HomeSort by relevance Sort by last modified time
    Searched full:key_len (Results 1 - 25 of 266) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/wpa_supplicant_8/src/crypto/
sha384.h 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
18 void sha384_prf(const u8 *key, size_t key_len, const char *label,
20 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
crypto_internal.c 35 size_t key_len; member in struct:crypto_hash
40 size_t key_len)
76 if (key_len > sizeof(k_pad)) {
78 MD5Update(&ctx->u.md5, key, key_len);
81 key_len = 16;
83 os_memcpy(ctx->key, key, key_len);
84 ctx->key_len = key_len;
86 os_memcpy(k_pad, key, key_len);
87 if (key_len < sizeof(k_pad)
    [all...]
sha1.h 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
sha256.h 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
18 int sha256_prf(const u8 *key, size_t key_len, const char *label,
20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
md5.h 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
md5.c 19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
44 if (key_len > 64) {
45 if (md5_vector(1, &key, &key_len, tk))
48 key_len = 16;
62 os_memcpy(k_pad, key, key_len);
79 os_memcpy(k_pad, key, key_len);
99 * @key_len: Length of the key in bytes
105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha1.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
44 if (key_len > 64) {
45 if (sha1_vector(1, &key, &key_len, tk))
48 key_len = 20;
62 os_memcpy(k_pad, key, key_len);
78 os_memcpy(k_pad, key, key_len);
97 * @key_len: Length of the key in bytes
103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha256.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 64) {
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
47 key_len = 32;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
aes_wrap.h 25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len,
50 int __must_check aes_gcm_ae(const u8 *key, size_t key_len,
55 int __must_check aes_gcm_ad(const u8 *key, size_t key_len,
60 int __must_check aes_gmac(const u8 *key, size_t key_len,
63 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
66 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
sha1-prf.c 19 * @key_len: Length of the key in bytes
30 int sha1_prf(const u8 *key, size_t key_len, const char *label,
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
sha256-prf.c 19 * @key_len: Length of the key in bytes
30 int sha256_prf(const u8 *key, size_t key_len, const char *label,
33 return sha256_prf_bits(key, key_len, label, data, data_len, buf,
41 * @key_len: Length of the key in bytes
54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
81 if (hmac_sha256_vector(key, key_len, 4, addr, len,
86 if (hmac_sha256_vector(key, key_len, 4, addr, len,
sha384-prf.c 19 * @key_len: Length of the key in bytes
29 void sha384_prf(const u8 *key, size_t key_len, const char *label,
32 sha384_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8);
39 * @key_len: Length of the key in bytes
51 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
78 hmac_sha384_vector(key, key_len, 4, addr, len,
82 hmac_sha384_vector(key, key_len, 4, addr, len, hash);
sha1-tprf.c 18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local
18 key_len = siglen_map[algorithm];
20 * 2 * key_len bytes for the n and rr arrays
23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t));
51 uint64_t key_len; local
57 key_len = key->len;
58 key_len *= sizeof(uint32_t);
61 if (RSA1024NUMBYTES != key_len &&
62 RSA2048NUMBYTES != key_len &&
63 RSA4096NUMBYTES != key_len &
    [all...]
  /external/dhcpcd-6.8.2/crypt/
hmac_md5.c 49 const uint8_t *key, size_t key_len,
58 if (key_len > HMAC_PAD_LEN) {
60 MD5Update(&context, key, (unsigned int)key_len);
63 key_len = MD5_DIGEST_LENGTH;
67 memcpy(k_ipad, key, key_len);
68 memcpy(k_opad, key, key_len);
69 memset(k_ipad + key_len, 0, sizeof(k_ipad) - key_len);
70 memset(k_opad + key_len, 0, sizeof(k_opad) - key_len);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.h 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
  /external/curl/lib/
hash.c 44 e->key_len = 0;
93 mk_hash_element(const void *key, size_t key_len, const void *p)
98 void *dupkey = malloc(key_len);
101 memcpy(dupkey, key, key_len);
104 he->key_len = key_len;
124 Curl_hash_add(struct curl_hash *h, void *key, size_t key_len, void *p)
128 struct curl_llist *l = FETCH_LIST (h, key, key_len);
132 if(h->comp_func(he->key, he->key_len, key, key_len)) {
    [all...]
