/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
aes_wrap.h | 32 const u8 *nonce, size_t nonce_len, 36 const u8 *nonce, size_t nonce_len,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_aead.c | 73 return aead->nonce_len; 127 const unsigned char *nonce, size_t nonce_len, 148 r = ctx->aead->seal(ctx, out, max_out_len, nonce, nonce_len, 162 const unsigned char *nonce, size_t nonce_len, 180 r = ctx->aead->open(ctx, out, max_out_len, nonce, nonce_len,
|
e_chacha20poly1305.c | 131 const unsigned char *nonce, size_t nonce_len, 159 if (nonce_len != CHACHA20_NONCE_LEN) 187 const unsigned char *nonce, size_t nonce_len, 217 if (nonce_len != CHACHA20_NONCE_LEN)
|
evp_locl.h | 354 unsigned char nonce_len; member in struct:evp_aead_st 364 const unsigned char *nonce, size_t nonce_len, 370 const unsigned char *nonce, size_t nonce_len,
|
e_aes.c | [all...] |
evp.h | [all...] |
/system/keymaster/ |
ae.h | 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len); 84 * nonce_len - Length of nonces to be used for this key, in bytes 102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce. 132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
|
ocb.c | 702 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) { 706 if (nonce_len != 12) [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
peerkey_auth.c | 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
|
wpa_auth_ie.c | 790 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 414 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
peerkey.c | 533 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN || [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 535 os_memcpy(pos, nonce_p, sess->nonce_len); 536 pos += sess->nonce_len; 537 os_memcpy(pos, nonce_s, sess->nonce_len); 569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 580 os_memcpy(pos, nonce_p, sess->nonce_len); 581 pos += sess->nonce_len; 582 os_memcpy(pos, nonce_s, sess->nonce_len); 742 sess->nonce_len = eap_eke_nonce_len(prf); 743 if (sess->nonce_len < 0 [all...] |
eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
ikev2_common.h | 290 const u8 *nonce, size_t nonce_len, 309 size_t nonce_len; member in struct:ikev2_payloads
|
ikev2_common.c | 315 payloads->nonce_len = pdatalen; 370 const u8 *nonce, size_t nonce_len, 399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 406 os_memcpy(pos, nonce, nonce_len); 407 pos += nonce_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 570 if (decrypt_len < (size_t) data->sess.nonce_len) { 576 data->nonce_p, data->sess.nonce_len); 619 if (decrypt_len < (size_t) data->sess.nonce_len) { 625 nonce, data->sess.nonce_len); [all...] |
ikev2.c | 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0)
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { 470 data->nonce_p, data->sess.nonce_len); 472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, 538 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { 544 nonces, 2 * data->sess.nonce_len); 545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 551 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, 552 data->sess.nonce_len); 554 data->nonce_s, data->sess.nonce_len); 587 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, [all...] |
ikev2.c | 448 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0)
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
evp.h | [all...] |