Searched refs:keylen (Results 1 - 25 of 158) sorted by relevance

1234567

/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_auth.c244 * allocate structure space for a key of length keylen
247 sctp_alloc_key(uint32_t keylen) argument
251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen,
257 new_key->keylen = keylen;
277 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
278 if (key->keylen) {
279 for (i = 0; i < key->keylen; i++)
296 SCTP_PRINTF("%s: len %u, ", str, key->keylen);
297 if (key->keylen) {
319 sctp_generate_random_key(uint32_t keylen) argument
334 sctp_set_key(uint8_t *key, uint32_t keylen) argument
407 uint32_t keylen; local
945 sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest) argument
1005 sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, struct mbuf *m, uint32_t m_offset, uint8_t *digest, uint32_t trailer) argument
1088 sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen) argument
1442 uint32_t keylen; local
1982 uint16_t keylen; local
2072 sctp_test_hmac(const char *str, uint16_t hmac_id, uint8_t *key, uint32_t keylen, uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen) argument
2100 uint32_t keylen; local
[all...]
H A Dsctp_auth.h61 uint32_t keylen; member in struct:sctp_key
127 extern sctp_key_t *sctp_alloc_key(uint32_t keylen);
131 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen);
132 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen);
169 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
171 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
178 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
/external/openssl/crypto/cms/
H A Dcms_enc.c160 ec->keylen = tkeylen;
169 if (ec->keylen != tkeylen)
172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0)
186 OPENSSL_cleanse(ec->key, ec->keylen);
189 ec->keylen = tkeylen;
224 OPENSSL_cleanse(ec->key, ec->keylen);
241 const unsigned char *key, size_t keylen)
246 ec->key = OPENSSL_malloc(keylen);
249 memcpy(ec->key, key, keylen);
251 ec->keylen
239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
257 CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, const unsigned char *key, size_t keylen) argument
[all...]
H A Dcms_env.c336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
425 OPENSSL_cleanse(ec->key, ec->keylen);
430 ec->keylen = eklen;
482 unsigned char *key, size_t keylen,
497 switch (keylen)
530 if (keylen != exp_keylen)
567 kekri->keylen = keylen;
631 unsigned char *key, size_t keylen)
481 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument
630 CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, unsigned char *key, size_t keylen) argument
[all...]
H A Dcms_pwri.c335 size_t keylen; local
406 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx))
409 key = OPENSSL_malloc(keylen);
414 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx))
417 pwri->encryptedKey->length = keylen;
429 if (!kek_unwrap_key(key, &keylen,
439 ec->keylen = keylen;
[all...]
/external/openssl/crypto/evp/
H A Dp5_crpt2.c83 int keylen, unsigned char *out)
96 tkeylen = keylen;
164 h__dump (out, keylen);
171 int keylen, unsigned char *out)
174 keylen, out);
260 unsigned int keylen = 0; local
270 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 OPENSSL_assert(keylen <= sizeof key);
289 keylen = EVP_CIPHER_CTX_key_length(ctx);
293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
169 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
H A De_aes.c416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
417 static const EVP_CIPHER aesni_##keylen##_##mode = { \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
425 static const EVP_CIPHER aes_##keylen##_##mode = { \
426 nid##_##keylen##_##nmode,blocksize, \
427 keylen/8,ivlen, \
434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \
435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##
[all...]
/external/mdnsresponder/mDNSShared/
H A Ddnssd_clientlib.c76 unsigned long *keylen
81 *keylen = (unsigned long) strlen(key);
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen))
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
252 unsigned long keylen, itemlen, remainder; local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
