HomeSort by relevance Sort by last modified time
    Searched refs:key_len (Results 1 - 25 of 182) sorted by null

1 2 3 4 5 6 7 8

  /external/wpa_supplicant/
sha256.h 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
md5.h 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
rc4.h 20 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len);
sha1.h 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
24 void sha1_prf(const u8 *key, size_t key_len, const char *label,
26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
crypto_internal.c 62 size_t key_len; member in struct:crypto_hash
67 size_t key_len)
88 if (key_len > sizeof(k_pad)) {
90 MD5Update(&ctx->u.md5, key, key_len);
93 key_len = 16;
95 os_memcpy(ctx->key, key, key_len);
96 ctx->key_len = key_len;
98 os_memcpy(k_pad, key, key_len);
99 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len)
    [all...]
eap_vendor_test.c 160 const int key_len = 64; local
165 key = os_malloc(key_len);
169 os_memset(key, 0x11, key_len / 2);
170 os_memset(key + key_len / 2, 0x22, key_len / 2);
171 *len = key_len;
eap_pax_common.c 26 * @key_len: Length of the secret key in bytes
36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
66 hmac_sha1_vector(key, key_len, 3, addr, len, mac);
80 * @key_len: Length of the secret key in bytes
92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
sha256.c 25 * @key_len: Length of the key in bytes
31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
48 if (key_len > 64) {
49 sha256_vector(1, &key, &key_len, tk);
51 key_len = 32;
65 memcpy(k_pad, key, key_len);
80 memcpy(k_pad, key, key_len);
97 * @key_len: Length of the key in bytes
102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
rc4.c 78 * @key_len: RC4 key length
83 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len)
85 rc4_skip(key, key_len, 0, buf, len);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha256.h 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
md5.h 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
sha1.h 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
24 void sha1_prf(const u8 *key, size_t key_len, const char *label,
26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
crypto_internal.c 63 size_t key_len; member in struct:crypto_hash
68 size_t key_len)
89 if (key_len > sizeof(k_pad)) {
91 MD5Update(&ctx->u.md5, key, key_len);
94 key_len = 16;
96 os_memcpy(ctx->key, key, key_len);
97 ctx->key_len = key_len;
99 os_memcpy(k_pad, key, key_len);
100 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len)
    [all...]
sha256.c 25 * @key_len: Length of the key in bytes
31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
48 if (key_len > 64) {
49 sha256_vector(1, &key, &key_len, tk);
51 key_len = 32;
65 os_memcpy(k_pad, key, key_len);
80 os_memcpy(k_pad, key, key_len);
97 * @key_len: Length of the key in bytes
102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_peap_common.h 18 void peap_prfplus(int version, const u8 *key, size_t key_len,
eap_pax_common.c 26 * @key_len: Length of the secret key in bytes
36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
66 hmac_sha1_vector(key, key_len, 3, addr, len, mac);
80 * @key_len: Length of the secret key in bytes
92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
eap_pax_common.h 85 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
89 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
eap_peap_common.c 21 void peap_prfplus(int version, const u8 *key, size_t key_len,
78 hmac_sha1_vector(key, key_len, 5, addr, len, hash);
  /external/openssl/crypto/evp/
p_enc.c 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len,
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
evp_locl.h 134 key_len, iv_len, flags, init_key, cleanup, \
137 nid##_##nmode, block_size, key_len, iv_len, \
149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \
152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \
159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \
166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \
172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
    [all...]
e_aes.c 107 ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data);
109 ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_process.c 175 const u8 *key, size_t key_len)
183 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len);
184 if (key_len <= sizeof(cred->key)) {
185 os_memcpy(cred->key, key, key_len);
186 cred->key_len = key_len;
263 cred->key_len > 8 && cred->key_len < 64 &&
264 cred->key[cred->key_len - 1] == 0) {
272 cred->key_len--
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_vendor_test.c 157 const int key_len = 64; local
162 key = os_malloc(key_len);
166 os_memset(key, 0x11, key_len / 2);
167 os_memset(key + key_len / 2, 0x22, key_len / 2);
168 *len = key_len;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_vendor_test.c 150 const int key_len = 64; local
155 key = os_malloc(key_len);
159 os_memset(key, 0x11, key_len / 2);
160 os_memset(key + key_len / 2, 0x22, key_len / 2);
161 *len = key_len;
  /external/chromium/base/
hmac_unittest.cc 66 const int key_len; member in struct:__anon2332
125 cases[i].key_len));
140 const int key_len = 80; local
157 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(key), key_len));

Completed in 573 milliseconds

1 2 3 4 5 6 7 8