Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 137) sorted by relevance

123456

/external/boringssl/src/crypto/hmac_extra/
Dhmac_tests.txt27 Input = "Sample message for keylen=blocklen"
32 Input = "Sample message for keylen<blocklen"
37 Input = "Sample message for keylen=blocklen"
42 Input = "Sample message for keylen=blocklen"
47 Input = "Sample message for keylen<blocklen"
52 Input = "Sample message for keylen=blocklen"
57 Input = "Sample message for keylen=blocklen"
62 Input = "Sample message for keylen<blocklen"
67 Input = "Sample message for keylen=blocklen"
72 Input = "Sample message for keylen=blocklen"
[all …]
/external/mdnsresponder/mDNSShared/
Ddnssd_clientlib.c76 unsigned long *keylen in InternalTXTRecordSearch() argument
81 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch()
86 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch()
87 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch()
252 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local
253 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue()
279 unsigned long keylen; in TXTRecordContainsKey() local
280 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey()
291 unsigned long keylen; in TXTRecordGetValuePtr() local
292 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr()
[all …]
/external/python/cpython3/Modules/_blake2/impl/
Dblake2.h123 … blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen );
129 … blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen );
135 …lake2sp_init_key( blake2sp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen );
140 …lake2bp_init_key( blake2bp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen );
145 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen );
146 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen );
148 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen );
149 …out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen );
151 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2() argument
153 return blake2b( out, in, key, outlen, inlen, keylen ); in blake2()
Dblake2s.c211 int blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen in blake2s_init_key() argument
216 keylen, in blake2s_init_key()
230 if ( ( !key ) || ( !keylen ) || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key()
238 memcpy( block, key, keylen ); in blake2s_init_key()
367 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2s() argument
376 if ( NULL == key && keylen > 0) return -1; in blake2s()
380 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s()
382 if( keylen > 0 ) in blake2s()
384 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
Dblake2s-ref.c187 int blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen in blake2s_init_key() argument
193 if ( !key || !keylen || keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s_init_key()
196 P->key_length = keylen; in blake2s_init_key()
212 memcpy( block, key, keylen ); in blake2s_init_key()
343 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2s() argument
352 if ( NULL == key && keylen > 0) return -1; in blake2s()
356 if( keylen > BLAKE2S_KEYBYTES ) return -1; in blake2s()
358 if( keylen > 0 ) in blake2s()
360 if( blake2s_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2s()
Dblake2b-ref.c194 int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen in blake2b_init_key() argument
200 if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key()
203 P->key_length = keylen; in blake2b_init_key()
219 memcpy( block, key, keylen ); in blake2b_init_key()
353 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2b() argument
362 if( NULL == key && keylen > 0 ) return -1; in blake2b()
366 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b()
368 if( keylen > 0 ) in blake2b()
370 if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2b()
Dblake2b.c225 int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen in blake2b_init_key() argument
230 keylen, in blake2b_init_key()
244 if ( ( !keylen ) || keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b_init_key()
252 memcpy( block, key, keylen ); in blake2b_init_key()
386 …*out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) in blake2b() argument
395 if( NULL == key && keylen > 0 ) return -1; in blake2b()
399 if( keylen > BLAKE2B_KEYBYTES ) return -1; in blake2b()
401 if( keylen ) in blake2b()
403 if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1; in blake2b()
/external/openssh/openbsd-compat/
Dbcrypt_pbkdf.c112 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
121 size_t origkeylen = keylen; in bcrypt_pbkdf()
126 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf()
131 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
132 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
140 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
163 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
170 keylen -= i; in bcrypt_pbkdf()
/external/e2fsprogs/lib/ext2fs/
Dtdbtool.c207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in insert_tdb() argument
211 if ((keyname == NULL) || (keylen == 0)) { in insert_tdb()
217 key.dsize = keylen; in insert_tdb()
226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) in store_tdb() argument
230 if ((keyname == NULL) || (keylen == 0)) { in store_tdb()
241 key.dsize = keylen; in store_tdb()
