HomeSort by relevance Sort by last modified time
    Searched refs:key_len (Results 1 - 25 of 202) sorted by null

1 2 3 4 5 6 7 8 9

  /external/wpa_supplicant_8/src/crypto/
crypto_internal.c 27 size_t key_len; member in struct:crypto_hash
32 size_t key_len)
58 if (key_len > sizeof(k_pad)) {
60 MD5Update(&ctx->u.md5, key, key_len);
63 key_len = 16;
65 os_memcpy(ctx->key, key, key_len);
66 ctx->key_len = key_len;
68 os_memcpy(k_pad, key, key_len);
69 if (key_len < sizeof(k_pad)
    [all...]
md5.c 19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 64) {
44 if (md5_vector(1, &key, &key_len, tk))
47 key_len = 16;
61 os_memcpy(k_pad, key, key_len);
78 os_memcpy(k_pad, key, key_len);
95 * @key_len: Length of the key in bytes
101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
md5.h 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
sha1.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 64) {
44 if (sha1_vector(1, &key, &key_len, tk))
47 key_len = 20;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha256.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 64) {
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
47 key_len = 32;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha1.h 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
sha256.h 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
18 void sha256_prf(const u8 *key, size_t key_len, const char *label,
20 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
sha256-prf.c 19 * @key_len: Length of the key in bytes
29 void sha256_prf(const u8 *key, size_t key_len, const char *label,
32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8);
39 * @key_len: Length of the key in bytes
51 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
78 hmac_sha256_vector(key, key_len, 4, addr, len,
82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
sha1-prf.c 19 * @key_len: Length of the key in bytes
30 int sha1_prf(const u8 *key, size_t key_len, const char *label,
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
aes_wrap.h 43 int __must_check aes_gcm_ae(const u8 *key, size_t key_len,
48 int __must_check aes_gcm_ad(const u8 *key, size_t key_len,
53 int __must_check aes_gmac(const u8 *key, size_t key_len,
56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
  /external/srtp/crypto/include/
null_auth.h 55 null_auth_alloc(auth_t **a, int key_len, int out_len);
61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
cryptoalg.h 106 unsigned key_len; member in struct:cryptoalg_ctx_t
114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
hmac.h 59 hmac_alloc(auth_t **a, int key_len, int out_len);
65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
xfm.h 77 unsigned key_len; member in struct:xfm_ctx_t
84 #define xfm_get_key_len(xfm) ((xfm)->key_len)
117 unsigned key_len; member in struct:cryptoalg_ctx_t
125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
auth.h 56 (auth_pointer_t *ap, int key_len, int out_len);
59 (void *state, const uint8_t *key, int key_len);
78 (((a)->type)->init((a)->state, (key), ((a)->key_len)))
138 int key_len; /* length of key in octets */ member in struct:auth_t
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.h 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
  /external/srtp/crypto/hash/
null_auth.c 56 null_auth_alloc(auth_t **a, int key_len, int out_len) {
60 debug_print(mod_auth, "allocating auth func with key length %d", key_len);
74 (*a)->key_len = key_len;
100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
hmac.c 57 hmac_alloc(auth_t **a, int key_len, int out_len) {
61 debug_print(mod_hmac, "allocating auth func with key length %d", key_len);
68 if (key_len > 20)
85 (*a)->key_len = key_len;
112 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len) {
120 if (key_len > 20)
127 for (i=0; i < key_len; i++) {
  /external/openssl/crypto/evp/
p_enc.c 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len,
82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
evp_locl.h 134 key_len, iv_len, flags, init_key, cleanup, \
137 nid##_##nmode, block_size, key_len, iv_len, \
149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \
152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \
159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \
166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \
172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
    [all...]
  /external/srtp/crypto/cipher/
null_cipher.c 56 null_cipher_alloc(cipher_t **c, int key_len) {
61 "allocating cipher with key length %d", key_len);
74 (*c)->key_len = key_len;
  /external/srtp/doc/
crypto_kernel.txt 29 unsigned key_len);
  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 169 const u8 *key, size_t key_len)
184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len);
185 if (key_len <= sizeof(cred->key)) {
186 os_memcpy(cred->key, key, key_len);
187 cred->key_len = key_len;
277 cred->key_len > 8 && cred->key_len < 64 &&
278 cred->key[cred->key_len - 1] == 0) {
283 cred->key, cred->key_len);
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 141 uint32_t key_len = 0; local
174 key_len += sizeof(metadata);
176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len);
177 key_len += metadata.lenpubmod;
189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len);
190 key_len += metadata.lenpubexp;
196 metadata.rsacrtpriv.lenp = BN_bn2bin(rsa->p, kbuf + key_len);
197 key_len += metadata.rsacrtpriv.lenp;
198 metadata.rsacrtpriv.lenq = BN_bn2bin(rsa->q, kbuf + key_len);
199 key_len += metadata.rsacrtpriv.lenq
    [all...]
  /external/chromium/crypto/
hmac_win.cc 32 void ComputeHMACSHA256(const unsigned char* key, size_t key_len,
39 if (key_len > SHA256_BLOCK_SIZE) {
41 SHA256_Update(&ctx, key, key_len);
45 memcpy(key0, key, key_len);
46 memset(key0 + key_len, 0, SHA256_BLOCK_SIZE - key_len);

Completed in 381 milliseconds

1 2 3 4 5 6 7 8 9