Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 90) sorted by relevance

1234

/external/boringssl/src/crypto/hmac/
Dhmac_tests.txt30 Input = "Sample message for keylen=blocklen"
35 Input = "Sample message for keylen<blocklen"
40 Input = "Sample message for keylen=blocklen"
45 Input = "Sample message for keylen=blocklen"
50 Input = "Sample message for keylen<blocklen"
55 Input = "Sample message for keylen=blocklen"
60 Input = "Sample message for keylen=blocklen"
65 Input = "Sample message for keylen<blocklen"
70 Input = "Sample message for keylen=blocklen"
75 Input = "Sample message for keylen=blocklen"
[all …]
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c76 unsigned long *keylen in InternalTXTRecordSearch() argument
81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch()
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch()
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch()
252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue()
279 unsigned long keylen; in TXTRecordContainsKey() local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey()
291 unsigned long keylen; in TXTRecordGetValuePtr() local
292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr()
[all …]
Ddnsextd_parser.y483 mDNSs32 keylen; in ParseConfig() local
490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig()
491 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
517 mDNSs32 keylen; in ParseConfig() local
524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); in ParseConfig()
525 if (keylen < 0) { free(authInfo); err = 1; goto exit; } in ParseConfig()
/external/openssh/openbsd-compat/
Dbcrypt_pbkdf.c110 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
119 size_t origkeylen = keylen; in bcrypt_pbkdf()
124 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
125 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf()
129 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
130 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
138 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
161 amt = MIN(amt, keylen); in bcrypt_pbkdf()
168 keylen -= i; in bcrypt_pbkdf()
/external/e2fsprogs/lib/ext2fs/
Dtdbtool.c206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument
210 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb()
216 key.dsize = keylen; in insert_tdb()
225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument
229 if ((keyname == NULL) || (keylen == 0)) { in store_tdb()
240 key.dsize = keylen; in store_tdb()
252 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument
256 if ((keyname == NULL) || (keylen == 0)) { in show_tdb()
262 key.dsize = keylen; in show_tdb()
277 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument
[all …]
/external/vboot_reference/tests/
Dvb2_rsa_tests.sh19 for keylen in ${key_lengths[@]}
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
Drun_rsa_tests.sh19 for keylen in ${key_lengths[@]}
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
Dgen_test_vbpubks.sh14 for keylen in ${key_lengths[@]}
19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
Drun_vbutil_tests.sh16 local keylen=$2
19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:"
23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
43 for keylen in ${key_lengths[@]}
47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
Dgen_test_cases.sh20 for keylen in ${key_lengths[@]}
28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \
29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
/external/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c119 int alg_nid, keylen; in PKCS5_pbe2_set_iv() local
173 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set_iv()
175 keylen = -1; in PKCS5_pbe2_set_iv()
181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv()
224 int prf_nid, int keylen) in PKCS5_pbkdf2_set() argument
258 if(keylen > 0) in PKCS5_pbkdf2_set()
262 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_kay.c279 size_t keylen; in ieee802_1x_auth_get_msk() local
287 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk()
288 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk()
295 if (keylen > *len) in ieee802_1x_auth_get_msk()
296 keylen = *len; in ieee802_1x_auth_get_msk()
297 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
