/external/icu4c/test/intltest/ |
H A D | apicoll.cpp | 1145 int32_t keylength = 0; local 1146 const uint8_t *key2primary_alias = key2.getByteArray(keylength); 1147 LocalArray<uint8_t> key2primary(new uint8_t[keylength]); 1148 memcpy(key2primary.getAlias(), key2primary_alias, keylength); 1154 const uint8_t *tempkey = key1.getByteArray(keylength); 1155 doAssert(memcmp(tempkey, sortkey1, keylength) == 0, 1157 tempkey = key2.getByteArray(keylength); 1158 doAssert(memcmp(tempkey, sortkey2, keylength) == 0, 1160 tempkey = key3.getByteArray(keylength); 1161 doAssert(memcmp(tempkey, sortkey3, keylength) [all...] |
/external/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 77 ASN1_OPT(PBKDF2PARAM, keylength, ASN1_INTEGER), 237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 2007 /* NB: the keylength is only applicable when is_export is true */ 2011 int keylength)); 2015 int keylength)); 2020 int keylength)); 2023 int keylength)); 2028 int keylength)); 2031 int keylength));
|
H A D | x509.h | 575 ASN1_INTEGER *keylength; member in struct:PBKDF2PARAM_st
|
/external/openssl/ssl/ |
H A D | ssl.h | 2007 /* NB: the keylength is only applicable when is_export is true */ 2011 int keylength)); 2015 int keylength)); 2020 int keylength)); 2023 int keylength)); 2028 int keylength)); 2031 int keylength));
|
H A D | ssl_lib.c | 3101 int keylength)) 3108 int keylength)) 3119 * \param keylength if \c is_export is \c TRUE, then \c keylength is the size 3125 RSA *cb(SSL *ssl,int is_export,int keylength) argument 3137 int keylength)) 3143 int keylength)) 3151 int keylength)) 3157 int keylength)) 3099 SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument 3106 SSL_set_tmp_rsa_callback(SSL *ssl,RSA *(*cb)(SSL *ssl, int is_export, int keylength)) argument 3136 SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument 3142 SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, int keylength)) argument 3150 SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument 3156 SSL_set_tmp_ecdh_callback(SSL *ssl,EC_KEY *(*ecdh)(SSL *ssl,int is_export, int keylength)) argument
|
H A D | ssltest.c | 222 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength); 2364 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument 2376 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); 2378 if(!RSA_generate_key_ex(rsa_tmp,keylength,bn,NULL))
|
/external/ipsec-tools/src/racoon/ |
H A D | cfparse.y | 244 %type <num> NUMBER BOOLEAN SWITCH keylength 1434 : ALGORITHMTYPE keylength 1503 keylength 2064 | ALGORITHM_CLASS ALGORITHMTYPE keylength
|
/external/openssl/apps/ |
H A D | s_server.c | 205 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength); 2936 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) argument 2947 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); 2951 !RSA_generate_key_ex(rsa_tmp, keylength, bn, NULL))
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 575 ASN1_INTEGER *keylength; member in struct:PBKDF2PARAM_st
|