/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/system/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 18 size_t keylen; member in struct:__anon74619
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2842 u_int keylen, prflen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon27010::__anon27011 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon27017::__anon27018 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_openssl.c | 174 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 189 !EVP_CIPHER_CTX_set_key_length(ctx, keylen) || 237 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) 239 switch (keylen) { 693 int keylen; local 708 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); 709 if (keylen < 0) 711 wpabuf_put(res, keylen);
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 121 int alg_nid, keylen; local 175 keylen = EVP_CIPHER_key_length(cipher); 177 keylen = -1; 183 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 226 int prf_nid, int keylen) 260 if(keylen > 0) 264 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 315 int keylen; local 328 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 545 size_t gtk_len, keylen, rsc_len; local 569 keylen = wpa_cipher_key_len(sm->group_cipher); 578 if (gtk_len < keylen) { 587 if (gtk_elem[2] != keylen) { 590 gtk_elem[2], (unsigned long) keylen); 594 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 603 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
wpa.c | 614 int keylen, rsclen; local 641 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 652 sm->ptk.tk, keylen) < 0) { 655 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 656 alg, keylen, MAC2STR(sm->bssid)); 676 int keylen, int maxkeylen, 692 if (keylen != klen || maxkeylen < klen) { 695 wpa_cipher_txt(group_cipher), keylen, maxkeylen); 744 "the driver (alg=%d keylen=%d keyidx=%d)", 1191 u16 key_info, keylen; local 2912 u8 keylen; \/* plaintext key len *\/ local [all...] |
/external/iw/ |
util.c | 393 int pos = 0, keylen; local 419 keylen = 5; 425 keylen = 13; 434 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata);
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
UnixCrypt.java | 420 int keylen = key.length(); local 424 keyword = (keyword << 8) | ((i < keylen) ? 2 * key.charAt(i) : 0);
|
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 217 size_t keylen; local 227 keylen = strlen (key); 251 keylen)) && 252 (eq == &ptr[keylen]) )
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 272 size_t keylen; local 281 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 288 if (keylen > *len) 289 keylen = *len; 290 os_memcpy(msk, key, keylen); 291 *len = keylen;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 279 size_t keylen; local 287 keylen = EAP_MSK_LEN; 288 res = eapol_sm_get_key(sm, key, keylen); 295 if (keylen > *len) 296 keylen = *len; 297 os_memcpy(msk, key, keylen); 298 *len = keylen;
|
/external/iproute2/ip/ |
ipxfrm.c | 517 int keylen; local 533 keylen = algo->alg_key_len / 8; 534 if (len < keylen) { 539 if (keylen > 0) { 541 for (i = 0; i < keylen; i ++) [all...] |
/external/curl/lib/ |
ssh.c | 532 size_t keylen; local 534 &keylen, &keytype); 560 remotekey, keylen, 568 remotekey, keylen, 590 foundkey.len = keylen; 628 remotekey, keylen, [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1100 size_t keylen; local 1112 &keylen); 1114 keys->send = decrypt_ms_key(key, keylen, 1127 &keylen); 1129 keys->recv = decrypt_ms_key(key, keylen, 1149 size_t keylen; local 1160 RADIUS_CISCO_AV_PAIR, &keylen); 1161 if (key && keylen == 51 && 1163 keys->recv = decrypt_ms_key(key + 17, keylen - 17, [all...] |
/toolchain/binutils/binutils-2.25/include/vms/ |
lbr.h | 142 unsigned char keylen[2]; member in struct:vms_idd 197 unsigned char keylen; member in struct:vms_idx 198 /* The length of this field is in fact keylen. */ 208 unsigned char keylen[2]; member in struct:vms_elfidx 266 unsigned char keylen[2]; member in struct:vms_kbn
|
/external/icu/icu4c/source/common/ |
uloc_tag.c | 918 int32_t keylen; local 939 keylen = (int32_t)uprv_strlen(key); 940 isBcpUExt = (keylen > 1); 1041 if (!_isExtensionSingleton(key, keylen) || !_isExtensionSubtags(buf, len)) { [all...] |