253 static void show_tdb(char *keyname, size_t keylen) in show_tdb() argument
257 if ((keyname == NULL) || (keylen == 0)) { in show_tdb()
263 key.dsize = keylen; in show_tdb()
278 static void delete_tdb(char *keyname, size_t keylen) in delete_tdb() argument
[all …]
/external/libdrm/intel/
Duthash.h114 #define HASH_VALUE(keyptr,keylen,hashv) \ argument
116 HASH_FCN(keyptr, keylen, hashv); \
119 #define HASH_FIND_BYHASHVALUE(hh,head,keyptr,keylen,hashval,out) \ argument
126 …HASH_FIND_IN_BKT((head)->hh.tbl, hh, (head)->hh.tbl->buckets[ _hf_bkt ], keyptr, keylen, hashval, …
131 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument
134 HASH_VALUE(keyptr, keylen, _hf_hashv); \
135 HASH_FIND_BYHASHVALUE(hh, head, keyptr, keylen, _hf_hashv, out); \
238 (add)->hh.keylen = (unsigned) (keylen_in); \
289 (add)->hh.keylen = (unsigned) (keylen_in); \
477 #define HASH_BER(key,keylen,hashv) \ argument
[all …]
/external/vboot_reference/tests/
Dvb2_rsa_tests.sh19 for keylen in ${key_lengths[@]}
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
Drun_rsa_tests.sh19 for keylen in ${key_lengths[@]}
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
25 ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
Drun_vbutil_tests.sh16 local keylen=$2
19 echo -e "For signing key ${COL_YELLOW}RSA-$keylen/$hashalgo${COL_STOP}:"
23 --key ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
43 for keylen in ${key_lengths[@]}
47 test_vbutil_key_single $algorithmcounter $keylen $hashalgo
Dgen_test_vbpubks.sh14 for keylen in ${key_lengths[@]}
19 --in ${TESTKEY_DIR}/key_rsa${keylen}.keyb \
20 --out ${TESTKEY_DIR}/key_rsa${keylen}.${hashalgo}.vbpubk \
Dgen_test_cases.sh20 for keylen in ${key_lengths[@]}
28 -sign -pkcs -inkey ${TESTKEY_DIR}/key_rsa${keylen}.pem \
29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
/external/curl/lib/
Dhmac.c53 unsigned int keylen) in Curl_HMAC_init() argument
74 if(keylen > hashparams->hmac_maxkeylen) { in Curl_HMAC_init()
76 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); in Curl_HMAC_init()
80 keylen = hashparams->hmac_resultlen; in Curl_HMAC_init()
87 for(i = 0; i < keylen; i++) { in Curl_HMAC_init()
/external/pdfium/core/fpdfapi/parser/
Dcpdf_security_handler.cpp32 int keylen, in CalcEncryptKey() argument
58 uint32_t copy_len = keylen; in CalcEncryptKey()
65 memset(key, 0, keylen); in CalcEncryptKey()
69 bool IsValidKeyLengthForCipher(int cipher, int keylen) { in IsValidKeyLengthForCipher() argument
72 return keylen == 16 || keylen == 24 || keylen == 32; in IsValidKeyLengthForCipher()
74 return keylen == 32; in IsValidKeyLengthForCipher()
76 return keylen >= 5 && keylen <= 16; in IsValidKeyLengthForCipher()
128 int& keylen) { in LoadCryptInfo() argument
131 keylen = 0; in LoadCryptInfo()
156 keylen = nKeyBits / 8; in LoadCryptInfo()
[all …]
Dcpdf_crypto_handler.cpp400 int keylen) in CPDF_CryptoHandler() argument
401 : m_KeyLen(std::min(keylen, 32)), m_Cipher(cipher) { in CPDF_CryptoHandler()
402 ASSERT(cipher != FXCIPHER_AES || keylen == 16 || keylen == 24 || in CPDF_CryptoHandler()
403 keylen == 32); in CPDF_CryptoHandler()
404 ASSERT(cipher != FXCIPHER_AES2 || keylen == 32); in CPDF_CryptoHandler()
405 ASSERT(cipher != FXCIPHER_RC4 || (keylen >= 5 && keylen <= 16)); in CPDF_CryptoHandler()
/external/cn-cbor/src/
Dcn-get.c31 int keylen; in cn_cbor_mapget_string() local
34 keylen = strlen(key); in cn_cbor_mapget_string()
39 if (keylen != cp->length) { in cn_cbor_mapget_string()
42 if (memcmp(key, cp->v.str, keylen) == 0) { in cn_cbor_mapget_string()
/external/kmod/shared/
Dhash.c148 unsigned int keylen = strlen(key); in hash_add() local
149 unsigned int hashval = hash_superfast(key, keylen); in hash_add()
191 unsigned int keylen = strlen(key); in hash_add_unique() local
192 unsigned int hashval = hash_superfast(key, keylen); in hash_add_unique()
236 unsigned int keylen = strlen(key); in hash_find() local
237 unsigned int hashval = hash_superfast(key, keylen); in hash_find()
254 unsigned int keylen = strlen(key); in hash_del() local
255 unsigned int hashval = hash_superfast(key, keylen); in hash_del()
/external/u-boot/drivers/crypto/fsl/
Dfsl_rsa.c21 uint32_t keylen; in fsl_mod_exp() local
27 keylen = prop->num_bits / 8; in fsl_mod_exp()
32 pkin.n_siz = keylen; in fsl_mod_exp()
/external/ipsec-tools/src/racoon/
Dlocalconf.c183 size_t keylen; local
216 keylen = 0;
218 keylen++;
223 k = str2val(p + 2, 16, &keylen);
232 key = vmalloc(keylen);
/external/tcpdump/tests/
Dikev2four.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
49 (t: #1 type=encr id=aes (type=keylen value=0080))
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_kay.c296 size_t keylen; in ieee802_1x_auth_get_msk() local
304 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk()
305 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk()
312 if (keylen > *len) in ieee802_1x_auth_get_msk()
313 keylen = *len; in ieee802_1x_auth_get_msk()
314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
315 *len = keylen; in ieee802_1x_auth_get_msk()
/external/llvm/test/Transforms/IndVarSimplify/
Dexit_value_test2.ll27 %keylen.010 = phi i32 [ %len, %while.body.lr.ph ], [ %sub, %while.body ]
38 %sub = add i32 %keylen.010, -12
47 %keylen.0.lcssa = phi i32 [ %sub.lcssa, %while.cond.while.end_crit_edge ], [ %len, %entry ]
48 call void @_Z3mixRjj(i32* dereferenceable(4) %a, i32 %keylen.0.lcssa)

123456