Searched refs:keylen (Results 101 - 125 of 186) sorted by relevance

12345678

/external/openssl/ssl/
H A Dtls1.h336 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
337 SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys))
338 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
339 SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys))
/external/dropbear/libtomcrypt/src/ciphers/safer/
H A Dsaferp.c211 @param keylen The key length in bytes
216 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
226 if (keylen != 16 && keylen != 24 && keylen != 32) {
233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) {
238 if (keylen == 16) {
266 } else if (keylen == 24) {
465 int keylen;
503 if ((err = saferp_setup(tests[i].key, tests[i].keylen,
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius.c906 size_t keylen; local
918 &keylen);
920 keys->send = decrypt_ms_key(key, keylen,
929 &keylen);
931 keys->recv = decrypt_ms_key(key, keylen,
947 size_t keylen; local
958 RADIUS_CISCO_AV_PAIR, &keylen);
959 if (key && keylen == 51 &&
961 keys->recv = decrypt_ms_key(key + 17, keylen - 17,
/external/openssl/crypto/engine/
H A Deng_cryptodev.c142 int keylen; member in struct:__anon8461
160 int keylen; member in struct:__anon8462
258 sess.keylen = ciphers[i].keylen;
297 sess.mackeylen = digests[i].keylen;
428 ctx->key_len == ciphers[i].keylen) {
444 sess->keylen = ctx->key_len;
670 return digests[i].keylen;
1292 int fd, keylen; local
1300 keylen
[all...]
/external/dropbear/libtomcrypt/src/ciphers/
H A Dxtea.c34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
42 if (keylen != 16) {
H A Dcast5.c403 @param keylen The key length in bytes
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
425 if (num_rounds == 12 && keylen > 10) {
429 if (keylen < 5 || keylen > 16) {
435 XMEMCPY(buf, key, (size_t)keylen);
481 skey->cast5.keylen = keylen;
493 int cast5_setup(const unsigned char *key, int keylen, in argument
[all...]
/external/openssl/crypto/pem/
H A Dpvkfmt.c726 unsigned int saltlen, unsigned int keylen,
749 enctmp = OPENSSL_malloc(keylen + 8);
762 inlen = keylen - 8;
796 ret = b2i_PrivateKey(&p, keylen);
811 unsigned int saltlen, keylen; local
819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
821 buflen = (int) keylen + saltlen;
834 ret = do_PVK_body(&p, saltlen, keylen, cb, u);
725 do_PVK_body(const unsigned char **in, unsigned int saltlen, unsigned int keylen, pem_password_cb *cb, void *u) argument
/external/openssl/crypto/pkcs7/
H A Dpk7_doit.c142 unsigned char *key, int keylen)
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0)
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
329 int keylen,ivlen; local
338 keylen=EVP_CIPHER_key_length(evp_cipher);
365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0)
368 OPENSSL_cleanse(key, keylen);
508 int keylen,ivlen;
141 pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, unsigned char *key, int keylen) argument
/external/openssl/crypto/evp/
H A Devp_enc.c596 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) argument
599 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL);
600 if(c->key_len == keylen) return 1;
601 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH))
603 c->key_len = keylen;
/external/openssh/
H A Dpacket.c548 packet_set_encryption_key(const u_char *key, u_int keylen, int number) argument
554 if (keylen < 20)
555 fatal("packet_set_encryption_key: keylen too small: %d", keylen);
556 if (keylen > SSH_SESSION_KEY_LENGTH)
557 fatal("packet_set_encryption_key: keylen too big: %d", keylen);
558 memcpy(active_state->ssh1_key, key, keylen);
559 active_state->ssh1_keylen = keylen;
560 cipher_init(&active_state->send_context, cipher, key, keylen, NUL
[all...]
/external/dropbear/libtomcrypt/src/encauth/eax/
H A Deax_test.c30 int keylen,
229 if ((err = eax_encrypt_authenticate_memory(idx, tests[x].key, tests[x].keylen,
254 if ((err = eax_decrypt_verify_memory(idx, tests[x].key, tests[x].keylen,
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c509 int keylen, rsclen; local
520 keylen = 16;
525 keylen = 32;
547 (u8 *) sm->ptk.tk1, keylen) < 0) {
550 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
551 alg, keylen, MAC2STR(sm->bssid));
567 int keylen, int maxkeylen,
575 if (keylen != 16 || maxkeylen < 16) {
583 if (keylen != 32 || maxkeylen < 32) {
591 if (keylen !
565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
1072 u16 key_info, keylen, len; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c509 int keylen, rsclen; local
520 keylen = 16;
525 keylen = 32;
547 (u8 *) sm->ptk.tk1, keylen) < 0) {
550 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
551 alg, keylen, MAC2STR(sm->bssid));
567 int keylen, int maxkeylen,
575 if (keylen != 16 || maxkeylen < 16) {
583 if (keylen != 32 || maxkeylen < 32) {
591 if (keylen !
565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
1072 u16 key_info, keylen, len; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c509 int keylen, rsclen; local
520 keylen = 16;
525 keylen = 32;
547 (u8 *) sm->ptk.tk1, keylen) < 0) {
550 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
551 alg, keylen, MAC2STR(sm->bssid));
567 int keylen, int maxkeylen,
575 if (keylen != 16 || maxkeylen < 16) {
583 if (keylen != 32 || maxkeylen < 32) {
591 if (keylen !
565 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
1072 u16 key_info, keylen, len; local
[all...]
/external/ipsec-tools/src/racoon/
H A Dalgorithm.c490 if (f == NULL || f->keylen == NULL)
493 return (f->keylen)(len);
617 if (f == NULL || f->keylen == NULL)
620 return (f->keylen)(len);
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dcrypto_libtomcrypt.c298 size_t keylen; member in struct:crypto_cipher::__anon13816::__anon13817
342 ctx->u.rc4.keylen = key_len;
365 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
389 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.h145 * @keylen: Length of the WEP key
149 const u8 *key, size_t keylen);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto.h451 * @keylen: RC4 key length
461 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
H A Dcrypto_libtomcrypt.c291 size_t keylen; member in struct:crypto_cipher::__anon14033::__anon14034
335 ctx->u.rc4.keylen = key_len;
358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
H A Dcrypto_nss.c112 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
/external/wpa_supplicant_8/hostapd/src/eapol_supp/
H A Deapol_supp_sm.h139 * @keylen: Length of the WEP key
143 const u8 *key, size_t keylen);
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto.h451 * @keylen: RC4 key length
461 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
H A Dcrypto_libtomcrypt.c291 size_t keylen; member in struct:crypto_cipher::__anon14250::__anon14251
335 ctx->u.rc4.keylen = key_len;
358 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
382 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
H A Dcrypto_nss.c112 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
/external/wpa_supplicant_8/src/eapol_supp/
H A Deapol_supp_sm.h139 * @keylen: Length of the WEP key
143 const u8 *key, size_t keylen);

Completed in 326 milliseconds

12345678