/external/wpa_supplicant_8/src/tls/ |
pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len);
|
aes-siv.c | 154 size_t crypt_len; local 162 crypt_len = iv_c_len - AES_BLOCK_SIZE; 169 _len[num_elem] = crypt_len; 172 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 177 ret = aes_128_ctr_encrypt(k2, iv, out, crypt_len);
|
aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
|
aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x);
|
aes_wrap.h | 57 const u8 *crypt, size_t crypt_len, 67 size_t M, const u8 *crypt, size_t crypt_len,
|
crypto.h | 408 * @crypt_len: Encrypted signature data length 409 * @plain: Buffer for plaintext (at least crypt_len bytes) 414 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
crypto_libtomcrypt.c | 612 const u8 *crypt, size_t crypt_len, 620 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 533 size_t crypt_len; local 564 crypt_len = elems_len - (elems->mic - start); 565 if (crypt_len < 2) { 571 crypt = os_zalloc(crypt_len); 578 os_memcpy(crypt, elems->mic, crypt_len); 580 if (aes_siv_decrypt(sta->aek, crypt, crypt_len, 3,
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 510 size_t crypt_len; local 522 if (!pbe_crypt(algor, pass_raw, pass_raw_len, in, in_len, &oct->data, &crypt_len, 528 oct->length = crypt_len; [all...] |