie to the end, and grab the value and keylen with 203 keylen = n 327 val, keylen, match := r.lookup(s[i:], prevMatchEmpty) 328 prevMatchEmpty = match && keylen == 0 340 i += keylen
|
/prebuilts/python/darwin-x86/2.7.5/bin/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/prebuilts/python/linux-x86/2.7.5/bin/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtpd.py | 216 keylen = len(keyword) 217 if arg[:keylen].upper() == keyword: 218 address = arg[keylen:].strip()
|
/system/bt/stack/smp/ |
aes.c | 506 return_type aes_set_key( const unsigned char key[], length_type keylen, aes_context ctx[1] ) 510 switch( keylen ) 514 keylen = 16; 518 keylen = 24; 522 keylen = 32; 528 block_copy_nn(ctx->ksch, key, keylen); 529 hi = (keylen + 28) << 2; 531 for( cc = keylen, rc = 1; cc < hi; cc += 4 ) 538 if( cc % keylen == 0 ) 547 else if( keylen > 24 && cc % keylen == 16 [all...] |
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 217 size_t keylen; local 227 keylen = strlen (key); 251 keylen)) && 252 (eq == &ptr[keylen]) )
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon28318::__anon28319 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|