HomeSort by: relevance | last modified time | path
    Searched refs:keyLength (Results 1 - 25 of 29) sorted by relevancy

1 2

  /src/external/apache2/llvm/dist/llvm/include/llvm/ADT/
StringMapEntry.h 24 size_t keyLength;
27 explicit StringMapEntryBase(size_t keyLength) : keyLength(keyLength) {}
29 size_t getKeyLength() const { return keyLength; }
45 size_t KeyLength = Key.size();
49 size_t AllocSize = EntrySize + KeyLength + 1;
55 if (KeyLength > 0)
56 ::memcpy(Buffer, Key.data(), KeyLength);
57 Buffer[KeyLength] = 0; // Null terminate for convenience of clients
    [all...]
  /src/external/bsd/ntp/dist/tests/libntp/
a_md5encrypt.c 23 const size_t keyLength = sizeof(key) - 1;
84 length = MD5authencrypt(keytype, key, keyLength,
89 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, packetPtr,
103 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength,
115 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, keyLength,
  /src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_asym.c 56 if (pubKey.pubKey.keyLength < inDataLen) {
64 pubKey.pubKey.key, pubKey.pubKey.keyLength)))
69 pubKey.pubKey.keyLength)))
110 result = Trspi_Verify(type, hash, hashLen, pubKey.pubKey.key, pubKey.pubKey.keyLength,
tspi_bind.c 68 if (keyContainer.pubKey.keyLength < ulDataLength) {
77 keyContainer.pubKey.keyLength)))
97 keyContainer.pubKey.keyLength))) {
120 keyContainer.pubKey.keyLength))) {
tsp_own.c 113 dummyKey.pubKey.keyLength))) {
121 dummyKey.pubKey.keyLength))) {
obj_rsakey.c 104 rsakey->key.pubKey.keyLength = 0;
131 rsaKeyParms.keyLength = 512;
133 rsaKeyParms.keyLength = 1024;
135 rsaKeyParms.keyLength = 2048;
137 rsaKeyParms.keyLength = 4096;
139 rsaKeyParms.keyLength = 8192;
141 rsaKeyParms.keyLength = 16384;
284 rsakey->key.pubKey.keyLength = len/8;
883 switch (rsakey->key.pubKey.keyLength) {
894 *len = rsakey->key.pubKey.keyLength * 8
    [all...]
tspi_quote.c 192 keyContainer.pubKey.keyLength,
tspi_selftest.c 140 keyContainer.pubKey.key, keyContainer.pubKey.keyLength,
tsp_key.c 33 key->pubKey.keyLength = 0;
tspi_changeauth.c 280 ephemeralKey.pubKey.keyLength);
tspi_ek.c 202 result |= Trspi_HashUpdate(&hashCtx, pubKey.pubKey.keyLength,
tspi_migration.c 209 migAuth.migrationKey.pubKey.keyLength = 0;
tspi_ps.c 358 switch (keyContainer.pubKey.keyLength) {
378 LogError("Key was not a known keylength.");
tspi_aik.c 366 caKey.pubKey.key, caKey.pubKey.keyLength,
tspi_key.c 485 pubLen = keyContainer.pubKey.keyLength;
  /src/crypto/external/bsd/openssl/dist/crypto/asn1/
p5_scrypt.c 28 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER),
179 sparam->keyLength = ASN1_INTEGER_new();
180 if (sparam->keyLength == NULL)
182 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0)
246 if (sparam->keyLength) {
248 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
  /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/
p5_scrypt.c 26 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER),
180 sparam->keyLength = ASN1_INTEGER_new();
181 if (sparam->keyLength == NULL)
183 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0)
241 if (sparam->keyLength) {
243 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
  /src/crypto/external/cpl/trousers/dist/src/tcs/
tcs_key.c 386 UINT32 keyLength;
388 UnloadBlob_UINT32(offset, &keyLength, blob);
390 if (keyLength > 0)
391 UnloadBlob(offset, keyLength, blob, NULL);
396 UnloadBlob_UINT32(offset, &store->keyLength, blob);
398 if (store->keyLength == 0) {
402 store->key = (BYTE *)malloc(store->keyLength);
404 LogError("malloc of %u bytes failed.", store->keyLength);
405 store->keyLength = 0;
409 UnloadBlob(offset, store->keyLength, blob, store->key)
    [all...]
tcs_key_mem_cache.c 207 tmp->blob->pubKey.keyLength == pub->keyLength &&
208 !memcmp(tmp->blob->pubKey.key, pub->key, pub->keyLength)) {
346 if (key_blob->pubKey.keyLength > 0) {
347 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength);
349 LogError("malloc of %u bytes failed.", key_blob->pubKey.keyLength);
355 memcpy(entry->blob->pubKey.key, key_blob->pubKey.key, key_blob->pubKey.keyLength);
357 entry->blob->pubKey.keyLength = key_blob->pubKey.keyLength;
496 entry->blob->pubKey.key = (BYTE *)malloc(key_blob->pubKey.keyLength);
    [all...]
tcsi_ps.c 620 pubKey.keyLength = ulPublicInfoLength;
621 pubKey.key = malloc(pubKey.keyLength);
623 LogError("malloc of %d bytes failed.", pubKey.keyLength);
627 memcpy(pubKey.key, rgbPublicInfo, pubKey.keyLength);
  /src/crypto/external/apache2/openssl/dist/crypto/asn1/
p5_scrypt.c 28 ASN1_OPT(SCRYPT_PARAMS, keyLength, ASN1_INTEGER),
199 sparam->keyLength = ASN1_INTEGER_new();
200 if (sparam->keyLength == NULL) {
204 if (ASN1_INTEGER_set_int64(sparam->keyLength, keylen) == 0) {
273 if (sparam->keyLength) {
275 if ((ASN1_INTEGER_get_uint64(&spkeylen, sparam->keyLength) == 0)
  /src/crypto/external/cpl/trousers/dist/src/tcs/ps/
tcsps.c 319 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) {
378 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) {
448 if (pub->keyLength != tmp->pub_data_size || !(tmp->flags & CACHE_FLAG_VALID)) {
585 pub_key_size = key.pubKey.keyLength;
  /src/crypto/external/cpl/trousers/dist/src/include/tss/
tpm.h 809 UINT32 keyLength;
818 UINT32 keyLength;
827 UINT32 keyLength;
828 SIZEIS(keyLength)
840 UINT32 keyLength;
841 SIZEIS(keyLength)
  /src/crypto/external/cpl/trousers/dist/src/trspi/
trousers.c 92 pubKey->pubKey.keyLength = 0;
206 Trspi_LoadBlob_UINT32(offset, parms->keyLength, blob);
465 Trspi_LoadBlob_UINT32(offset, store->keyLength, blob);
466 Trspi_LoadBlob(offset, store->keyLength, blob, store->key);
662 UINT32 keyLength;
664 Trspi_UnloadBlob_UINT32(offset, &keyLength, blob);
665 Trspi_UnloadBlob(offset, keyLength, blob, NULL);
670 Trspi_UnloadBlob_UINT32(offset, &store->keyLength, blob);
672 if (store->keyLength > 0) {
673 store->key = malloc(store->keyLength);
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tspi/ps/
tspps.c 527 pub_key_size = key.pubKey.keyLength;

Completed in 51 milliseconds

1 2