/external/wpa_supplicant/ |
sha256.h | 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
md5.h | 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
rc4.h | 20 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len);
|
sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
crypto_internal.c | 62 size_t key_len; member in struct:crypto_hash 67 size_t key_len) 88 if (key_len > sizeof(k_pad)) { 90 MD5Update(&ctx->u.md5, key, key_len); 93 key_len = 16; 95 os_memcpy(ctx->key, key, key_len); 96 ctx->key_len = key_len; 98 os_memcpy(k_pad, key, key_len); 99 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
eap_vendor_test.c | 160 const int key_len = 64; local 165 key = os_malloc(key_len); 169 os_memset(key, 0x11, key_len / 2); 170 os_memset(key + key_len / 2, 0x22, key_len / 2); 171 *len = key_len;
|
eap_pax_common.c | 26 * @key_len: Length of the secret key in bytes 36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 80 * @key_len: Length of the secret key in bytes 92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
|
sha256.c | 25 * @key_len: Length of the key in bytes 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 48 if (key_len > 64) { 49 sha256_vector(1, &key, &key_len, tk); 51 key_len = 32; 65 memcpy(k_pad, key, key_len); 80 memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
rc4.c | 78 * @key_len: RC4 key length 83 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len) 85 rc4_skip(key, key_len, 0, buf, len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.h | 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
md5.h | 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
crypto_internal.c | 63 size_t key_len; member in struct:crypto_hash 68 size_t key_len) 89 if (key_len > sizeof(k_pad)) { 91 MD5Update(&ctx->u.md5, key, key_len); 94 key_len = 16; 96 os_memcpy(ctx->key, key, key_len); 97 ctx->key_len = key_len; 99 os_memcpy(k_pad, key, key_len); 100 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
sha256.c | 25 * @key_len: Length of the key in bytes 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 48 if (key_len > 64) { 49 sha256_vector(1, &key, &key_len, tk); 51 key_len = 32; 65 os_memcpy(k_pad, key, key_len); 80 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.h | 18 void peap_prfplus(int version, const u8 *key, size_t key_len,
|
eap_pax_common.c | 26 * @key_len: Length of the secret key in bytes 36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 80 * @key_len: Length of the secret key in bytes 92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 115 hmac_sha1_vector(key, key_len, count, addr, len, hash);
|
eap_pax_common.h | 85 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 89 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
eap_peap_common.c | 21 void peap_prfplus(int version, const u8 *key, size_t key_len, 78 hmac_sha1_vector(key, key_len, 5, addr, len, hash);
|
/external/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ 137 nid##_##nmode, block_size, key_len, iv_len, \ 149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \ [all...] |
e_aes.c | 107 ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); 109 ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_process.c | 175 const u8 *key, size_t key_len) 183 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); 184 if (key_len <= sizeof(cred->key)) { 185 os_memcpy(cred->key, key, key_len); 186 cred->key_len = key_len; 263 cred->key_len > 8 && cred->key_len < 64 && 264 cred->key[cred->key_len - 1] == 0) { 272 cred->key_len-- [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_vendor_test.c | 157 const int key_len = 64; local 162 key = os_malloc(key_len); 166 os_memset(key, 0x11, key_len / 2); 167 os_memset(key + key_len / 2, 0x22, key_len / 2); 168 *len = key_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_vendor_test.c | 150 const int key_len = 64; local 155 key = os_malloc(key_len); 159 os_memset(key, 0x11, key_len / 2); 160 os_memset(key + key_len / 2, 0x22, key_len / 2); 161 *len = key_len;
|
/external/chromium/base/ |
hmac_unittest.cc | 66 const int key_len; member in struct:__anon2332 125 cases[i].key_len)); 140 const int key_len = 80; local 157 ASSERT_TRUE(hmac.Init(reinterpret_cast<const unsigned char*>(key), key_len));
|