HomeSort by relevance Sort by last modified time
    Searched defs:keylen (Results 1 - 25 of 51) sorted by null

1 2 3

  /hardware/broadcom/wlan/bcmdhd/dhdutil/
miniopt.c 59 int keylen; local
101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2;
102 if (keylen > 63) keylen = 63;
103 memcpy(t->key, p + 2, keylen);
  /system/sepolicy/tools/sepolicy-analyze/
sepolicy-analyze.c 18 size_t keylen; member in struct:__anon107689
  /device/linaro/bootloader/edk2/StdLib/BsdSocketLib/
getservent.c 149 static int keylen; local
162 if ((rv = yp_first(yp_domain, "services.byname", &key, &keylen,
170 rv = yp_next(yp_domain, "services.byname", key, keylen, &key,
171 &keylen, &result, &resultlen);
  /external/antlr/antlr-3.4/runtime/ObjC/Framework/
ACBTree.h 55 NSInteger keylen; /* length of key */ variable
71 @property (assign) NSInteger keylen; variable
  /external/ipsec-tools/src/racoon/
localconf.c 183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
privsep.c 469 int keylen; local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) {
481 memcpy(&keylen, bufs[1], sizeof(keylen));
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen);
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
890 privsep_getpsk(str, keylen)
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
    [all...]
algorithm.h 159 int (*keylen) __P((int)); member in struct:enc_algorithm
oakley.c 2842 u_int keylen, prflen; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 23 size_t keylen; member in struct:crypto_cipher::__anon37656::__anon37657
61 ctx->u.rc4.keylen = key_len;
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_libtomcrypt.c 291 size_t keylen; member in struct:crypto_cipher::__anon37663::__anon37664
335 ctx->u.rc4.keylen = key_len;
358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
crypto_openssl.c 186 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
201 !EVP_CIPHER_CTX_set_key_length(ctx, keylen) ||
257 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen)
259 switch (keylen) {
807 int keylen; local
822 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh);
823 if (keylen < 0)
825 wpabuf_put(res, keylen);
    [all...]
  /external/libusb/libusb/os/
linux_netlink.c 186 size_t keylen = strlen(key); local
189 if (strncmp(buffer, key, keylen) == 0 && buffer[keylen] == '=')
190 return buffer + keylen + 1;
  /external/syslinux/gpxe/src/net/80211/
wep.c 79 int keylen; member in struct:wep_ctx
90 * @v keylen Length of WEP key
98 int keylen, const void *rsc __unused )
102 ctx->keylen = ( keylen > WEP_MAX_KEY ? WEP_MAX_KEY : keylen );
103 memcpy ( ctx->key + WEP_IV_LEN, key, ctx->keylen );
144 ctx->keylen + WEP_IV_LEN );
192 ctx->keylen + WEP_IV_LEN );
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 315 int keylen; local
328 keylen = wpa_cipher_key_len(sm->pairwise_cipher);
331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) {
545 size_t gtk_len, keylen, rsc_len; local
569 keylen = wpa_cipher_key_len(sm->group_cipher);
578 if (gtk_len < keylen) {
587 if (gtk_elem[2] != keylen) {
590 gtk_elem[2], (unsigned long) keylen);
594 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
603 gtk_elem + 3, rsc_len, gtk, keylen) < 0)
    [all...]
  /external/iw/
util.c 393 int pos = 0, keylen; local
419 keylen = 5;
425 keylen = 13;
434 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata);
  /external/kmod/shared/
hash.c 148 unsigned int keylen = strlen(key); local
149 unsigned int hashval = hash_superfast(key, keylen);
191 unsigned int keylen = strlen(key); local
192 unsigned int hashval = hash_superfast(key, keylen);
236 unsigned int keylen = strlen(key); local
237 unsigned int hashval = hash_superfast(key, keylen);
254 unsigned int keylen = strlen(key); local
255 unsigned int hashval = hash_superfast(key, keylen);
  /external/kmod/tools/
modinfo.c 200 int keylen; local
222 keylen = strlen(key);
223 printf("%s:%-*s%s%c", key, 15 - keylen, "", value, separator);
modprobe.c 629 size_t keylen = value - args[i]; local
630 size_t valuelen = len - keylen;
631 memcpy(opts + optslen, args[i], keylen);
632 optslen += keylen;
  /external/libmicrohttpd/src/microhttpd/
digestauth.c 217 size_t keylen; local
227 keylen = strlen (key);
251 keylen)) &&
252 (eq == &ptr[keylen]) )
  /external/mdnsresponder/mDNSShared/
dnssd_clientlib.c 76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0)
291 unsigned long keylen; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 275 size_t keylen; local
284 key = ieee802_1x_get_key(sta->eapol_sm, &keylen);
291 if (keylen > *len)
292 keylen = *len;
293 os_memcpy(msk, key, keylen);
294 *len = keylen;
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 289 size_t keylen; local
297 keylen = EAP_MSK_LEN;
298 res = eapol_sm_get_key(sm, key, keylen);
305 if (keylen > *len)
306 keylen = *len;
307 os_memcpy(msk, key, keylen);
308 *len = keylen;
  /external/iproute2/ip/
ipxfrm.c 517 int keylen; local
533 keylen = algo->alg_key_len / 8;
534 if (len < keylen) {
539 if (keylen > 0) {
541 for (i = 0; i < keylen; i ++)
    [all...]
  /external/curl/lib/
ssh.c 532 size_t keylen; local
534 &keylen, &keytype);
560 remotekey, keylen,
568 remotekey, keylen,
590 foundkey.len = keylen;
628 remotekey, keylen,
    [all...]
  /external/mdnsresponder/mDNSCore/
DNSDigest.c 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local
    [all...]

Completed in 785 milliseconds

1 2 3