  /external/vboot_reference/tests/
rsa_utility_tests.c 87 uint32_t key_len = RSA1024NUMBYTES << i; local
89 *buf_key_len = key_len / sizeof(uint32_t);
92 buf[8 + key_len - 1] = 101;
93 buf[8 + key_len] = 120;
94 buf[8 + key_len * 2 - 1] = 121;
97 key = RSAPublicKeyFromBuf(buf, 8 + key_len * 2);
103 TEST_EQ(((uint8_t*)key->n)[key_len - 1], 101,
107 TEST_EQ(((uint8_t*)key->rr)[key_len - 1], 121,
112 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 - 1), NULL,
114 TEST_PTR_EQ(RSAPublicKeyFromBuf(buf, 8 + key_len * 2 + 1), NULL
    [all...]
  /external/boringssl/src/include/openssl/
cmac.h 34 * |in| and writes it to |out|. The |key_len| may be 16 or 32 bytes to select
36 OPENSSL_EXPORT int AES_CMAC(uint8_t out[16], const uint8_t *key, size_t key_len,
50 * only specifies the use of AES-128 thus |key_len| should be 16 and |cipher|
52 * AES-256 by setting |key_len| to 32 and |cipher| to |EVP_aes_256_cbc()|. The
56 OPENSSL_EXPORT int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t key_len,
  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 169 const u8 *key, size_t key_len)
184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len);
185 if (key_len <= sizeof(cred->key)) {
186 os_memcpy(cred->key, key, key_len);
187 cred->key_len = key_len;
213 cred->key_len > 8 && cred->key_len < 64 &&
214 cred->key[cred->key_len - 1] == 0) {
219 cred->key, cred->key_len);
    [all...]
  /external/boringssl/src/crypto/cipher/
e_tls.c 55 static int aead_tls_init(EVP_AEAD_CTX *ctx, const uint8_t *key, size_t key_len,
65 if (key_len != EVP_AEAD_key_length(ctx->aead)) {
73 (implicit_iv ? EVP_CIPHER_iv_length(cipher) : 0) == key_len);
354 size_t key_len, size_t tag_len,
356 return aead_tls_init(ctx, key, key_len, tag_len, dir, EVP_rc4(), EVP_md5(),
361 size_t key_len, size_t tag_len,
363 return aead_tls_init(ctx, key, key_len, tag_len, dir, EVP_rc4(), EVP_sha1(),
368 size_t key_len, size_t tag_len,
370 return aead_tls_init(ctx, key, key_len, tag_len, dir, EVP_aes_128_cbc(),
375 EVP_AEAD_CTX *ctx, const uint8_t *key, size_t key_len, size_t tag_len
    [all...]
  /external/avahi/avahi-compat-libdns_sd/
txt.c 118 size_t key_len; local
121 key_len = strlen(key);
122 assert(key_len <= 0xFF);
133 if (key_len > t->size - i - 1)
136 if (key_len <= *p &&
137 strncmp(key, (char*) p+1, key_len) == 0 &&
138 (key_len == *p || p[1+key_len] == '=')) {
263 size_t key_len; local
265 key_len = strlen(key)
    [all...]
  /external/tcpdump/
signature.c 50 unsigned int key_len, uint8_t *digest)
59 if (key_len > 64) {
64 MD5_Update(&tctx, key, key_len);
68 key_len = 16;
85 memcpy(k_ipad, key, key_len);
86 memcpy(k_opad, key, key_len);
  /external/wpa_supplicant_8/src/eap_peer/
eap_vendor_test.c 152 const int key_len = 64; local
157 key = os_malloc(key_len);
161 os_memset(key, 0x11, key_len / 2);
162 os_memset(key + key_len / 2, 0x22, key_len / 2);
163 *len = key_len;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_vendor_test.c 144 const int key_len = 64; local
149 key = os_malloc(key_len);
153 os_memset(key, 0x11, key_len / 2);
154 os_memset(key + key_len / 2, 0x22, key_len / 2);
155 *len = key_len;

Completed in 853 milliseconds

1 2 3 4 5 6 7 8 91011