/hardware/intel/common/libva/va/drm/ |
va_drm_utils.c | 34 int key_len; member in struct:driver_name_map 64 if (drm_version->name_len >= m->key_len && 65 strncmp(drm_version->name, m->key, m->key_len) == 0)
|
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 133 const size_t key_len = sizeof(key); local 137 1 /* iterations */, digest, key_len, key)); 145 0 /* iterations */, digest, key_len, key));
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
internal.h | 78 uint8_t key_len; member in struct:evp_aead_st 86 int (*init)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len, 88 int (*init_with_direction)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len,
|
/external/curl/tests/unit/ |
unit1305.c | 124 size_t key_len; variable 130 key_len = strlen(data_key); 133 nodep = Curl_hash_add(&hp, data_key, key_len + 1, data_node);
|
/external/e2fsprogs/lib/ext2fs/ |
hashmap.h | 16 size_t key_len; member in struct:ext2fs_hashmap::ext2fs_hashmap_entry 27 size_t key_len); 29 size_t key_len);
|
/external/nos/test/system-test-harness/src/test-data/NIST-CAVP/ |
aes-gcm-cavp.h | 12 uint32_t key_len; member in struct:__anon30766 [all...] |
/external/scapy/scapy/layers/tls/crypto/ |
cipher_stream.py | 55 l = self.key_len 108 key_len = 16 variable in class:_StreamCipher.Cipher_RC4_128 112 key_len = 5 variable in class:_StreamCipher.Cipher_RC4_40 116 key_len = 0 variable in class:Cipher_NULL
|
h_mac.py | 39 dct["key_len"] = dct["hmac_len"] 82 key_len = 0 variable in class:Hmac_NULL
|
cipher_aead.py | 77 key = b"\0" * self.key_len 226 key_len = 16 variable in class:_AEADCipher.Cipher_AES_128_GCM 230 key_len = 32 variable in class:_AEADCipher.Cipher_AES_256_GCM 236 key_len = 16 variable in class:_AEADCipher.Cipher_AES_128_CCM 240 key_len = 32 variable in class:_AEADCipher.Cipher_AES_256_CCM 246 key_len = 32 variable in class:_AEADCipher.Cipher_AES_256_CCM_8 268 key = b"\0" * self.key_len 374 key_len = 32 variable in class:_AEADCipher_TLS13.Cipher_CHACHA20_POLY1305_TLS13 395 key_len = 16 variable in class:.Cipher_AES_128_GCM_TLS13 400 key_len = 3 variable in class:.Cipher_AES_256_GCM_TLS13 406 key_len = 16 variable in class:.Cipher_AES_128_CCM_TLS13 [all...] |
cipher_block.py | 52 l = self.key_len 114 key_len = 16 variable in class:_BlockCipher.Cipher_AES_128_CBC 117 key_len = 32 variable in class:_BlockCipher.Cipher_AES_256_CBC 124 key_len = 16 variable in class:_BlockCipher.Cipher_CAMELLIA_128_CBC 127 key_len = 32 variable in class:_BlockCipher.Cipher_CAMELLIA_256_CBC 137 key_len = 8 variable in class:_BlockCipher.Cipher_DES_CBC 149 key_len = 5 variable in class:_BlockCipher.Cipher_DES40_CBC 155 key_len = 24 variable in class:_BlockCipher.Cipher_3DES_EDE_CBC 161 key_len = 16 variable in class:_BlockCipher.Cipher_IDEA_CBC 167 key_len = 1 variable in class:_BlockCipher.Cipher_SEED_CBC 209 key_len = 16 variable in class:_BlockCipher._ARC2.Cipher_RC2_CBC 213 key_len = 5 variable in class:_BlockCipher._ARC2.Cipher_RC2_CBC_40 [all...] |
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local 18 key_len = siglen_map[algorithm]; 20 * 2 * key_len bytes for the n and rr arrays 23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t)); 51 uint64_t key_len; local 57 key_len = key->len; 58 key_len *= sizeof(uint32_t); 61 if (RSA1024NUMBYTES != key_len && 62 RSA2048NUMBYTES != key_len && 63 RSA4096NUMBYTES != key_len & [all...] |