279 unsigned long keylen; local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen)
291 unsigned long keylen; local
[all...]
/external/chromium_org/third_party/smhasher/src/
H A DKeysetTest.cpp230 for(int keylen = 2; keylen <= maxlen; keylen++)
231 for(int byteA = 0; byteA < keylen; byteA++)
237 c(key,keylen);
246 for(int keylen = 2; keylen <= maxlen; keylen++)
247 for(int byteA = 0; byteA < keylen-1; byteA++)
248 for(int byteB = byteA+1; byteB < keylen; byte
[all...]
/external/openssl/crypto/cmac/
H A Dcmac.h73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
H A Dcm_pmeth.c180 long keylen; local
181 key = string_to_hex(value, &keylen);
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
/external/openssl/include/openssl/
H A Dcmac.h73 int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
/external/e2fsprogs/lib/ext2fs/
H A Dtdbtool.c206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument
210 if ((keyname == NULL) || (keylen == 0)) {
216 key.dsize = keylen;
225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument
229 if ((keyname == NULL) || (keylen == 0)) {
240 key.dsize = keylen;
252 static void show_tdb(char *keyname, size_t keylen) argument
256 if ((keyname == NULL) || (keylen == 0)) {
262 key.dsize = keylen;
277 static void delete_tdb(char *keyname, size_t keylen) argument
294 move_rec(char *keyname, size_t keylen, char* tdbname) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
31 if (kpos >= keylen)
/external/wpa_supplicant_8/src/crypto/
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
31 if (kpos >= keylen)
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
31 if (kpos >= keylen)
/external/openssl/crypto/asn1/
H A Dp5_pbev2.c94 int alg_nid, keylen;
150 keylen = EVP_CIPHER_key_length(cipher);
152 keylen = -1;
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
201 int prf_nid, int keylen)
235 if(keylen > 0)
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
H A Dp5_pbev2.c118 int alg_nid, keylen; local
172 keylen = EVP_CIPHER_key_length(cipher);
174 keylen = -1;
180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
223 int prf_nid, int keylen)
257 if(keylen > 0)
261 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
222 PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, int keylen) argument
/external/chromium_org/third_party/boringssl/src/crypto/evp/
H A Dp_ec.c207 size_t *keylen) {
224 *keylen = (EC_GROUP_get_degree(group) + 7) / 8;
232 outlen = *keylen;
238 *keylen = ret;
243 size_t *keylen) {
250 return pkey_ec_derive(ctx, key, keylen);
253 *keylen = dctx->kdf_outlen;
256 if (*keylen != dctx->kdf_outlen ||
268 if (!ECDH_KDF_X9_62(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm,
206 pkey_ec_derive(EVP_PKEY_CTX *ctx, uint8_t *key, size_t *keylen) argument
242 pkey_ec_kdf_derive(EVP_PKEY_CTX *ctx, uint8_t *key, size_t *keylen) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c279 size_t keylen; local
287 keylen = EAP_MSK_LEN;
288 res = eapol_sm_get_key(sm, key, keylen);
295 if (keylen > *len)
296 keylen = *len;
297 os_memcpy(msk, key, keylen);
298 *len = keylen;
/external/ipsec-tools/src/racoon/
H A Dlocalconf.c183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
/external/chromium_org/third_party/leveldatabase/src/include/leveldb/
H A Dc.h82 const char* key, size_t keylen,
89 const char* key, size_t keylen,
103 const char* key, size_t keylen,
/external/openssl/crypto/hmac/
H A Dhm_pmeth.c227 long keylen; local
228 key = string_to_hex(value, &keylen);
231 r = pkey_hmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key);
/external/smack/src/org/xbill/DNS/
H A DTKEYRecord.java86 int keylen = in.readU16();
87 if (keylen > 0)
88 key = in.readByteArray(keylen);
/external/openssl/crypto/aes/
H A Daes_wrap.c146 const unsigned char *key, int keylen)
151 otmp = OPENSSL_malloc(keylen + 8);
152 ptmp = OPENSSL_malloc(keylen);
157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen);
161 if (eout && memcmp(eout, otmp, keylen))
168 if (memcmp(key, ptmp, keylen))
143 AES_wrap_unwrap_test(const unsigned char *kek, int keybits, const unsigned char *iv, const unsigned char *eout, const unsigned char *key, int keylen) argument

Completed in 5912 milliseconds

1234567