/external/wpa_supplicant/ |
sha256.h | 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
md5.h | 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
rc4.h | 20 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len);
|
sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
crypto_internal.c | 62 size_t key_len; member in struct:crypto_hash 67 size_t key_len) 88 if (key_len > sizeof(k_pad)) { 90 MD5Update(&ctx->u.md5, key, key_len); 93 key_len = 16; 95 os_memcpy(ctx->key, key, key_len); 96 ctx->key_len = key_len; 98 os_memcpy(k_pad, key, key_len); 99 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.h | 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
md5.h | 20 void hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/external/wpa_supplicant_8/src/crypto/ |
sha256.h | 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
md5.h | 20 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 25 int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len, 28 int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data,
|
md5-non-fips.c | 25 * @key_len: Length of the key in bytes 32 int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len, 50 if (key_len > 64) { 51 if (md5_vector_non_fips_allow(1, &key, &key_len, tk)) 54 key_len = 16; 68 os_memcpy(k_pad, key, key_len); 85 os_memcpy(k_pad, key, key_len); 102 * @key_len: Length of the key in bytes 108 int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data, 111 return hmac_md5_vector_non_fips_allow(key, key_len, 1, &data [all...] |
md5.c | 25 * @key_len: Length of the key in bytes 32 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 49 if (key_len > 64) { 50 if (md5_vector(1, &key, &key_len, tk)) 53 key_len = 16; 67 os_memcpy(k_pad, key, key_len); 84 os_memcpy(k_pad, key, key_len); 101 * @key_len: Length of the key in bytes 107 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 110 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
crypto_internal.c | 29 size_t key_len; member in struct:crypto_hash 34 size_t key_len) 55 if (key_len > sizeof(k_pad)) { 57 MD5Update(&ctx->u.md5, key, key_len); 60 key_len = 16; 62 os_memcpy(ctx->key, key, key_len); 63 ctx->key_len = key_len; 65 os_memcpy(k_pad, key, key_len); 66 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len) [all...] |
sha1.h | 20 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 int sha1_prf(const u8 *key, size_t key_len, const char *label, 26 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
sha1.c | 25 * @key_len: Length of the key in bytes 32 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 49 if (key_len > 64) { 50 if (sha1_vector(1, &key, &key_len, tk)) 53 key_len = 20; 67 os_memcpy(k_pad, key, key_len); 83 os_memcpy(k_pad, key, key_len); 100 * @key_len: Length of the key in bytes 106 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 109 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
sha256.c | 25 * @key_len: Length of the key in bytes 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 48 if (key_len > 64) { 49 sha256_vector(1, &key, &key_len, tk); 51 key_len = 32; 65 os_memcpy(k_pad, key, key_len); 80 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
/external/srtp/crypto/include/ |
null_auth.h | 55 null_auth_alloc(auth_t **a, int key_len, int out_len); 61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
|
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
hmac.h | 59 hmac_alloc(auth_t **a, int key_len, int out_len); 65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.h | 18 void peap_prfplus(int version, const u8 *key, size_t key_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 18 void peap_prfplus(int version, const u8 *key, size_t key_len,
|
/external/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
|
/external/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/srtp/crypto/cipher/ |
null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len;
|