/external/chromium_org/third_party/mt19937ar/ |
H A D | mt19937ar.h | 6 or init_by_array(init_key, key_length). 57 void init_by_array(uint32 init_key[], int key_length);
|
H A D | mt19937ar.cc | 6 or init_by_array(init_key, key_length). 77 /* key_length is its length */ 79 void MersenneTwister::init_by_array(uint32 init_key[], int key_length) argument 84 k = (N>key_length ? N : key_length); 91 if (j>=key_length) j=0;
|
/external/chromium_org/net/disk_cache/simple/ |
H A D | simple_entry_format_history.h | 40 uint32 key_length; member in struct:disk_cache::simplecache_v5::SimpleFileHeader
|
H A D | simple_entry_format.h | 44 uint32 key_length; member in struct:disk_cache::SimpleFileHeader
|
/external/chromium_org/crypto/ |
H A D | hmac_openssl.cc | 29 bool HMAC::Init(const unsigned char* key, size_t key_length) { argument 33 plat_->key.assign(key, key + key_length); 34 if (key_length == 0) {
|
H A D | hmac_win.cc | 112 bool HMAC::Init(const unsigned char* key, size_t key_length) { argument 120 plat_->raw_key_.assign(key, key + key_length); 142 size_t key_blob_size = std::max(offsetof(KeyBlob, key_data) + key_length, 150 key_blob->key_size = static_cast<DWORD>(key_length); 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
H A D | hmac.h | 39 // Initializes this instance using |key| of the length |key_length|. Call Init 49 bool Init(const unsigned char* key, size_t key_length) WARN_UNUSED_RESULT;
|
H A D | hmac_nss.cc | 42 bool HMAC::Init(const unsigned char *key, size_t key_length) { argument 60 key_item.len = key_length;
|
/external/chromium_org/third_party/boringssl/src/crypto/hmac/ |
H A D | hmac.c | 120 !EVP_DigestFinal_ex(&(ctx->md_ctx), ctx->key, &ctx->key_length)) { 126 ctx->key_length = key_len; 128 if (ctx->key_length != HMAC_MAX_MD_CBLOCK) { 129 memset(&ctx->key[ctx->key_length], 0, sizeof(ctx->key) - ctx->key_length); 192 dest->key_length = src->key_length;
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | externalhmac.h | 64 int key_length; member in struct:__anon12695
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
H A D | memtable.cc | 123 uint32_t key_length; local 124 const char* key_ptr = GetVarint32Ptr(entry, entry+5, &key_length); 126 Slice(key_ptr, key_length - 8), 129 const uint64_t tag = DecodeFixed64(key_ptr + key_length - 8); 132 Slice v = GetLengthPrefixedSlice(key_ptr + key_length);
|
/external/openssl/crypto/hmac/ |
H A D | hmac.c | 112 &ctx->key_length)) 119 ctx->key_length=len; 121 if(ctx->key_length != HMAC_MAX_MD_CBLOCK) 122 memset(&ctx->key[ctx->key_length], 0, 123 HMAC_MAX_MD_CBLOCK - ctx->key_length); 203 dctx->key_length = sctx->key_length;
|
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_storage.h | 321 uint8_t key_length); 325 int key_length); 329 uint8_t key_length);
|
/external/chromium_org/media/cdm/ |
H A D | json_web_key.h | 57 MEDIA_EXPORT std::string GenerateJWKSet(const uint8* key, int key_length,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | eapol_common.h | 66 /* Note: key_length is unaligned */ 67 u8 key_length[2]; member in struct:ieee802_1x_eapol_key 81 * key field (of key_length bytes) contains the key in encrypted form; 82 * if packet body length = 44, key field is absent and key_length
|
/external/chromium_org/content/renderer/media/crypto/ |
H A D | encrypted_media_player_support_impl.h | 42 unsigned key_length, 83 unsigned key_length,
|
H A D | encrypted_media_player_support_impl.cc | 221 unsigned key_length, 227 static_cast<size_t>(key_length)) << ", " 238 key_length, 250 unsigned key_length, 255 DCHECK_GT(key_length, 0u); 264 key, key_length, init_data, init_data_length, session_id); 218 AddKey( const WebString& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const WebString& session_id) argument 247 AddKeyInternal( const std::string& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const std::string& session_id) argument
|
/external/chromium_org/media/blink/ |
H A D | encrypted_media_player_support.h | 38 unsigned key_length,
|
H A D | null_encrypted_media_player_support.cc | 37 unsigned key_length, 34 AddKey( const blink::WebString& key_system, const unsigned char* key, unsigned key_length, const unsigned char* init_data, unsigned init_data_length, const blink::WebString& session_id) argument
|
H A D | null_encrypted_media_player_support.h | 34 unsigned key_length,
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | hmac.h | 150 unsigned int key_length; member in struct:hmac_ctx_st
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 81 unsigned int key_length; member in struct:hmac_ctx_st
|