298 *len = keylen; in ieee802_1x_auth_get_msk()
/external/pdfium/core/src/fpdfapi/fpdf_parser/
Dfpdf_parser_encrypt.cpp17 FX_LPBYTE key, int keylen, FX_BOOL bIgnoreMeta, CPDF_Array* pIdArray) in CalcEncryptKey() argument
41 FX_DWORD copy_len = keylen; in CalcEncryptKey()
50 FXSYS_memset32(key, 0, keylen); in CalcEncryptKey()
106 static FX_BOOL _LoadCryptInfo(CPDF_Dictionary* pEncryptDict, FX_BSTR name, int& cipher, int& keylen) in _LoadCryptInfo() argument
110 keylen = 0; in _LoadCryptInfo()
135 keylen = nKeyBits / 8; in _LoadCryptInfo()
142 keylen = Version > 1 ? pEncryptDict->GetInteger(FX_BSTRC("Length"), 40) / 8 : 5; in _LoadCryptInfo()
144 if (keylen > 32 || keylen < 0) { in _LoadCryptInfo()
192 FX_BOOL CPDF_StandardSecurityHandler::GetCryptInfo(int& cipher, FX_LPCBYTE& buffer, int& keylen) in GetCryptInfo() argument
196 keylen = m_KeyLen; in GetCryptInfo()
[all …]
/external/ipsec-tools/src/racoon/
Dlocalconf.c183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
Dprivsep.c469 int keylen; in privsep_init() local
476 if (combuf->bufs.buflen[1] != sizeof(keylen)) { in privsep_init()
481 memcpy(&keylen, bufs[1], sizeof(keylen)); in privsep_init()
484 "getpsk(\"%s\", %d)\n", bufs[0], keylen); in privsep_init()
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init()
890 privsep_getpsk(str, keylen) in privsep_getpsk() argument
892 int keylen;
901 return getpsk(str, keylen);
903 len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
918 msg->bufs.buflen[1] = sizeof(keylen);
[all …]
/external/tcpdump/tests/
Dikev2four.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv4.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
/external/openssh/
Dcipher.c297 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, in cipher_init() argument
307 if (keylen > 8) in cipher_init()
308 keylen = 8; in cipher_init()
314 if (keylen < cipher->key_len || in cipher_init()
320 return chachapoly_init(&cc->cp_ctx, key, keylen); in cipher_init()
324 aesctr_keysetup(&cc->ac_ctx, key, 8 * keylen, 8 * ivlen); in cipher_init()
346 if (klen > 0 && keylen != (u_int)klen) { in cipher_init()
347 if (EVP_CIPHER_CTX_set_key_length(&cc->evp, keylen) == 0) { in cipher_init()
/external/boringssl/src/crypto/evp/
Dp_ec.c168 size_t *keylen) { in pkey_ec_derive() argument
184 *keylen = (EC_GROUP_get_degree(group) + 7) / 8; in pkey_ec_derive()
192 outlen = *keylen; in pkey_ec_derive()
198 *keylen = ret; in pkey_ec_derive()
/external/pdfium/core/src/fdrm/crypto/
Dfx_crypt_aes.cpp878 const unsigned char *key, int keylen) in aes_setup() argument
882 ASSERT(keylen == 16 || keylen == 24 || keylen == 32); in aes_setup()
883 Nk = keylen / 4; in aes_setup()
992 void CRYPT_AESSetKey(FX_LPVOID context, FX_DWORD blocklen, FX_LPCBYTE key, FX_DWORD keylen, FX_BOOL… in CRYPT_AESSetKey() argument
994 aes_setup((AESContext*)context, blocklen, key, keylen); in CRYPT_AESSetKey()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c317 int keylen; in wpa_ft_install_ptk() local
330 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk()
333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk()
547 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local
571 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem()
580 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem()
589 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem()
592 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem()
596 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem()
605 gtk_elem + 3, rsc_len, gtk, keylen) < 0) { in wpa_ft_process_gtk_subelem()
/external/wpa_supplicant_8/src/crypto/
Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument
31 if (kpos >= keylen) in rc4_skip()
Dcrypto_internal-cipher.c23 size_t keylen; member
61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init()
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt()
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
/external/boringssl/src/include/openssl/
Dtls1.h325 #define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ argument
326 SSL_CTX_ctrl((ctx), SSL_CTRL_GET_TLSEXT_TICKET_KEYS, (keylen), (keys))
327 #define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ argument
328 SSL_CTX_ctrl((ctx), SSL_CTRL_SET_TLSEXT_TICKET_KEYS, (keylen), (keys))

1234