HomeSort by relevance Sort by last modified time
    Searched refs:nonce_len (Results 1 - 24 of 24) sorted by null

  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
38 if (nonce_len > data_len)
39 buf_len = nonce_len;
53 os_memcpy(buf + 16, nonce, nonce_len);
54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac))
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
102 if (nonce_len > data_len)
103 buf_len = nonce_len;
    [all...]
aes_wrap.h 32 const u8 *nonce, size_t nonce_len,
36 const u8 *nonce, size_t nonce_len,
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_aead.c 73 return aead->nonce_len;
127 const unsigned char *nonce, size_t nonce_len,
148 r = ctx->aead->seal(ctx, out, max_out_len, nonce, nonce_len,
162 const unsigned char *nonce, size_t nonce_len,
180 r = ctx->aead->open(ctx, out, max_out_len, nonce, nonce_len,
e_chacha20poly1305.c 131 const unsigned char *nonce, size_t nonce_len,
159 if (nonce_len != CHACHA20_NONCE_LEN)
187 const unsigned char *nonce, size_t nonce_len,
217 if (nonce_len != CHACHA20_NONCE_LEN)
evp_locl.h 354 unsigned char nonce_len; member in struct:evp_aead_st
364 const unsigned char *nonce, size_t nonce_len,
370 const unsigned char *nonce, size_t nonce_len,
e_aes.c     [all...]
evp.h     [all...]
  /system/keymaster/
ae.h 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
84 * nonce_len - Length of nonces to be used for this key, in bytes
102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
ocb.c 702 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) {
706 if (nonce_len != 12)
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
peerkey_auth.c 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
wpa_auth_ie.c 790 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
wpa_ie.c 414 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
peerkey.c 533 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN ||
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
535 os_memcpy(pos, nonce_p, sess->nonce_len);
536 pos += sess->nonce_len;
537 os_memcpy(pos, nonce_s, sess->nonce_len);
569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
580 os_memcpy(pos, nonce_p, sess->nonce_len);
581 pos += sess->nonce_len;
582 os_memcpy(pos, nonce_s, sess->nonce_len);
742 sess->nonce_len = eap_eke_nonce_len(prf);
743 if (sess->nonce_len < 0
    [all...]
eap_eke_common.h 74 int nonce_len; member in struct:eap_eke_session
ikev2_common.h 290 const u8 *nonce, size_t nonce_len,
309 size_t nonce_len; member in struct:ikev2_payloads
ikev2_common.c 315 payloads->nonce_len = pdatalen;
370 const u8 *nonce, size_t nonce_len,
399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
406 os_memcpy(pos, nonce, nonce_len);
407 pos += nonce_len;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
330 data->sess.nonce_len);
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
576 data->nonce_p, data->sess.nonce_len);
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
625 nonce, data->sess.nonce_len);
    [all...]
ikev2.c 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0)
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
538 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
544 nonces, 2 * data->sess.nonce_len);
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
551 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
552 data->sess.nonce_len);
554 data->nonce_s, data->sess.nonce_len);
587 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
    [all...]
ikev2.c 448 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0)
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
evp.h     [all...]

Completed in 3395 milliseconds