/external/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 16 size_t keylen; member in struct:__anon30329
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
H A D | crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon33587::__anon33588 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
H A D | crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon33840::__anon33841 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 31 if (kpos >= keylen)
|
H A D | crypto_internal-cipher.c | 23 size_t keylen; member in struct:crypto_cipher::__anon34091::__anon34092 61 ctx->u.rc4.keylen = key_len; 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
H A D | ACBTree.h | 55 NSInteger keylen; /* length of key */ variable 71 @property (assign) NSInteger keylen; variable
|
/external/ipsec-tools/src/racoon/ |
H A D | localconf.c | 183 size_t keylen; local 216 keylen = 0; 218 keylen++; 223 k = str2val(p + 2, 16, &keylen); 232 key = vmalloc(keylen);
|
H A D | privsep.c | 469 int keylen; local 476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { 481 memcpy(&keylen, bufs[1], sizeof(keylen)); 484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 890 privsep_getpsk(str, keylen) 892 int keylen; 901 return getpsk(str, keylen); 903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen); [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_enc.c | 160 ec->keylen = tkeylen; 169 if (ec->keylen != tkeylen) 172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) 186 OPENSSL_cleanse(ec->key, ec->keylen); 189 ec->keylen = tkeylen; 224 OPENSSL_cleanse(ec->key, ec->keylen); 241 const unsigned char *key, size_t keylen) 246 ec->key = OPENSSL_malloc(keylen); 249 memcpy(ec->key, key, keylen); 251 ec->keylen 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument 257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument [all...] |
H A D | cms_pwri.c | 335 size_t keylen; local 406 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) 409 key = OPENSSL_malloc(keylen); 414 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) 417 pwri->encryptedKey->length = keylen; 429 if (!kek_unwrap_key(key, &keylen, 439 ec->keylen = keylen; [all...] |
/external/openssl/crypto/evp/ |
H A D | pmeth_gn.c | 202 const unsigned char *key, int keylen) 213 keylen, (void *)key) <= 0) 201 EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen) argument
|
H A D | evp_enc.c | 603 int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) argument 606 return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL); 607 if(c->key_len == keylen) return 1; 608 if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) 610 c->key_len = keylen;
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbev2.c | 118 int alg_nid, keylen; local 172 keylen = EVP_CIPHER_key_length(cipher); 174 keylen = -1; 180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 223 int prf_nid, int keylen) 257 if(keylen > 0) 261 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) 222 PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, int keylen) argument
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
H A D | linux_netlink.c | 182 size_t keylen = strlen(key); local 186 if (0 == strncmp(buffer + offset, key, keylen) && 187 '=' == buffer[offset + keylen]) { 188 return buffer + offset + keylen + 1;
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.h | 61 uint32_t keylen; member in struct:sctp_key 127 extern sctp_key_t *sctp_alloc_key(uint32_t keylen); 131 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen); 132 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen); 169 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 171 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, 178 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
/external/openssl/crypto/aes/ |
H A D | aes_wrap.c | 146 const unsigned char *key, int keylen) 151 otmp = OPENSSL_malloc(keylen + 8); 152 ptmp = OPENSSL_malloc(keylen); 157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); 161 if (eout && memcmp(eout, otmp, keylen)) 168 if (memcmp(key, ptmp, keylen)) 143 AES_wrap_unwrap_test(const unsigned char *kek, int keybits, const unsigned char *iv, const unsigned char *eout, const unsigned char *key, int keylen) argument
|
/external/openssl/crypto/cmac/ |
H A D | cm_pmeth.c | 180 long keylen; local 181 key = string_to_hex(value, &keylen); 184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
H A D | cmac.c | 152 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, argument 171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL); 175 if (!key && !cipher && !impl && keylen == 0) 195 if (!EVP_CIPHER_CTX_set_key_length(&ctx->cctx, keylen))
|
/external/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 204 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 216 *keylen = ret;
|
/external/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) argument 185 *keylen = (EC_GROUP_get_degree(group) + 7)/8; 195 outlen = *keylen; 200 *keylen = ret;
|
/external/openssl/crypto/hmac/ |
H A D | hm_pmeth.c | 227 long keylen; local 228 key = string_to_hex(value, &keylen); 231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | p_ec.c | 207 size_t *keylen) { 224 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; 232 outlen = *keylen; 238 *keylen = ret; 243 size_t *keylen) { 250 return pkey_ec_derive(ctx, key, keylen); 253 *keylen = dctx->kdf_outlen; 256 if (*keylen != dctx->kdf_outlen || 268 if (!ECDH_KDF_X9_62(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm, 206 pkey_ec_derive(EVP_PKEY_CTX *ctx, uint8_t *key, size_t *keylen) argument 242 pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, uint8_t *key, size_t *keylen) argument
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnssd_clientlib.c | 76 unsigned long *keylen 81 *keylen = (unsigned long) strlen(key); 86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) 87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 252 unsigned long keylen, itemlen, remainder; local 253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 279 unsigned long keylen; local 280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) 291 unsigned long keylen; local [all...] |