Home
last modified time | relevance | path

Searched refs:klen (Results 1 – 23 of 23) sorted by relevance

/external/boringssl/src/crypto/pem/
Dpem_pk8.c70 char *kstr, int klen, pem_password_cb *cb, void *u);
73 char *kstr, int klen, pem_password_cb *cb, void *u);
83 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey_nid() argument
86 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey_nid()
90 char *kstr, int klen, in PEM_write_bio_PKCS8PrivateKey() argument
93 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); in PEM_write_bio_PKCS8PrivateKey()
97 char *kstr, int klen, in i2d_PKCS8PrivateKey_bio() argument
100 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_bio()
104 char *kstr, int klen, in i2d_PKCS8PrivateKey_nid_bio() argument
107 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u); in i2d_PKCS8PrivateKey_nid_bio()
[all …]
Dpem_pkey.c100 int klen; in PEM_read_bio_PrivateKey() local
106 klen = 0; in PEM_read_bio_PrivateKey()
109 klen = cb(psbuf, PEM_BUFSIZE, 0, u); in PEM_read_bio_PrivateKey()
110 if (klen <= 0) { in PEM_read_bio_PrivateKey()
115 p8inf = PKCS8_decrypt(p8, psbuf, klen); in PEM_read_bio_PrivateKey()
148 unsigned char *kstr, int klen, in PEM_write_bio_PrivateKey() argument
151 return PEM_write_bio_PKCS8PrivateKey(bp, x, enc, (char *)kstr, klen, cb, u); in PEM_write_bio_PrivateKey()
172 unsigned char *kstr, int klen, in PEM_write_PrivateKey() argument
182 ret = PEM_write_bio_PrivateKey(b, x, enc, kstr, klen, cb, u); in PEM_write_PrivateKey()
Dpem_lib.c238 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write() argument
248 ret = PEM_ASN1_write_bio(i2d, name, b, x, enc, kstr, klen, callback, u); in PEM_ASN1_write()
256 int klen, pem_password_cb *callback, void *u) in PEM_ASN1_write_bio() argument
293 klen = 0; in PEM_ASN1_write_bio()
296 klen = (*callback) (buf, PEM_BUFSIZE, 1, u); in PEM_ASN1_write_bio()
297 if (klen <= 0) { in PEM_ASN1_write_bio()
310 if (!EVP_BytesToKey(enc, EVP_md5(), iv, kstr, klen, 1, key, NULL)) in PEM_ASN1_write_bio()
356 int i = 0, j, o, klen; in PEM_do_header() local
367 klen = 0; in PEM_do_header()
370 klen = callback(buf, PEM_BUFSIZE, 0, u); in PEM_do_header()
[all …]
Dpem_info.c297 unsigned char *kstr, int klen, in PEM_X509_INFO_write_bio() argument
360 enc, kstr, klen, cb, u) <= 0) in PEM_X509_INFO_write_bio()
/external/boringssl/src/include/openssl/
Dpem.h145 unsigned char *kstr, int klen, pem_password_cb *cb, \
148 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \
153 unsigned char *kstr, int klen, pem_password_cb *cb, \
156 return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \
181 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \
183 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,enc,kstr,klen,cb,u); \
188 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \
190 return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,enc,kstr,klen,cb,u); \
246 unsigned char *kstr, int klen, pem_password_cb *cb, void *u);
261 unsigned char *kstr, int klen, pem_password_cb *cb, void *u);
[all …]
/external/llvm/test/Transforms/IndVarSimplify/
Dexit_value_test3.ll16 %klen.0 = phi i32 [ %len, %entry ], [ %sub, %while.cond ]
17 %cmp = icmp ugt i32 %klen.0, 11
18 %sub = add i32 %klen.0, -12
22 %klen.0.lcssa = phi i32 [ %klen.0, %while.cond ]
23 ret i32 %klen.0.lcssa
/external/openssh/
Dkexecdhs.c75 size_t klen = 0, hashlen; in input_kex_ecdh_init() local
125 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_init()
126 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_init()
131 if (ECDH_compute_key(kbuf, klen, client_public, in input_kex_ecdh_init()
132 server_key, NULL) != (int)klen || in input_kex_ecdh_init()
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init()
139 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_init()
198 explicit_bzero(kbuf, klen); in input_kex_ecdh_init()
Dkexecdhc.c111 size_t klen = 0, hashlen; in input_kex_ecdh_reply() local
159 klen = (EC_GROUP_get_degree(group) + 7) / 8; in input_kex_ecdh_reply()
160 if ((kbuf = malloc(klen)) == NULL || in input_kex_ecdh_reply()
165 if (ECDH_compute_key(kbuf, klen, server_public, in input_kex_ecdh_reply()
166 client_key, NULL) != (int)klen || in input_kex_ecdh_reply()
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply()
