/external/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 77 ASN1_OPT(PBKDF2PARAM, keylength, ASN1_INTEGER), 168 if(!(kdf->keylength = M_ASN1_INTEGER_new())) goto merr; 169 if(!ASN1_INTEGER_set (kdf->keylength,
|
/external/icu4c/test/intltest/ |
H A D | apicoll.cpp | 1143 int32_t keylength = 0; local 1144 const uint8_t *key2primary_alias = key2.getByteArray(keylength); 1145 LocalArray<uint8_t> key2primary(new uint8_t[keylength]); 1146 memcpy(key2primary.getAlias(), key2primary_alias, keylength); 1152 const uint8_t *tempkey = key1.getByteArray(keylength); 1153 doAssert(memcmp(tempkey, sortkey1, keylength) == 0, 1155 tempkey = key2.getByteArray(keylength); 1156 doAssert(memcmp(tempkey, sortkey2, keylength) == 0, 1158 tempkey = key3.getByteArray(keylength); 1159 doAssert(memcmp(tempkey, sortkey3, keylength) [all...] |
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 1834 /* NB: the keylength is only applicable when is_export is true */ 1838 int keylength)); 1842 int keylength)); 1847 int keylength)); 1850 int keylength)); 1855 int keylength)); 1858 int keylength));
|
H A D | x509.h | 575 ASN1_INTEGER *keylength; member in struct:PBKDF2PARAM_st
|
/external/openssl/ssl/ |
H A D | ssl.h | 1834 /* NB: the keylength is only applicable when is_export is true */ 1838 int keylength)); 1842 int keylength)); 1847 int keylength)); 1850 int keylength)); 1855 int keylength)); 1858 int keylength));
|
H A D | ssl_lib.c | 3038 int keylength)) 3045 int keylength)) 3056 * \param keylength if \c is_export is \c TRUE, then \c keylength is the size 3062 RSA *cb(SSL *ssl,int is_export,int keylength) argument 3074 int keylength)) 3080 int keylength)) 3088 int keylength)) 3094 int keylength)) 3036 SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument 3043 SSL_set_tmp_rsa_callback(SSL *ssl,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument 3073 SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument 3079 SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument 3087 SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument 3093 SSL_set_tmp_ecdh_callback(SSL *ssl,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument
|
H A D | ssltest.c | 219 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength); 2249 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument 2261 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); 2263 if(!RSA_generate_key_ex(rsa_tmp,keylength,bn,NULL))
|
/external/openssl/apps/ |
H A D | s_server.c | 202 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength); 2700 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument 2711 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); 2715 !RSA_generate_key_ex(rsa_tmp, keylength, bn, NULL))
|
/external/ipsec-tools/src/racoon/ |
H A D | cfparse.y | 250 %type <num> NUMBER BOOLEAN SWITCH keylength 1541 : ALGORITHMTYPE keylength 1610 keylength 2281 | ALGORITHM_CLASS ALGORITHMTYPE keylength
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 575 ASN1_INTEGER *keylength; member in struct:PBKDF2PARAM_st
|