Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 129) sorted by relevance

123456

/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
Dsctp_auth.c247 sctp_alloc_key(uint32_t keylen) in sctp_alloc_key() argument
251 SCTP_MALLOC(new_key, sctp_key_t *, sizeof(*new_key) + keylen, in sctp_alloc_key()
257 new_key->keylen = keylen; in sctp_alloc_key()
277 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_print_key()
278 if (key->keylen) { in sctp_print_key()
279 for (i = 0; i < key->keylen; i++) in sctp_print_key()
296 SCTP_PRINTF("%s: len %u, ", str, key->keylen); in sctp_show_key()
297 if (key->keylen) { in sctp_show_key()
298 for (i = 0; i < key->keylen; i++) in sctp_show_key()
310 return (key->keylen); in sctp_get_keylen()
[all …]
Dsctp_auth.h61 uint32_t keylen; member
127 extern sctp_key_t *sctp_alloc_key(uint32_t keylen);
131 extern sctp_key_t *sctp_generate_random_key(uint32_t keylen);
132 extern sctp_key_t *sctp_set_key(uint8_t *key, uint32_t keylen);
169 extern uint32_t sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
171 extern int sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
178 extern uint32_t sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
/external/openssl/crypto/cms/
Dcms_enc.c160 ec->keylen = tkeylen; in DECLARE_ASN1_ITEM()
169 if (ec->keylen != tkeylen) in DECLARE_ASN1_ITEM()
172 if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) in DECLARE_ASN1_ITEM()
186 OPENSSL_cleanse(ec->key, ec->keylen); in DECLARE_ASN1_ITEM()
189 ec->keylen = tkeylen; in DECLARE_ASN1_ITEM()
224 OPENSSL_cleanse(ec->key, ec->keylen); in DECLARE_ASN1_ITEM()
241 const unsigned char *key, size_t keylen) in cms_EncryptedContent_init() argument
246 ec->key = OPENSSL_malloc(keylen); in cms_EncryptedContent_init()
249 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init()
251 ec->keylen = keylen; in cms_EncryptedContent_init()
[all …]
Dcms_env.c336 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt()
348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt()
425 OPENSSL_cleanse(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt()
430 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt()
482 unsigned char *key, size_t keylen, in CMS_add0_recipient_key() argument
497 switch (keylen) in CMS_add0_recipient_key()
530 if (keylen != exp_keylen) in CMS_add0_recipient_key()
567 kekri->keylen = keylen; in CMS_add0_recipient_key()
631 unsigned char *key, size_t keylen) in CMS_RecipientInfo_set0_key() argument
642 kekri->keylen = keylen; in CMS_RecipientInfo_set0_key()
[all …]
Dcms_pwri.c335 size_t keylen; in cms_RecipientInfo_pwri_crypt() local
406 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, &kekctx)) in cms_RecipientInfo_pwri_crypt()
409 key = OPENSSL_malloc(keylen); in cms_RecipientInfo_pwri_crypt()
414 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, &kekctx)) in cms_RecipientInfo_pwri_crypt()
417 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt()
429 if (!kek_unwrap_key(key, &keylen, in cms_RecipientInfo_pwri_crypt()
439 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c76 unsigned long *keylen in InternalTXTRecordSearch() argument
81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch()
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch()
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch()
252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue()
279 unsigned long keylen; in TXTRecordContainsKey() local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey()
291 unsigned long keylen; in TXTRecordGetValuePtr() local
292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr()
[all …]
Ddnsextd_parser.y483 mDNSs32 keylen; in ParseConfig() local
490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig()
491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
517 mDNSs32 keylen; in ParseConfig() local
524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig()
525 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
/external/chromium_org/third_party/smhasher/src/
DKeysetTest.cpp230 for(int keylen = 2; keylen <= maxlen; keylen++) in TwoBytesKeygen() local
231 for(int byteA = 0; byteA < keylen; byteA++) in TwoBytesKeygen()
237 c(key,keylen); in TwoBytesKeygen()
246 for(int keylen = 2; keylen <= maxlen; keylen++) in TwoBytesKeygen() local
247 for(int byteA = 0; byteA < keylen-1; byteA++) in TwoBytesKeygen()
248 for(int byteB = byteA+1; byteB < keylen; byteB++) in TwoBytesKeygen()
257 c(key,keylen); in TwoBytesKeygen()
/external/openssl/crypto/evp/
Dp5_crpt2.c83 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC() argument
96 tkeylen = keylen; in PKCS5_PBKDF2_HMAC()
164 h__dump (out, keylen); in PKCS5_PBKDF2_HMAC()
171 int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument
174 keylen, out); in PKCS5_PBKDF2_HMAC_SHA1()
260 unsigned int keylen = 0; in PKCS5_v2_PBKDF2_keyivgen() local
270 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen()
271 OPENSSL_assert(keylen <= sizeof key); in PKCS5_v2_PBKDF2_keyivgen()
289 keylen = EVP_CIPHER_CTX_key_length(ctx); in PKCS5_v2_PBKDF2_keyivgen()
293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen()
[all …]
De_aes.c416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument
417 static const EVP_CIPHER aesni_##keylen##_##mode = { \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
425 static const EVP_CIPHER aes_##keylen##_##mode = { \
426 nid##_##keylen##_##nmode,blocksize, \