173 dump_digest("shared secret", kbuf, klen); in input_kex_ecdh_reply()
217 explicit_bzero(kbuf, klen); in input_kex_ecdh_reply()
Dhmac.c64 ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen) in ssh_hmac_init() argument
71 if (klen <= ctx->buf_len) in ssh_hmac_init()
72 memcpy(ctx->buf, key, klen); in ssh_hmac_init()
73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init()
141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) in hmac_test() argument
149 if (ssh_hmac_init(ctx, key, klen) < 0 || in hmac_test()
Dkexdhc.c111 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh() local
156 klen = DH_size(kex->dh); in input_kex_dh()
157 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh()
210 explicit_bzero(kbuf, klen); in input_kex_dh()
Dkexdhs.c103 size_t klen = 0, hashlen; in input_kex_dh_init() local
148 klen = DH_size(kex->dh); in input_kex_dh_init()
149 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_init()
215 explicit_bzero(kbuf, klen); in input_kex_dh_init()
Dkexgexs.c132 size_t klen = 0, hashlen; in input_kex_dh_gex_init() local
177 klen = DH_size(kex->dh); in input_kex_dh_gex_init()
178 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_init()
245 explicit_bzero(kbuf, klen); in input_kex_dh_gex_init()
Dkexgexc.c154 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh_gex_reply() local
204 klen = DH_size(kex->dh); in input_kex_dh_gex_reply()
205 if ((kbuf = malloc(klen)) == NULL || in input_kex_dh_gex_reply()
262 explicit_bzero(kbuf, klen); in input_kex_dh_gex_reply()
Dhmac.h29 int ssh_hmac_init(struct ssh_hmac_ctx *ctx, const void *key, size_t klen)
Dcipher.c333 int klen; in cipher_init() local
390 klen = EVP_CIPHER_CTX_key_length(cc->evp); in cipher_init()
391 if (klen > 0 && keylen != (u_int)klen) { in cipher_init()
/external/curl/tests/unit/
Dunit1602.c54 size_t klen = sizeof(int); variable
63 nodep = Curl_hash_add(&hash_static, &key, klen, value);
73 nodep = Curl_hash_add(&hash_static, &key2, klen, value2);
/external/libmicrohttpd/src/microhttpd/
Dpostprocessor.c591 size_t klen; in try_get_value() local
597 klen = strlen (key); in try_get_value()
600 if ((spos[klen] != '=') || ((spos != buf) && (spos[-1] != ' '))) in try_get_value()
606 if (spos[klen + 1] != '"') in try_get_value()
608 if (NULL == (endv = strchr (&spos[klen + 2], '\"'))) in try_get_value()
610 vlen = endv - spos - klen - 1; in try_get_value()
615 memcpy (*destination, &spos[klen + 2], vlen - 1); in try_get_value()
/external/jemalloc/src/
Djemalloc.c912 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, in malloc_conf_error() argument
916 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, in malloc_conf_error()
946 size_t klen, vlen; local
1043 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v,
1046 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0)
1058 k, klen, v, vlen); \
1078 k, klen, v, vlen); \
1096 k, klen, v, vlen); \
1120 k, klen, v, vlen); \
1125 k, klen, v, vlen); \
[all …]
/external/curl/lib/vtls/
Dopenssl.c169 int klen = curlx_uztosi(strlen((char *)global_passwd)); in passwd_callback() local
170 if(num > klen) { in passwd_callback()
171 memcpy(buf, global_passwd, klen+1); in passwd_callback()
172 return klen; in passwd_callback()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c789 int klen; in wpa_ft_install_ptk() local
793 klen = wpa_cipher_key_len(sm->pairwise); in wpa_ft_install_ptk()
815 sm->PTK.tk, klen)) in wpa_ft_install_ptk()
Dwpa_auth.c2427 int klen; in fils_set_tk() local
2433 klen = wpa_cipher_key_len(sm->pairwise); in fils_set_tk()
2437 sm->PTK.tk, klen)) { in fils_set_tk()
2888 int klen = wpa_cipher_key_len(sm->pairwise); in SM_STATE() local
2890 sm->PTK.tk, klen)) { in SM_STATE()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.c751 int klen; in wpa_supplicant_check_group_cipher() local
762 klen = wpa_cipher_key_len(group_cipher); in wpa_supplicant_check_group_cipher()
763 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher()
/external/icu/icu4c/source/test/cintltst/
Dcmsccoll.c1699 uint32_t klen = 0; in TestBocsuCoverage() local
1705 klen = ucol_getSortKey(coll, test, tlen, key, 256); in TestBocsuCoverage()
1706 (void)klen; /* Suppress set but not used warning. */ in TestBocsuCoverage()