/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 259 * allocate structure space for a key of length keylen 262 sctp_alloc_key(uint32_t keylen) argument 266 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, 272 new_key->keylen = keylen; 292 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 293 if (key->keylen) { 294 for (i = 0; i < key->keylen; i++) 311 SCTP_PRINTF("%s: len %u, ", str, key->keylen); 312 if (key->keylen) { 334 sctp_generate_random_key(uint32_t keylen) argument 349 sctp_set_key(uint8_t *key, uint32_t keylen) argument 422 uint32_t keylen; local 960 sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest) argument 1020 sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, struct mbuf *m, uint32_t m_offset, uint8_t *digest, uint32_t trailer) argument 1103 sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen) argument 1457 uint32_t keylen; local 1997 uint16_t keylen; local 2087 sctp_test_hmac(const char *str, uint16_t hmac_id, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen) argument 2115 uint32_t keylen; local [all...] |
H A D | sctp_auth.h | 61 uint32_t keylen; member in struct:sctp_key 128 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 132 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 133 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 170 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 172 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 179 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
/external/openssl/crypto/cms/ |
H A D | cms_enc.c | 160 ec->keylen = tkeylen; 169 if (ec->keylen != tkeylen) 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 186 OPENSSL_cleanse(ec->key, ec->keylen); 189 ec->keylen = tkeylen; 224 OPENSSL_cleanse(ec->key, ec->keylen); 241 const unsigned char *key, size_t keylen) 246 ec->key = OPENSSL_malloc(keylen); 249 memcpy(ec->key, key, keylen); 251 ec->keylen 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
H A D | cms_env.c | 336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) 348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 425 OPENSSL_cleanse(ec->key, ec->keylen); 430 ec->keylen = eklen; 482 unsigned char *key, size_t keylen, 497 switch (keylen) 530 if (keylen != exp_keylen) 567 kekri->keylen = keylen; 631 unsigned char *key, size_t keylen) 481 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument 630 CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key, size_t keylen) argument [all...] |
H A D | cms_pwri.c | 334 size_t keylen; local 405 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) 408 key = OPENSSL_malloc(keylen); 413 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) 416 pwri->encryptedKey->length = keylen; 428 if (!kek_unwrap_key(key, &keylen, 438 ec->keylen = keylen; [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 147 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | e_aes.c | 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 417 static const EVP_CIPHER aesni_##keylen##_##mode = { \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 425 static const EVP_CIPHER aes_##keylen##_##mode = { \ 426 nid##_##keylen##_##nmode,blocksize, \ 427 keylen/8,ivlen, \ 434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ 435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen## [all...] |
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 164 h__dump (out, keylen); 171 int keylen, unsigned char *out) 174 keylen, out); 260 unsigned int keylen = 0; local 270 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 OPENSSL_assert(keylen <= sizeof key); 289 keylen = EVP_CIPHER_CTX_key_length(ctx); 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 169 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | e_aes.c | 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 417 static const EVP_CIPHER aesni_##keylen##_##mode = { \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 425 static const EVP_CIPHER aes_##keylen##_##mode = { \ 426 nid##_##keylen##_##nmode,blocksize, \ 427 keylen/8,ivlen, \ 434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \ 435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen## [all...] |
/external/mdnsresponder/mDNSShared/ |
H A D | dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) 291 unsigned long keylen; local [all...] |
/external/chromium_org/third_party/smhasher/src/ |
H A D | KeysetTest.cpp | 230 for(int keylen = 2; keylen <= maxlen; keylen++) 231 for(int byteA = 0; byteA < keylen; byteA++) 237 c(key,keylen); 246 for(int keylen = 2; keylen <= maxlen; keylen++) 247 for(int byteA = 0; byteA < keylen-1; byteA++) 248 for(int byteB = byteA+1; byteB < keylen; byte [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/cmac/ |
H A D | cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
H A D | cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
/external/openssl/crypto/cmac/ |
H A D | cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
H A D | cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/openssl/include/openssl/ |
H A D | cmac.h | 73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
/external/e2fsprogs/lib/ext2fs/ |
H A D | tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument 210 if ((keyname == NULL) || (keylen == 0)) { 216 key.dsize = keylen; 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument 229 if ((keyname == NULL) || (keylen == 0)) { 240 key.dsize = keylen; 252 static void show_tdb(char *keyname, size_t keylen) argument 256 if ((keyname == NULL) || (keylen == 0)) { 262 key.dsize = keylen; 277 static void delete_tdb(char *keyname, size_t keylen) argument 294 move_rec(char *keyname, size_t keylen, char* tdbname) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 94 int alg_nid, keylen; 150 keylen = EVP_CIPHER_key_length(cipher); 152 keylen = -1; 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 201 int prf_nid, int keylen) 235 if(keylen > 0) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 94 int alg_nid, keylen; 150 keylen = EVP_CIPHER_key_length(cipher); 152 keylen = -1; 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 201 int prf_nid, int keylen) 235 if(keylen > 0) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 279 size_t keylen; local 287 keylen = EAP_MSK_LEN; 288 res = eapol_sm_get_key(sm, key, keylen); 295 if (keylen > *len) 296 keylen = *len; 297 os_memcpy(msk, key, keylen); 298 *len = keylen;
|
/external/ipsec-tools/src/racoon/ |
H A D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|