HomeSort by relevance Sort by last modified time
    Searched refs:key_len (Results 1 - 25 of 306) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /device/linaro/bootloader/arm-trusted-firmware/plat/fvp/
fvp_trusted_boot.c 41 int plat_match_rotpk(const unsigned char *key_buf, unsigned int key_len)
  /device/linaro/bootloader/arm-trusted-firmware/plat/juno/
juno_trusted_boot.c 41 int plat_match_rotpk(const unsigned char *key_buf, unsigned int key_len)
  /external/dhcpcd-6.8.2/crypt/
hmac_md5.c 49 const uint8_t *key, size_t key_len,
58 if (key_len > HMAC_PAD_LEN) {
60 MD5Update(&context, key, (unsigned int)key_len);
63 key_len = MD5_DIGEST_LENGTH;
67 memcpy(k_ipad, key, key_len);
68 memcpy(k_opad, key, key_len);
69 memset(k_ipad + key_len, 0, sizeof(k_ipad) - key_len);
70 memset(k_opad + key_len, 0, sizeof(k_opad) - key_len);
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha384.h 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
18 void sha384_prf(const u8 *key, size_t key_len, const char *label,
20 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
md5.c 19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
44 if (key_len > 64) {
45 if (md5_vector(1, &key, &key_len, tk))
48 key_len = 16;
62 os_memcpy(k_pad, key, key_len);
79 os_memcpy(k_pad, key, key_len);
99 * @key_len: Length of the key in bytes
105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
md5.h 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
sha1.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
44 if (key_len > 64) {
45 if (sha1_vector(1, &key, &key_len, tk))
48 key_len = 20;
62 os_memcpy(k_pad, key, key_len);
78 os_memcpy(k_pad, key, key_len);
97 * @key_len: Length of the key in bytes
103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha256.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 64) {
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
47 key_len = 32;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
sha384.c 19 * @key_len: Length of the key in bytes
26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem,
43 if (key_len > 128) {
44 if (sha384_vector(1, &key, &key_len, tk) < 0)
47 key_len = 48;
61 os_memcpy(k_pad, key, key_len);
77 os_memcpy(k_pad, key, key_len);
94 * @key_len: Length of the key in bytes
100 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac)
    [all...]
crypto_internal.c 35 size_t key_len; member in struct:crypto_hash
40 size_t key_len)
76 if (key_len > sizeof(k_pad)) {
78 MD5Update(&ctx->u.md5, key, key_len);
81 key_len = 16;
83 os_memcpy(ctx->key, key, key_len);
84 ctx->key_len = key_len;
86 os_memcpy(k_pad, key, key_len);
87 if (key_len < sizeof(k_pad)
    [all...]
sha1.h 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
aes_siv.h 12 int aes_siv_encrypt(const u8 *key, size_t key_len,
16 int aes_siv_decrypt(const u8 *key, size_t key_len,
aes-siv.c 64 static int aes_s2v(const u8 *key, size_t key_len,
79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac);
84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp);
89 ret = omac1_aes_vector(key, key_len, 1, &addr[i], &len[i],
105 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac);
116 return omac1_aes_vector(key, key_len, 1, data, data_len, mac);
120 int aes_siv_encrypt(const u8 *key, size_t key_len,
133 (key_len != 32 && key_len != 48 && key_len != 64)
    [all...]
sha256-prf.c 19 * @key_len: Length of the key in bytes
30 int sha256_prf(const u8 *key, size_t key_len, const char *label,
33 return sha256_prf_bits(key, key_len, label, data, data_len, buf,
41 * @key_len: Length of the key in bytes
54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
81 if (hmac_sha256_vector(key, key_len, 4, addr, len,
86 if (hmac_sha256_vector(key, key_len, 4, addr, len,
sha384-prf.c 19 * @key_len: Length of the key in bytes
29 void sha384_prf(const u8 *key, size_t key_len, const char *label,
32 sha384_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8);
39 * @key_len: Length of the key in bytes
51 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
78 hmac_sha384_vector(key, key_len, 4, addr, len,
82 hmac_sha384_vector(key, key_len, 4, addr, len, hash);
sha1-prf.c 19 * @key_len: Length of the key in bytes
30 int sha1_prf(const u8 *key, size_t key_len, const char *label,
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
  /external/syslinux/gpxe/src/crypto/
hmac.c 38 * @v key_len Length of key
41 void *key, size_t *key_len ) {
45 digest_update ( digest, digest_ctx, key, *key_len );
47 *key_len = digest->digestsize;
56 * @v key_len Length of key
60 * will be replaced with its own digest, and key_len will be updated
64 void *key, size_t *key_len ) {
69 if ( *key_len > sizeof ( k_ipad ) )
70 hmac_reduce_key ( digest, key, key_len );
74 memcpy ( k_ipad, key, *key_len );
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.h 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
  /external/syslinux/gpxe/src/include/gpxe/
hmac.h 28 void *key, size_t *key_len );
30 void *key, size_t *key_len, void *hmac );
sha1.h 17 void prf_sha1 ( const void *key, size_t key_len, const char *label,
22 int iterations, void *key, size_t key_len );
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local
18 key_len = siglen_map[algorithm];
20 * 2 * key_len bytes for the n and rr arrays
23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t));
51 uint64_t key_len; local
57 key_len = key->len;
58 key_len *= sizeof(uint32_t);
61 if (RSA1024NUMBYTES != key_len &&
62 RSA2048NUMBYTES != key_len &&
63 RSA4096NUMBYTES != key_len &
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 67 const EVP_MD *digest, size_t key_len, uint8_t *out_key) {
79 while (key_len > 0) {
81 if (todo > key_len) {
82 todo = key_len;
113 key_len -= todo;
142 unsigned iterations, size_t key_len,
145 EVP_sha1(), key_len, out_key);
  /external/webrtc/talk/session/media/
externalhmac.cc 92 err_status_t external_hmac_alloc(auth_t** a, int key_len, int out_len) {
97 if (key_len > 20)
117 (*a)->key_len = key_len;
135 int key_len) {
136 if (key_len > HMAC_KEY_LENGTH)
139 memset(state->key, 0, key_len);
140 memcpy(state->key, key, key_len);
141 state->key_length = key_len;
  /hardware/intel/common/libva/va/drm/
va_drm_utils.c 34 int key_len; member in struct:driver_name_map
64 if (drm_version->name_len >= m->key_len &&
65 strncmp(drm_version->name, m->key, m->key_len) == 0)
  /external/pdfium/core/fpdfapi/parser/
cpdf_security_handler.h 52 int32_t key_len);
57 int key_len);
64 int& key_len);
70 int32_t key_len);
75 int32_t key_len);
97 bool CheckSecurity(int32_t key_len);

Completed in 557 milliseconds

1 2 3 4 5 6 7 8 91011>>