/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_export.c | 38 unsigned long key_size; local 54 key_size = key->dp->size; 60 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 69 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size,
|
H A D | ecc_import.c | 96 unsigned long key_size; local 122 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 134 LTC_ASN1_SHORT_INTEGER, 1UL, &key_size, 144 for (key->idx = 0; ltc_ecc_sets[key->idx].size && (unsigned long)ltc_ecc_sets[key->idx].size != key_size; ++key->idx);
|
/external/chromium/crypto/ |
H A D | signature_verifier_mac.cc | 44 CSSM_KEY_SIZE key_size; local 47 &public_key_, &key_size); 52 public_key_.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
H A D | rsa_private_key_mac.cc | 72 CSSM_KEY_SIZE key_size; local 74 crtn = CSSM_QueryKeySizeInBits(GetSharedCSPHandle(), NULL, &key, &key_size); 79 key.KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits; 137 &key_size); 142 public_key->KeyHeader.LogicalKeySizeInBits = key_size.LogicalKeySizeInBits;
|
H A D | hmac_win.cc | 127 DWORD key_size; member in struct:crypto::KeyBlob 138 key_blob->key_size = key_length;
|
H A D | symmetric_key_win.cc | 44 // Imports a raw/plaintext key of |key_size| stored in |*key_data| into a new 53 const void* key_data, DWORD key_size, 55 DCHECK_GT(key_size, 0); 57 DWORD actual_size = sizeof(PlaintextBlobHeader) + key_size; 60 memcpy(actual_key + sizeof(PlaintextBlobHeader), key_data, key_size); 69 key_header->cbKeySize = key_size; 51 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, DWORD key_size, ScopedHCRYPTKEY* key) argument
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_db.c | 120 UINT8 key_size) 155 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 198 ** key_size: encryption key size. 210 UINT8 key_size) 225 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); 309 ** key_size: encryption key size. 323 UINT8 key_size, 360 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size); 594 ** key_size: encryption key size 606 UINT8 key_size, 116 gatts_check_attr_readability(tGATT_ATTR16 *p_attr, UINT16 offset, BOOLEAN read_long, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 203 read_attr_value(void *p_attr, UINT16 offset, UINT8 **p_data, BOOLEAN read_long, UINT16 mtu, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 314 gatts_db_read_attr_value_by_type(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, BT_HDR *p_rsp, UINT16 s_handle, UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id, UINT16 *p_cur_handle) argument 599 gatts_read_attr_value_by_handle(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id) argument 657 gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 703 gatts_write_attr_perm_check(tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_data, UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument [all...] |
H A D | gatt_sr.c | 389 UINT8 sec_flag, key_size; local 398 &key_size); 426 key_size)) 475 key_size, 953 UINT8 sec_flag, key_size; local 1003 &key_size); 1014 key_size, 1065 UINT8 sec_flag, key_size, *p = p_data; local 1098 &key_size); 1107 key_size); 1154 UINT8 sec_flag, key_size, *p; local [all...] |
H A D | gatt_int.h | 660 UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size,UINT32 trans_id, UINT16 *p_cur_handle); 662 UINT8 *p_value, UINT16 *p_len, UINT16 mtu,tGATT_SEC_FLAG sec_flag,UINT8 key_size,UINT32 trans_id); 664 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 665 extern tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag,UINT8 key_size);
|
/external/chromium/net/http/ |
H A D | des.cc | 183 DWORD key_size; member in struct:net::KeyBlob 191 key_blob.key_size = 8; // 64 bits
|
/external/chromium/chrome/browser/sync/util/ |
H A D | cryptographer.cc | 246 int key_size = bag.key_size(); local 247 for (int i = 0; i < key_size; ++i) {
|
/external/chromium/chrome/browser/extensions/ |
H A D | sandboxed_extension_unpacker.cc | 314 if (header.key_size > kMaxPublicKeySize || 324 if (header.key_size == 0) { 344 key.resize(header.key_size); 345 len = fread(&key.front(), sizeof(uint8), header.key_size, file.get()); 346 if (len < header.key_size) {
|
H A D | sandboxed_extension_unpacker.h | 74 uint32 key_size; // The size of the public key, in bytes. member in struct:SandboxedExtensionUnpacker::ExtensionHeader
|
H A D | extension_creator.cc | 207 header.key_size = public_key.size();
|
/external/openssh/ |
H A D | key.h | 103 u_int key_size(const Key *);
|
H A D | ssh-add.c | 303 key_size(key), fp, comment, key_type(key));
|
H A D | hostfile.c | 174 *bitsp = key_size(ret);
|
/external/webkit/Source/JavaScriptCore/wtf/ |
H A D | TCPackedCache.h | 143 COMPILE_ASSERT(kKeybits <= sizeof(K) * 8, key_size);
|
/external/openfst/src/include/fst/extensions/far/ |
H A D | compile-strings.h | 212 int key_size = generate_keys ? generate_keys : local 242 keybuf.width(key_size);
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 765 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; 805 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; 808 BTM_TRACE_DEBUG4("BTM_LE_KEY_LENC key_type=0x%x DIV=0x%x key_size=0x%x sec_level=0x%x", 811 p_rec->ble.keys.key_size, 1136 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; 1162 for (i = 0; i < (BT_OCTET16_LEN - btm_cb.key_size); i ++) 1231 p_cb->key_size = p_rec->ble.keys.key_size; [all...] |
H A D | btm_int.h | 454 UINT8 key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon1021 774 UINT8 key_size; member in struct:__anon1037
|
/external/libpng/ |
H A D | pngpread.c | 1358 png_size_t text_size, key_size; local 1398 key_size = text - key; 1421 - png_ptr->zstream.avail_out + key_size + 1)); 1423 png_memcpy(text + key_size, png_ptr->zbuf, 1426 png_memcpy(text, key, key_size); 1428 text_size = key_size + png_ptr->zbuf_size - 1480 text += key_size;
|
/external/qemu/distrib/libpng-1.2.19/ |
H A D | pngpread.c | 1207 png_size_t text_size, key_size; local 1247 key_size = text - key; 1270 + key_size + 1)); 1271 png_memcpy(text + key_size, png_ptr->zbuf, 1273 png_memcpy(text, key, key_size); 1274 text_size = key_size + png_ptr->zbuf_size - 1322 text += key_size;
|
/external/chromium/net/disk_cache/ |
H A D | entry_impl.h | 136 static int NumBlocksForEntry(int key_size);
|
H A D | entry_impl.cc | 724 int EntryImpl::NumBlocksForEntry(int key_size) { argument 729 if (key_size < key1_len || key_size > kMaxInternalKeyLength) 732 return ((key_size - key1_len) / 256 + 2);
|