/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | externalhmac.h | 64 int key_length; member in struct:__anon12695
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | hmac.h | 150 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/chromium_org/crypto/ |
H A D | hmac_openssl.cc | 29 bool HMAC::Init(const unsigned char* key, size_t key_length) { argument 33 plat_->key.assign(key, key + key_length); 34 if (key_length == 0) {
|
H A D | hmac_nss.cc | 42 bool HMAC::Init(const unsigned char *key, size_t key_length) { argument 60 key_item.len = key_length;
|
H A D | hmac_win.cc | 112 bool HMAC::Init(const unsigned char* key, size_t key_length) { argument 120 plat_->raw_key_.assign(key, key + key_length); 142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 150 key_blob->key_size = static_cast<DWORD>(key_length); 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
/external/openssl/crypto/hmac/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/chromium_org/net/disk_cache/simple/ |
H A D | simple_entry_format_history.h | 40 uint32 key_length; member in struct:disk_cache::simplecache_v5::SimpleFileHeader
|
H A D | simple_entry_format.h | 44 uint32 key_length; member in struct:disk_cache::SimpleFileHeader
|
/external/chromium_org/third_party/mt19937ar/ |
H A D | mt19937ar.cc | 6 or init_by_array(init_key, key_length). 77 /* key_length is its length */ 79 void MersenneTwister::init_by_array(uint32 init_key[], int key_length) argument 84 k = (N>key_length ? N : key_length); 91 if (j>=key_length) j=0;
|
/external/chromium_org/media/blink/ |
H A D | null_encrypted_media_player_support.cc | 37 unsigned key_length, 34 AddKey( const blink::WebString& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const blink::WebString& session_id) argument
|
H A D | webmediaplayer_impl.cc | 649 unsigned key_length, 656 key_system, key, key_length, init_data, init_data_length, session_id); 646 addKey( const WebString& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const WebString& session_id) argument
|
/external/chromium_org/ui/base/accelerators/ |
H A D | accelerator.cc | 253 int key_length = static_cast<int>(shortcut_rtl.length()); local 254 DCHECK_GT(key_length, 0); 258 shortcut_rtl.append(shortcut, 0, shortcut.length() - key_length - 1);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/chromium_org/content/renderer/media/crypto/ |
H A D | proxy_decryptor.cc | 154 int key_length, 199 media::GenerateJWKSet(key, key_length, init_data, init_data_length); 208 media_keys_->UpdateSession(session_id, key, key_length, promise.Pass()); 153 AddKey(const uint8* key, int key_length, const uint8* init_data, int init_data_length, const std::string& web_session_id) argument
|
H A D | encrypted_media_player_support_impl.cc | 221 unsigned key_length, 227 static_cast<size_t>(key_length)) << ", " 238 key_length, 250 unsigned key_length, 255 DCHECK_GT(key_length, 0u); 264 key, key_length, init_data, init_data_length, session_id); 218 AddKey( const WebString& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const WebString& session_id) argument 247 AddKeyInternal( const std::string& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const std::string& session_id) argument
|
/external/chromium_org/media/cdm/ |
H A D | json_web_key.cc | 64 std::string GenerateJWKSet(const uint8* key, int key_length, argument 67 std::string key_base64 = EncodeBase64(key, key_length);
|
/external/chromium_org/net/base/registry_controlled_domains/ |
H A D | registry_controlled_domain.cc | 143 size_t key_length) { 147 const char* key_end = key + key_length; 142 LookupString(const unsigned char* graph, size_t length, const char* key, size_t key_length) argument
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
H A D | memtable.cc | 123 uint32_t key_length; local 124 const char* key_ptr = GetVarint32Ptr(entry, entry+5, &key_length); 126 Slice(key_ptr, key_length - 8), 129 const uint64_t tag = DecodeFixed64(key_ptr + key_length - 8); 132 Slice v = GetLengthPrefixedSlice(key_ptr + key_length);
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
H A D | cache.cc | 32 size_t key_length; member in struct:leveldb::__anon12466::LRUHandle 43 return Slice(key_data, key_length); 235 e->key_length = key.size();
|
/external/jemalloc/test/src/ |
H A D | SFMT.c | 636 * @param key_length the length of init_key. 638 sfmt_t *init_by_array(uint32_t *init_key, int key_length) { argument 666 if (key_length + 1 > N32) { 667 count = key_length + 1; 674 r += key_length; 679 for (i = 1, j = 0; (j < count) && (j < key_length); j++) {
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
H A D | srtp.c | 427 static INLINE int base_key_length(const cipher_type_t *cipher, int key_length) argument 430 return key_length; 431 else if (key_length > 16 && key_length < 30) 433 return key_length - 14;
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_storage.c | 966 UINT8 key_length) 991 int ret = btif_config_set("Remote", bdstr, name, (const char*)key, (int)key_length, BTIF_CFG_TYPE_BIN); 1009 int key_length) 1035 int ret = btif_config_get("Remote", bdstr, name, key_value, &key_length, &type); 1082 uint8_t key_length) 1102 int ret = btif_config_set("Local", "Adapter", name, (const char*)key, key_length, BTIF_CFG_TYPE_BIN); 1119 int key_length) 1140 int ret = btif_config_get("Local", "Adapter", name, key_value, &key_length, &type); 963 btif_storage_add_ble_bonding_key(bt_bdaddr_t *remote_bd_addr, char *key, UINT8 key_type, UINT8 key_length) argument 1006 btif_storage_get_ble_bonding_key(bt_bdaddr_t *remote_bd_addr, UINT8 key_type, char *key_value, int key_length) argument 1080 btif_storage_add_ble_local_key(char *key, uint8_t key_type, uint8_t key_length) argument 1117 btif_storage_get_ble_local_key(UINT8 key_type, char *key_value, int key_length) argument
|