427 keylen/8,ivlen, \
434 const EVP_CIPHER *EVP_aes_##keylen##_##mode(void) \
435 { return AESNI_CAPABLE?&aesni_##keylen##_##mode:&aes_##keylen##_##mode; }
437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ argument
438 static const EVP_CIPHER aesni_##keylen##_##mode = { \
[all …]
/external/e2fsprogs/lib/ext2fs/
Dtdbtool.c206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument
210 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb()
216 key.dsize = keylen; in insert_tdb()
225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument
229 if ((keyname == NULL) || (keylen == 0)) { in store_tdb()
240 key.dsize = keylen; in store_tdb()
252 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument
256 if ((keyname == NULL) || (keylen == 0)) { in show_tdb()
262 key.dsize = keylen; in show_tdb()
277 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument
[all …]
/external/openssl/crypto/asn1/
Dp5_pbev2.c94 int alg_nid, keylen; variable
150 keylen = EVP_CIPHER_key_length(cipher);
152 keylen = -1;
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
201 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument
235 if(keylen > 0) in PKCS5_pbkdf2_set()
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
/external/openssl/crypto/aes/
Daes_wrap.c146 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument
151 otmp = OPENSSL_malloc(keylen + 8); in AES_wrap_unwrap_test()
152 ptmp = OPENSSL_malloc(keylen); in AES_wrap_unwrap_test()
157 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test()
161 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test()
168 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c118 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local
172 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv()
174 keylen = -1; in PKCS5_pbe2_set_iv()
180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv()
223 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument
257 if(keylen > 0) in PKCS5_pbkdf2_set()
261 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
/external/chromium_org/third_party/boringssl/src/crypto/evp/
Dp_ec.c207 size_t *keylen) { in pkey_ec_derive() argument
224 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive()
232 outlen = *keylen; in pkey_ec_derive()
238 *keylen = ret; in pkey_ec_derive()
243 size_t *keylen) { in pkey_ec_kdf_derive() argument
250 return pkey_ec_derive(ctx, key, keylen); in pkey_ec_kdf_derive()
253 *keylen = dctx->kdf_outlen; in pkey_ec_kdf_derive()
256 if (*keylen != dctx->kdf_outlen || in pkey_ec_kdf_derive()
268 if (!ECDH_KDF_X9_62(key, *keylen, ktmp, ktmplen, dctx->kdf_ukm, in pkey_ec_kdf_derive()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_kay.c279 size_t keylen; in ieee802_1x_auth_get_msk() local
287 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk()
288 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk()
295 if (keylen > *len) in ieee802_1x_auth_get_msk()
296 keylen = *len; in ieee802_1x_auth_get_msk()
297 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
298 *len = keylen; in ieee802_1x_auth_get_msk()
/external/ipsec-tools/src/racoon/
Dlocalconf.c183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
/external/pdfium/core/src/fpdfapi/fpdf_parser/
Dfpdf_parser_encrypt.cpp17 FX_LPBYTE key, int keylen, FX_BOOL bIgnoreMeta, CPDF_Array* pIdArray) in CalcEncryptKey() argument
41 FX_DWORD copy_len = keylen; in CalcEncryptKey()
50 FXSYS_memset32(key, 0, keylen); in CalcEncryptKey()
106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen) in _LoadCryptInfo() argument
111 keylen = 0; in _LoadCryptInfo()
136 keylen = nKeyBits / 8; in _LoadCryptInfo()
143 keylen = Version > 1 ? pEncryptDict->GetInteger(FX_BSTRC("Length"), 40) / 8 : 5; in _LoadCryptInfo()
145 if (keylen > 32 || keylen < 0) { in _LoadCryptInfo()
193 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) in GetCryptInfo() argument
197 keylen = m_KeyLen; in GetCryptInfo()
[all …]
/external/tcpdump/tests/
Dikev2four.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv4.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
/external/openssl/crypto/cmac/
Dcm_pmeth.c180 long keylen; in pkey_cmac_ctrl_str() local
181 key = string_to_hex(value, &keylen); in pkey_cmac_ctrl_str()
184 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key); in pkey_cmac_ctrl_str()
/external/chromium_org/third_party/libusb/src/libusb/os/
Dlinux_netlink.c182 size_t keylen = strlen(key); in netlink_message_parse() local
186 if (0 == strncmp(buffer + offset, key, keylen) && in netlink_message_parse()
187 '=' == buffer[offset + keylen]) { in netlink_message_parse()
188 return buffer + offset + keylen + 1; in netlink_message_parse()
/external/openssl/crypto/ec/
Dec_pmeth.c170 static int pkey_ec_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen) in pkey_ec_derive() argument
185 *keylen = (EC_GROUP_get_degree(group) + 7)/8; in pkey_ec_derive()
195 outlen = *keylen; in pkey_ec_derive()
200 *keylen = ret; in pkey_ec_derive()
/external/pdfium/core/src/fdrm/crypto/
Dfx_crypt_aes.cpp878 const unsigned char *key, int keylen) in aes_setup() argument
882 ASSERT(keylen == 16 || keylen == 24 || keylen == 32); in aes_setup()
883 Nk = keylen / 4; in aes_setup()
992 void CRYPT_AESSetKey(FX_LPVOID context, FX_DWORD blocklen, FX_LPCBYTE key, FX_DWORD keylen, FX_BOOL… in CRYPT_AESSetKey() argument
994 aes_setup((AESContext*)context, blocklen, key, keylen); in CRYPT_AESSetKey()

123456