/external/wpa_supplicant_8/src/tls/ |
pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
|
/external/wpa_supplicant_8/src/crypto/ |
aes-siv.c | 154 size_t crypt_len; local 162 crypt_len = iv_c_len - AES_BLOCK_SIZE; 169 _len[num_elem] = crypt_len; 172 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 177 ret = aes_128_ctr_encrypt(k2, iv, out, crypt_len);
|
crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len);
|
aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
|
aes_wrap.h | 57 const u8 *crypt, size_t crypt_len, 67 size_t M, const u8 *crypt, size_t crypt_len,
|
aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x);
|
crypto_libtomcrypt.c | 612 const u8 *crypt, size_t crypt_len, 620 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC,
|
crypto.h | 385 * @crypt_len: Encrypted signature data length 386 * @plain: Buffer for plaintext (at least crypt_len bytes) 391 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 512 size_t crypt_len; local 526 crypt_len = elems_len - (elems->mic - start); 527 if (crypt_len < 2) { 533 crypt = os_zalloc(crypt_len); 540 os_memcpy(crypt, elems->mic, crypt_len); 542 if (aes_siv_decrypt(sta->aek, crypt, crypt_len, 3,
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 465 size_t crypt_len; local 477 if (!pbe_crypt(algor, pass_raw, pass_raw_len, in, in_len, &oct->data, &crypt_len, 483 oct->length = crypt_len; [all...] |