| /src/external/apache2/llvm/dist/llvm/include/llvm/ADT/ |
| StringMapEntry.h | 24 size_t keyLength; 27 explicit StringMapEntryBase(size_t keyLength) : keyLength(keyLength) {} 29 size_t getKeyLength() const { return keyLength; } 45 size_t KeyLength = Key.size(); 49 size_t AllocSize = EntrySize + KeyLength + 1; 55 if (KeyLength > 0) 56 ::memcpy(Buffer, Key.data(), KeyLength); 57 Buffer[KeyLength] = 0; // Null terminate for convenience of clients [all...] |
| /src/external/bsd/ntp/dist/tests/libntp/ |
| a_md5encrypt.c | 23 const size_t keyLength = sizeof(key) - 1; 84 length = MD5authencrypt(keytype, key, keyLength, 89 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, packetPtr, 103 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, 115 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, keyLength,
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_asym.c | 56 if (pubKey.pubKey.keyLength < inDataLen) { 64 pubKey.pubKey.key, pubKey.pubKey.keyLength))) 69 pubKey.pubKey.keyLength))) 110 result = Trspi_Verify(type, hash, hashLen, pubKey.pubKey.key, pubKey.pubKey.keyLength,
|
| tspi_bind.c | 68 if (keyContainer.pubKey.keyLength < ulDataLength) { 77 keyContainer.pubKey.keyLength))) 97 keyContainer.pubKey.keyLength))) { 120 keyContainer.pubKey.keyLength))) {
|
| tsp_own.c | 113 dummyKey.pubKey.keyLength))) { 121 dummyKey.pubKey.keyLength))) {
|
| obj_rsakey.c | 104 rsakey->key.pubKey.keyLength = 0; 131 rsaKeyParms.keyLength = 512; 133 rsaKeyParms.keyLength = 1024; 135 rsaKeyParms.keyLength = 2048; 137 rsaKeyParms.keyLength = 4096; 139 rsaKeyParms.keyLength = 8192; 141 rsaKeyParms.keyLength = 16384; 284 rsakey->key.pubKey.keyLength = len/8; 883 switch (rsakey->key.pubKey.keyLength) { 894 *len = rsakey->key.pubKey.keyLength * 8 [all...] |
| tspi_quote.c | 192 keyContainer.pubKey.keyLength,
|
| tspi_selftest.c | 140 keyContainer.pubKey.key, keyContainer.pubKey.keyLength,
|
| tsp_key.c | 33 key->pubKey.keyLength = 0;
|
| tspi_changeauth.c | 280 ephemeralKey.pubKey.keyLength);
|
| tspi_ek.c | 202 result |= Trspi_HashUpdate(&hashCtx, pubKey.pubKey.keyLength,
|
| tspi_migration.c | 209 migAuth.migrationKey.pubKey.keyLength = 0;
|
| tspi_ps.c | 358 switch (keyContainer.pubKey.keyLength) { 378 LogError("Key was not a known keylength.");
|
| tspi_aik.c | 366 caKey.pubKey.key, caKey.pubKey.keyLength,
|
| tspi_key.c | 485 pubLen = keyContainer.pubKey.keyLength;
|
| /src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| p5_scrypt.c | 28 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER), 179 sparam->keyLength = ASN1_INTEGER_new(); 180 if (sparam->keyLength == NULL) 182 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) 246 if (sparam->keyLength) { 248 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
| p5_scrypt.c | 26 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER), 180 sparam->keyLength = ASN1_INTEGER_new(); 181 if (sparam->keyLength == NULL) 183 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) 241 if (sparam->keyLength) { 243 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
|
| /src/crypto/external/cpl/trousers/dist/src/tcs/ |
| tcs_key.c | 386 UINT32 keyLength; 388 UnloadBlob_UINT32(offset, &keyLength, blob); 390 if (keyLength > 0) 391 UnloadBlob(offset, keyLength, blob, NULL); 396 UnloadBlob_UINT32(offset, &store->keyLength, blob); 398 if (store->keyLength == 0) { 402 store->key = (BYTE *)malloc(store->keyLength); 404 LogError("malloc of %u bytes failed.", store->keyLength); 405 store->keyLength = 0; 409 UnloadBlob(offset, store->keyLength, blob, store->key) [all...] |
| tcs_key_mem_cache.c | 207 tmp->blob->pubKey.keyLength == pub->keyLength && 208 !memcmp(tmp->blob->pubKey.key, pub->key, pub->keyLength)) { 346 if (key_blob->pubKey.keyLength > 0) { 347 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength); 349 LogError("malloc of %u bytes failed.", key_blob->pubKey.keyLength); 355 memcpy(entry->blob->pubKey.key, key_blob->pubKey.key, key_blob->pubKey.keyLength); 357 entry->blob->pubKey.keyLength = key_blob->pubKey.keyLength; 496 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength); [all...] |
| tcsi_ps.c | 620 pubKey.keyLength = ulPublicInfoLength; 621 pubKey.key = malloc(pubKey.keyLength); 623 LogError("malloc of %d bytes failed.", pubKey.keyLength); 627 memcpy(pubKey.key, rgbPublicInfo, pubKey.keyLength);
|
| /src/crypto/external/apache2/openssl/dist/crypto/asn1/ |
| p5_scrypt.c | 28 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER), 199 sparam->keyLength = ASN1_INTEGER_new(); 200 if (sparam->keyLength == NULL) { 204 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) { 273 if (sparam->keyLength) { 275 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
|
| /src/crypto/external/cpl/trousers/dist/src/tcs/ps/ |
| tcsps.c | 319 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { 378 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { 448 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) { 585 pub_key_size = key.pubKey.keyLength;
|
| /src/crypto/external/cpl/trousers/dist/src/include/tss/ |
| tpm.h | 809 UINT32 keyLength;
818 UINT32 keyLength;
827 UINT32 keyLength;
828 SIZEIS(keyLength)
840 UINT32 keyLength;
841 SIZEIS(keyLength)
|
| /src/crypto/external/cpl/trousers/dist/src/trspi/ |
| trousers.c | 92 pubKey->pubKey.keyLength = 0; 206 Trspi_LoadBlob_UINT32(offset, parms->keyLength, blob); 465 Trspi_LoadBlob_UINT32(offset, store->keyLength, blob); 466 Trspi_LoadBlob(offset, store->keyLength, blob, store->key); 662 UINT32 keyLength; 664 Trspi_UnloadBlob_UINT32(offset, &keyLength, blob); 665 Trspi_UnloadBlob(offset, keyLength, blob, NULL); 670 Trspi_UnloadBlob_UINT32(offset, &store->keyLength, blob); 672 if (store->keyLength > 0) { 673 store->key = malloc(store->keyLength); [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/ps/ |
| tspps.c | 527 pub_key_size = key.pubKey.keyLength;
|