/external/openssl/crypto/evp/ |
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/ |
H A D | null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { argument 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len; 102 null_cipher_init(null_cipher_ctx_t *ctx, const uint8_t *key, int key_len) { argument
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/ |
H A D | cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
H A D | aes_calc.c | 73 int key_len, len; local 110 key_len = len/2; 136 status = aes_expand_encryption_key(key, key_len, &exp_key); 147 printf("key:\t\t%s\n", octet_string_hex_string(key, key_len));
|
/external/openssl/crypto/hmac/ |
H A D | hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/srtp/crypto/cipher/ |
H A D | null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { argument 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len;
|
/external/srtp/crypto/include/ |
H A D | cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (md5_vector(1, &key, &key_len, tk)) 47 key_len = 16; 61 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 95 * @key_len: Length of the key in bytes 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha1_vector(1, &key, &key_len, tk)) 47 key_len = 20; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (md5_vector(1, &key, &key_len, tk)) 47 key_len = 16; 61 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 95 * @key_len: Length of the key in bytes 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha1_vector(1, &key, &key_len, tk)) 47 key_len = 20; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (md5_vector(1, &key, &key_len, tk)) 47 key_len = 16; 61 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 95 * @key_len: Length of the key in bytes 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha1_vector(1, &key, &key_len, tk)) 47 key_len = 20; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | p256_key_exchange_openssl.cc | 59 int key_len = i2d_ECPrivateKey(key.get(), NULL); local 60 if (key_len <= 0) { 64 scoped_ptr<uint8[]> private_key(new uint8[key_len]); 70 return string(reinterpret_cast<char*>(private_key.get()), key_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | internal.h | 77 /* key_len contains the key size, in bytes, for the cipher. If the cipher 79 unsigned key_len; member in struct:evp_cipher_st 113 uint8_t key_len; member in struct:evp_aead_st 119 size_t key_len, size_t tag_len);
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/hash/ |
H A D | null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { argument 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) { argument
|