/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeof(k_pad) [all...] |
md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 43 if (key_len > 64) { 44 if (md5_vector(1, &key, &key_len, tk)) 47 key_len = 16; 61 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 95 * @key_len: Length of the key in bytes 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 43 if (key_len > 64) { 44 if (sha1_vector(1, &key, &key_len, tk)) 47 key_len = 20; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 18 void sha256_prf(const u8 *key, size_t key_len, const char *label, 20 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
|
sha256-prf.c | 19 * @key_len: Length of the key in bytes 29 void sha256_prf(const u8 *key, size_t key_len, const char *label, 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 39 * @key_len: Length of the key in bytes 51 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label, 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
aes_wrap.h | 43 int __must_check aes_gcm_ae(const u8 *key, size_t key_len, 48 int __must_check aes_gcm_ad(const u8 *key, size_t key_len, 53 int __must_check aes_gmac(const u8 *key, size_t key_len, 56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
/external/srtp/crypto/include/ |
null_auth.h | 55 null_auth_alloc(auth_t **a, int key_len, int out_len); 61 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len);
|
cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
hmac.h | 59 hmac_alloc(auth_t **a, int key_len, int out_len); 65 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len);
|
xfm.h | 77 unsigned key_len; member in struct:xfm_ctx_t 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member in struct:cryptoalg_ctx_t 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 59 (void *state, const uint8_t *key, int key_len); 78 (((a)->type)->init((a)->state, (key), ((a)->key_len))) 138 int key_len; /* length of key in octets */ member in struct:auth_t
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
/external/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) {
|
hmac.c | 57 hmac_alloc(auth_t **a, int key_len, int out_len) { 61 debug_print(mod_hmac, "allocating auth func with key length %d", key_len); 68 if (key_len > 20) 85 (*a)->key_len = key_len; 112 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len) { 120 if (key_len > 20) 127 for (i=0; i < key_len; i++) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ 137 nid##_##nmode, block_size, key_len, iv_len, \ 149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \ [all...] |
/external/openssl/crypto/evp/ |
p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/srtp/crypto/cipher/ |
null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len;
|
/external/srtp/doc/ |
crypto_kernel.txt | 29 unsigned key_len);
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_process.c | 169 const u8 *key, size_t key_len) 184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); 185 if (key_len <= sizeof(cred->key)) { 186 os_memcpy(cred->key, key, key_len); 187 cred->key_len = key_len; 277 cred->key_len > 8 && cred->key_len < 64 && 278 cred->key[cred->key_len - 1] == 0) { 283 cred->key, cred->key_len); [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 141 uint32_t key_len = 0; local 174 key_len += sizeof(metadata); 176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len); 177 key_len += metadata.lenpubmod; 189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len); 190 key_len += metadata.lenpubexp; 196 metadata.rsacrtpriv.lenp = BN_bn2bin(rsa->p, kbuf + key_len); 197 key_len += metadata.rsacrtpriv.lenp; 198 metadata.rsacrtpriv.lenq = BN_bn2bin(rsa->q, kbuf + key_len); 199 key_len += metadata.rsacrtpriv.lenq [all...] |