/external/openssl/ssl/ |
H A D | tls1.h | 336 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ 337 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) 338 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ 339 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
H A D | saferp.c | 211 @param keylen The key length in bytes 216 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 226 if (keylen != 16 && keylen != 24 && keylen != 32) { 233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { 238 if (keylen == 16) { 266 } else if (keylen == 24) { 465 int keylen; 503 if ((err = saferp_setup(tests[i].key, tests[i].keylen, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 906 size_t keylen; local 918 &keylen); 920 keys->send = decrypt_ms_key(key, keylen, 929 &keylen); 931 keys->recv = decrypt_ms_key(key, keylen, 947 size_t keylen; local 958 RADIUS_CISCO_AV_PAIR, &keylen); 959 if (key && keylen == 51 && 961 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
|
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 142 int keylen; member in struct:__anon8461 160 int keylen; member in struct:__anon8462 258 sess.keylen = ciphers[i].keylen; 297 sess.mackeylen = digests[i].keylen; 428 ctx->key_len == ciphers[i].keylen) { 444 sess->keylen = ctx->key_len; 670 return digests[i].keylen; 1292 int fd, keylen; local 1300 keylen [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 42 if (keylen != 16) {
|
H A D | cast5.c | 403 @param keylen The key length in bytes 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 425 if (num_rounds == 12 && keylen > 10) { 429 if (keylen < 5 || keylen > 16) { 435 XMEMCPY(buf, key, (size_t)keylen); 481 skey->cast5.keylen = keylen; 493 int cast5_setup(const unsigned char *key, int keylen, in argument [all...] |
/external/openssl/crypto/pem/ |
H A D | pvkfmt.c | 726 unsigned int saltlen, unsigned int keylen, 749 enctmp = OPENSSL_malloc(keylen + 8); 762 inlen = keylen - 8; 796 ret = b2i_PrivateKey(&p, keylen); 811 unsigned int saltlen, keylen; local 819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 821 buflen = (int) keylen + saltlen; 834 ret = do_PVK_body(&p, saltlen, keylen, cb, u); 725 do_PVK_body(const unsigned char **in, unsigned int saltlen, unsigned int keylen, pem_password_cb *cb, void *u) argument
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 142 unsigned char *key, int keylen) 169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 329 int keylen,ivlen; local 338 keylen=EVP_CIPHER_key_length(evp_cipher); 365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) 368 OPENSSL_cleanse(key, keylen); 508 int keylen,ivlen; 141 pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, unsigned char *key, int keylen) argument
|
/external/openssl/crypto/evp/ |
H A D | evp_enc.c | 596 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) argument 599 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL); 600 if(c->key_len == keylen) return 1; 601 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) 603 c->key_len = keylen;
|
/external/openssh/ |
H A D | packet.c | 548 packet_set_encryption_key(const u_char *key, u_int keylen, int number) argument 554 if (keylen < 20) 555 fatal("packet_set_encryption_key: keylen too small: %d", keylen); 556 if (keylen > SSH_SESSION_KEY_LENGTH) 557 fatal("packet_set_encryption_key: keylen too big: %d", keylen); 558 memcpy(active_state->ssh1_key, key, keylen); 559 active_state->ssh1_keylen = keylen; 560 cipher_init(&active_state->send_context, cipher, key, keylen, NUL [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_test.c | 30 int keylen, 229 if ((err = eax_encrypt_authenticate_memory(idx, tests[x].key, tests[x].keylen, 254 if ((err = eax_decrypt_verify_memory(idx, tests[x].key, tests[x].keylen,
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 509 int keylen, rsclen; local 520 keylen = 16; 525 keylen = 32; 547 (u8 *) sm->ptk.tk1, keylen) < 0) { 550 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 551 alg, keylen, MAC2STR(sm->bssid)); 567 int keylen, int maxkeylen, 575 if (keylen != 16 || maxkeylen < 16) { 583 if (keylen != 32 || maxkeylen < 32) { 591 if (keylen ! 565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument 1072 u16 key_info, keylen, len; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 509 int keylen, rsclen; local 520 keylen = 16; 525 keylen = 32; 547 (u8 *) sm->ptk.tk1, keylen) < 0) { 550 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 551 alg, keylen, MAC2STR(sm->bssid)); 567 int keylen, int maxkeylen, 575 if (keylen != 16 || maxkeylen < 16) { 583 if (keylen != 32 || maxkeylen < 32) { 591 if (keylen ! 565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument 1072 u16 key_info, keylen, len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 509 int keylen, rsclen; local 520 keylen = 16; 525 keylen = 32; 547 (u8 *) sm->ptk.tk1, keylen) < 0) { 550 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 551 alg, keylen, MAC2STR(sm->bssid)); 567 int keylen, int maxkeylen, 575 if (keylen != 16 || maxkeylen < 16) { 583 if (keylen != 32 || maxkeylen < 32) { 591 if (keylen ! 565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument 1072 u16 key_info, keylen, len; local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.c | 490 if (f == NULL || f->keylen == NULL) 493 return (f->keylen)(len); 617 if (f == NULL || f->keylen == NULL) 620 return (f->keylen)(len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_libtomcrypt.c | 298 size_t keylen; member in struct:crypto_cipher::__anon13816::__anon13817 342 ctx->u.rc4.keylen = key_len; 365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 145 * @keylen: Length of the WEP key 149 const u8 *key, size_t keylen);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto.h | 451 * @keylen: RC4 key length 461 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
H A D | crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon14033::__anon14034 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
H A D | crypto_nss.c | 112 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 139 * @keylen: Length of the WEP key 143 const u8 *key, size_t keylen);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto.h | 451 * @keylen: RC4 key length 461 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
H A D | crypto_libtomcrypt.c | 291 size_t keylen; member in struct:crypto_cipher::__anon14250::__anon14251 335 ctx->u.rc4.keylen = key_len; 358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
H A D | crypto_nss.c | 112 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 139 * @keylen: Length of the WEP key 143 const u8 *key, size_t keylen);
|