/external/curl/lib/ |
hash.h | 62 size_t key_len; member in struct:curl_hash_element 78 void *Curl_hash_add(struct curl_hash *h, void *key, size_t key_len, void *p); 79 int Curl_hash_delete(struct curl_hash *h, void *key, size_t key_len); 80 void *Curl_hash_pick(struct curl_hash *, void *key, size_t key_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 35 size_t key_len; member in struct:crypto_hash 40 size_t key_len) 76 if (key_len > sizeof(k_pad)) { 78 MD5Update(&ctx->u.md5, key, key_len); 81 key_len = 16; 83 os_memcpy(ctx->key, key, key_len); 84 ctx->key_len = key_len; 86 os_memcpy(k_pad, key, key_len); 87 if (key_len < sizeof(k_pad) [all...] |
/external/boringssl/src/fipstools/ |
cavp_aes_gcm_test.cc | 87 std::string key_len, iv_len, pt_len_str, aad_len_str, tag_len; local 88 if (!t->GetInstruction(&key_len, "Keylen") || 107 key.size() * 8 != strtoul(key_len.c_str(), nullptr, 0) ||
|
cavp_aes_test.cc | 94 const size_t key_len = key.size() * 8; local 95 if (key_len == 128) { 99 } else if (key_len == 192) { 108 } else { // key_len == 256
|
/external/libchrome/crypto/ |
hmac_unittest.cc | 92 const int key_len; member in struct:__anon24447 151 cases[i].key_len));
|
/external/vboot_reference/tests/ |
rsa_utility_tests.c | 87 uint32_t key_len = RSA1024NUMBYTES << i; local 89 *buf_key_len = key_len / sizeof(uint32_t); 92 buf[8 + key_len - 1] = 101; 93 buf[8 + key_len] = 120; 94 buf[8 + key_len * 2 - 1] = 121; 97 key = RSAPublicKeyFromBuf(buf, 8 + key_len * 2); 103 TEST_EQ(((uint8_t*)key->n)[key_len - 1], 101, 107 TEST_EQ(((uint8_t*)key->rr)[key_len - 1], 121, 112 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 - 1), NULL, 114 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 + 1), NULL [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 152 const int key_len = 64; local 157 key = os_malloc(key_len); 161 os_memset(key, 0x11, key_len / 2); 162 os_memset(key + key_len / 2, 0x22, key_len / 2); 163 *len = key_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_vendor_test.c | 144 const int key_len = 64; local 149 key = os_malloc(key_len); 153 os_memset(key, 0x11, key_len / 2); 154 os_memset(key + key_len / 2, 0x22, key_len / 2); 155 *len = key_len;
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 255 uint64_t key_len; local 256 if (!CBS_get_asn1_uint64(&pbkdf2_params, &key_len)) { 261 if (key_len != EVP_CIPHER_key_length(cipher)) {
|
/external/dhcpcd-6.8.2/ |
auth.h | 53 size_t key_len; member in struct:token
|
/external/ipsec-tools/src/racoon/ |
admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/system/gatekeeper/ |
gatekeeper.cpp | 239 uint32_t key_len = 0; local 240 if (GetAuthTokenKey(&auth_token_key, &key_len)) { 242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len,
|
/bionic/libc/kernel/uapi/linux/ |
sed-opal.h | 47 __u8 key_len; member in struct:opal_key
|
/external/avb/libavb/ |
avb_cmdline.c | 120 size_t offset, key_len, value_len; local 123 key_len = avb_strlen(key); 134 new_cmdline = avb_calloc(offset + key_len + value_len + 2); 142 avb_memcpy(new_cmdline + offset, key, key_len); 143 new_cmdline[offset + key_len] = '='; 144 avb_memcpy(new_cmdline + offset + key_len + 1, value, value_len);
|