/external/boringssl/src/crypto/pkcs8/ |
internal.h | 71 const char *pass, size_t pass_len, const uint8_t *in, 82 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, 93 * |pass| and |pass_len|. |param| contains the serialized parameters field of 98 const char *pass, size_t pass_len, CBS *param); 105 const char *pass, size_t pass_len, CBS *param); 112 const char *pass, size_t pass_len,
|
pkcs8.c | 99 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, 118 !ascii_to_ucs2(pass, pass_len, &pass_raw, &pass_raw_len)) { 231 const char *pass, size_t pass_len, 239 if (!pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_KEY_ID, iterations, 241 !pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_IV_ID, iterations, 255 size_t pass_len, CBS *param) { 273 pass_len, CBS_data(&salt), CBS_len(&salt), 328 size_t pass_len, const uint8_t *salt, 349 return pkcs12_pbe_cipher_init(suite, ctx, iterations, pass, pass_len, salt, 354 const char *pass, size_t pass_len, const uint8_t *in [all...] |
p5_pbev2.c | 144 size_t pass_len, const uint8_t *salt, 153 int ret = PKCS5_PBKDF2_HMAC_SHA1(pass, pass_len, salt, salt_len, iterations, 162 const char *pass, size_t pass_len, 204 return pkcs5_pbe2_cipher_init(ctx, cipher, iterations, pass, pass_len, salt, 210 const char *pass, size_t pass_len, CBS *param) { 305 pass_len, CBS_data(&salt), CBS_len(&salt),
|
pkcs8_x509.c | 154 size_t pass_len; 156 pass_len = strlen(pass); 158 pass_len = (size_t)pass_len_in; 173 pkey = PKCS8_parse_encrypted_private_key(&cbs, pass, pass_len); 189 size_t pass_len; 191 pass_len = strlen(pass); 193 pass_len = (size_t)pass_len_in; 208 pass_len, salt, salt_len, iterations,
|
/external/boringssl/src/include/openssl/ |
pkcs8.h | 86 const char *pass, int pass_len, 96 size_t pass_len, const uint8_t *salt, size_t salt_len, int iterations, 112 int pass_len); 119 size_t pass_len);
|
/external/syslinux/gpxe/src/include/gpxe/ |
sha1.h | 20 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len,
|
/external/syslinux/gpxe/src/crypto/ |
sha1extra.c | 85 * @v pass_len Length of passphrase 94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, 98 u8 pass[pass_len]; /* modifiable passphrase */ 108 memcpy ( pass, passphrase, pass_len ); 114 hmac_init ( &sha1_algorithm, sha1_ctx, pass, &pass_len ); 116 hmac_final ( &sha1_algorithm, sha1_ctx, pass, &pass_len, last ); 131 * @v pass_len Length of passphrase 145 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len, 154 pbkdf2_sha1_f ( passphrase, pass_len, salt, salt_len,
|
/system/bt/stack/avrc/ |
avrc_utils.cc | 163 p_msg->pass_len == AVRC_PASS_THRU_GROUP_LEN) {
|
avrc_api.cc | 816 msg.pass.pass_len = *p_data++; 817 if (msg.pass.pass_len != p_pkt->len - 5) 818 msg.pass.pass_len = p_pkt->len - 5; 819 if (msg.pass.pass_len) [all...] |
/system/bt/bta/av/ |
bta_av_api.cc | 394 p_buf->msg.pass_len = 0; 422 p_buf->msg.pass_len = buf_len;
|
bta_av_act.cc | 262 data_len = (uint16_t)p_msg->pass.pass_len; 868 p_data->rc_msg.msg.pass.pass_len, 894 av.remote_cmd.len = p_data->rc_msg.msg.pass.pass_len; 911 (p_data->rc_msg.msg.pass.pass_len > 0)) { 913 (uint8_t*)osi_malloc(p_data->rc_msg.msg.pass.pass_len); 915 p_data->rc_msg.msg.pass.pass_len); 917 p_data->rc_msg.msg.pass.pass_len); [all...] |
/external/webrtc/webrtc/base/ |
socketadapters.cc | 779 uint8_t ver, user_len, pass_len; 784 !request->ReadUInt8(&pass_len) || 785 !request->ReadString(&pass, pass_len)) {
|
/system/bt/stack/include/ |
avrc_defs.h | 921 uint8_t pass_len; \/* Length in bytes of data. This parameter is only member in struct:__anon106280 [all...] |