/external/chromium/crypto/ |
H A D | hmac_win.cc | 98 bool HMAC::Init(const unsigned char* key, int key_length) { argument 106 if (key_length < SHA256_LENGTH / 2) 108 plat_->raw_key_.assign(key, key + key_length); 130 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 138 key_blob->key_size = key_length; 139 memcpy(key_blob->key_data, key, key_length); 149 SecureZeroMemory(key_blob->key_data, key_length);
|
H A D | hmac.h | 33 // Initializes this instance using |key| of the length |key_length|. Call Init 35 bool Init(const unsigned char* key, int key_length);
|
H A D | hmac_mac.cc | 23 bool HMAC::Init(const unsigned char *key, int key_length) { argument 30 plat_->key_.assign(reinterpret_cast<const char*>(key), key_length); local
|
H A D | hmac_openssl.cc | 29 bool HMAC::Init(const unsigned char* key, int key_length) { argument 33 plat_->key.assign(key, key + key_length);
|
H A D | hmac_nss.cc | 42 bool HMAC::Init(const unsigned char *key, int key_length) { argument 60 key_item.len = key_length;
|
/external/openssl/crypto/hmac/ |
H A D | hmac.c | 90 &ctx->key_length)) 97 ctx->key_length=len; 99 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 100 memset(&ctx->key[ctx->key_length], 0, 101 HMAC_MAX_MD_CBLOCK - ctx->key_length); 173 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/webkit/Source/JavaScriptCore/wtf/ |
H A D | RandomNumberSeed.h | 43 void init_by_array(unsigned long init_key[],int key_length);
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.h | 32 u16 key_length; member in struct:ieee802_1x_eapol_key 45 * key field (of key_length bytes) contains the key in encrypted form; 46 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.h | 32 u16 key_length; member in struct:ieee802_1x_eapol_key 45 * key field (of key_length bytes) contains the key in encrypted form; 46 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.h | 32 u16 key_length; member in struct:ieee802_1x_eapol_key 45 * key field (of key_length bytes) contains the key in encrypted form; 46 * if packet body length = 44, key field is absent and key_length
|
/external/openssl/crypto/asn1/ |
H A D | x_pkey.c | 117 ret->key_length=0;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 176 WPA_PUT_BE16(reply->key_length, 0); 339 WPA_PUT_BE16(reply->key_length, 0); 341 os_memcpy(reply->key_length, key->key_length, 2); 924 WPA_PUT_BE16(reply->key_length, 0); 926 os_memcpy(reply->key_length, key->key_length, 2); 988 keylen = WPA_GET_BE16(key->key_length); 1104 gd->gtk_len = WPA_GET_BE16(key->key_length); 1189 WPA_PUT_BE16(reply->key_length, [all...] |
H A D | peerkey.c | 93 WPA_PUT_BE16(err->key_length, 0); 153 WPA_PUT_BE16(reply->key_length, 0); 361 WPA_PUT_BE16(msg->key_length, 16); 363 WPA_PUT_BE16(msg->key_length, 32); 421 WPA_PUT_BE16(msg->key_length, 16); 423 WPA_PUT_BE16(msg->key_length, 32); 1093 WPA_PUT_BE16(req->key_length, 0);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 94 WPA_PUT_BE16(err->key_length, 0); 154 WPA_PUT_BE16(reply->key_length, 0); 362 WPA_PUT_BE16(msg->key_length, 16); 364 WPA_PUT_BE16(msg->key_length, 32); 422 WPA_PUT_BE16(msg->key_length, 16); 424 WPA_PUT_BE16(msg->key_length, 32); 1096 WPA_PUT_BE16(req->key_length, 0);
|
H A D | wpa.c | 126 WPA_PUT_BE16(reply->key_length, 0); 331 WPA_PUT_BE16(reply->key_length, 0); 333 os_memcpy(reply->key_length, key->key_length, 2); 1053 WPA_PUT_BE16(reply->key_length, 0); 1055 os_memcpy(reply->key_length, key->key_length, 2); 1120 keylen = WPA_GET_BE16(key->key_length); 1242 gd->gtk_len = WPA_GET_BE16(key->key_length); 1335 WPA_PUT_BE16(reply->key_length, [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 94 WPA_PUT_BE16(err->key_length, 0); 154 WPA_PUT_BE16(reply->key_length, 0); 362 WPA_PUT_BE16(msg->key_length, 16); 364 WPA_PUT_BE16(msg->key_length, 32); 422 WPA_PUT_BE16(msg->key_length, 16); 424 WPA_PUT_BE16(msg->key_length, 32); 1096 WPA_PUT_BE16(req->key_length, 0);
|
H A D | wpa.c | 126 WPA_PUT_BE16(reply->key_length, 0); 331 WPA_PUT_BE16(reply->key_length, 0); 333 os_memcpy(reply->key_length, key->key_length, 2); 1053 WPA_PUT_BE16(reply->key_length, 0); 1055 os_memcpy(reply->key_length, key->key_length, 2); 1120 keylen = WPA_GET_BE16(key->key_length); 1242 gd->gtk_len = WPA_GET_BE16(key->key_length); 1335 WPA_PUT_BE16(reply->key_length, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 94 WPA_PUT_BE16(err->key_length, 0); 154 WPA_PUT_BE16(reply->key_length, 0); 362 WPA_PUT_BE16(msg->key_length, 16); 364 WPA_PUT_BE16(msg->key_length, 32); 422 WPA_PUT_BE16(msg->key_length, 16); 424 WPA_PUT_BE16(msg->key_length, 32); 1096 WPA_PUT_BE16(req->key_length, 0);
|
H A D | wpa.c | 126 WPA_PUT_BE16(reply->key_length, 0); 331 WPA_PUT_BE16(reply->key_length, 0); 333 os_memcpy(reply->key_length, key->key_length, 2); 1053 WPA_PUT_BE16(reply->key_length, 0); 1055 os_memcpy(reply->key_length, key->key_length, 2); 1120 keylen = WPA_GET_BE16(key->key_length); 1242 gd->gtk_len = WPA_GET_BE16(key->key_length); 1335 WPA_PUT_BE16(reply->key_length, [all...] |
/external/wpa_supplicant/ |
H A D | wpa.c | 169 /* Note: key_info, key_length, and key_data_length are unaligned */ 171 u8 key_length[2]; member in struct:wpa_eapol_key 1014 WPA_PUT_BE16(reply->key_length, 0); 1131 WPA_PUT_BE16(req->key_length, 0); 1466 WPA_PUT_BE16(reply->key_length, 0); 1468 os_memcpy(reply->key_length, key->key_length, 2); 1990 WPA_PUT_BE16(reply->key_length, 0); 1992 os_memcpy(reply->key_length, key->key_length, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 150 /* Note: key_info, key_length, and key_data_length are unaligned */ 152 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 158 /* Note: key_info, key_length, and key_data_length are unaligned */ 160 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 158 /* Note: key_info, key_length, and key_data_length are unaligned */ 160 u8 key_length[2]; /* big endian */ member in struct:wpa_eapol_key
|