/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
miniopt.c | 59 int keylen; local 101 keylen = eq ? (eq - (p + 2)) : (int)strlen(p) - 2; 102 if (keylen > 63) keylen = 63; 103 memcpy(t->key, p + 2, keylen);
|
/system/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 18 size_t keylen; member in struct:__anon107689
|
/device/linaro/bootloader/edk2/StdLib/BsdSocketLib/ |
getservent.c | 149 static int keylen;
local 162 if ((rv = yp_first(yp_domain, "services.byname", &key, &keylen,
170 rv = yp_next(yp_domain, "services.byname", key, keylen, &key,
171 &keylen, &result, &resultlen);
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
algorithm.h | 159 int (*keylen) __P((int)); member in struct:enc_algorithm
|
oakley.c | 2842 u_int keylen, prflen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon37656::__anon37657 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon37663::__anon37664 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
crypto_openssl.c | 186 int rc4_skip(const u8 *key, size_t keylen, size_t skip, 201 !EVP_CIPHER_CTX_set_key_length(ctx, keylen) || 257 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) 259 switch (keylen) { 807 int keylen; local 822 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); 823 if (keylen < 0) 825 wpabuf_put(res, keylen); [all...] |
/external/libusb/libusb/os/ |
linux_netlink.c | 186 size_t keylen = strlen(key); local 189 if (strncmp(buffer, key, keylen) == 0 && buffer[keylen] == '=') 190 return buffer + keylen + 1;
|
/external/syslinux/gpxe/src/net/80211/ |
wep.c | 79 int keylen; member in struct:wep_ctx 90 * @v keylen Length of WEP key 98 int keylen, const void *rsc __unused ) 102 ctx->keylen = ( keylen > WEP_MAX_KEY ? WEP_MAX_KEY : keylen ); 103 memcpy ( ctx->key + WEP_IV_LEN, key, ctx->keylen ); 144 ctx->keylen + WEP_IV_LEN ); 192 ctx->keylen + WEP_IV_LEN );
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 315 int keylen; local 328 keylen = wpa_cipher_key_len(sm->pairwise_cipher); 331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 545 size_t gtk_len, keylen, rsc_len; local 569 keylen = wpa_cipher_key_len(sm->group_cipher); 578 if (gtk_len < keylen) { 587 if (gtk_elem[2] != keylen) { 590 gtk_elem[2], (unsigned long) keylen); 594 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 603 gtk_elem + 3, rsc_len, gtk, keylen) < 0) [all...] |
/external/iw/ |
util.c | 393 int pos = 0, keylen; local 419 keylen = 5; 425 keylen = 13; 434 NLA_PUT(msg, NL80211_KEY_DATA, keylen, keydata);
|
/external/kmod/shared/ |
hash.c | 148 unsigned int keylen = strlen(key); local 149 unsigned int hashval = hash_superfast(key, keylen); 191 unsigned int keylen = strlen(key); local 192 unsigned int hashval = hash_superfast(key, keylen); 236 unsigned int keylen = strlen(key); local 237 unsigned int hashval = hash_superfast(key, keylen); 254 unsigned int keylen = strlen(key); local 255 unsigned int hashval = hash_superfast(key, keylen);
|
/external/kmod/tools/ |
modinfo.c | 200 int keylen; local 222 keylen = strlen(key); 223 printf("%s:%-*s%s%c", key, 15 - keylen, "", value, separator);
|
modprobe.c | 629 size_t keylen = value - args[i]; local 630 size_t valuelen = len - keylen; 631 memcpy(opts + optslen, args[i], keylen); 632 optslen += keylen;
|
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 217 size_t keylen; local 227 keylen = strlen (key); 251 keylen)) && 252 (eq == &ptr[keylen]) )
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0) 291 unsigned long keylen; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 275 size_t keylen; local 284 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); 291 if (keylen > *len) 292 keylen = *len; 293 os_memcpy(msk, key, keylen); 294 *len = keylen;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 289 size_t keylen; local 297 keylen = EAP_MSK_LEN; 298 res = eapol_sm_get_key(sm, key, keylen); 305 if (keylen > *len) 306 keylen = *len; 307 os_memcpy(msk, key, keylen); 308 *len = keylen;
|
/external/iproute2/ip/ |
ipxfrm.c | 517 int keylen; local 533 keylen = algo->alg_key_len / 8; 534 if (len < keylen) { 539 if (keylen > 0) { 541 for (i = 0; i < keylen; i ++) [all...] |
/external/curl/lib/ |
ssh.c | 532 size_t keylen; local 534 &keylen, &keytype); 560 remotekey, keylen, 568 remotekey, keylen, 590 foundkey.len = keylen; 628 remotekey, keylen, [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSDigest.c | 1325 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local [all...] |