/device/linaro/bootloader/arm-trusted-firmware/plat/fvp/ |
fvp_trusted_boot.c | 41 int plat_match_rotpk(const unsigned char *key_buf, unsigned int key_len)
|
/device/linaro/bootloader/arm-trusted-firmware/plat/juno/ |
juno_trusted_boot.c | 41 int plat_match_rotpk(const unsigned char *key_buf, unsigned int key_len)
|
/external/dhcpcd-6.8.2/crypt/ |
hmac_md5.c | 49 const uint8_t *key, size_t key_len, 58 if (key_len > HMAC_PAD_LEN) { 60 MD5Update(&context, key, (unsigned int)key_len); 63 key_len = MD5_DIGEST_LENGTH; 67 memcpy(k_ipad, key, key_len); 68 memcpy(k_opad, key, key_len); 69 memset(k_ipad + key_len, 0, sizeof(k_ipad) - key_len); 70 memset(k_opad + key_len, 0, sizeof(k_opad) - key_len); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha384.h | 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, 18 void sha384_prf(const u8 *key, size_t key_len, const char *label, 20 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
|
md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 44 if (key_len > 64) { 45 if (md5_vector(1, &key, &key_len, tk)) 48 key_len = 16; 62 os_memcpy(k_pad, key, key_len); 79 os_memcpy(k_pad, key, key_len); 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 44 if (key_len > 64) { 45 if (sha1_vector(1, &key, &key_len, tk)) 48 key_len = 20; 62 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
sha384.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, 43 if (key_len > 128) { 44 if (sha384_vector(1, &key, &key_len, tk) < 0) 47 key_len = 48; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac) [all...] |
crypto_internal.c | 35 size_t key_len; member in struct:crypto_hash 40 size_t key_len) 76 if (key_len > sizeof(k_pad)) { 78 MD5Update(&ctx->u.md5, key, key_len); 81 key_len = 16; 83 os_memcpy(ctx->key, key, key_len); 84 ctx->key_len = key_len; 86 os_memcpy(k_pad, key, key_len); 87 if (key_len < sizeof(k_pad) [all...] |
sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
aes_siv.h | 12 int aes_siv_encrypt(const u8 *key, size_t key_len, 16 int aes_siv_decrypt(const u8 *key, size_t key_len,
|
aes-siv.c | 64 static int aes_s2v(const u8 *key, size_t key_len, 79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); 84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp); 89 ret = omac1_aes_vector(key, key_len, 1, &addr[i], &len[i], 105 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac); 116 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); 120 int aes_siv_encrypt(const u8 *key, size_t key_len, 133 (key_len != 32 && key_len != 48 && key_len != 64) [all...] |
sha256-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha256_prf(const u8 *key, size_t key_len, const char *label, 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, 41 * @key_len: Length of the key in bytes 54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, 81 if (hmac_sha256_vector(key, key_len, 4, addr, len, 86 if (hmac_sha256_vector(key, key_len, 4, addr, len,
|
sha384-prf.c | 19 * @key_len: Length of the key in bytes 29 void sha384_prf(const u8 *key, size_t key_len, const char *label, 32 sha384_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 39 * @key_len: Length of the key in bytes 51 void sha384_prf_bits(const u8 *key, size_t key_len, const char *label, 78 hmac_sha384_vector(key, key_len, 4, addr, len, 82 hmac_sha384_vector(key, key_len, 4, addr, len, hash);
|
sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
/external/syslinux/gpxe/src/crypto/ |
hmac.c | 38 * @v key_len Length of key 41 void *key, size_t *key_len ) { 45 digest_update ( digest, digest_ctx, key, *key_len ); 47 *key_len = digest->digestsize; 56 * @v key_len Length of key 60 * will be replaced with its own digest, and key_len will be updated 64 void *key, size_t *key_len ) { 69 if ( *key_len > sizeof ( k_ipad ) ) 70 hmac_reduce_key ( digest, key, key_len ); 74 memcpy ( k_ipad, key, *key_len ); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
/external/syslinux/gpxe/src/include/gpxe/ |
hmac.h | 28 void *key, size_t *key_len ); 30 void *key, size_t *key_len, void *hmac );
|
sha1.h | 17 void prf_sha1 ( const void *key, size_t key_len, const char *label, 22 int iterations, void *key, size_t key_len );
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local 18 key_len = siglen_map[algorithm]; 20 * 2 * key_len bytes for the n and rr arrays 23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t)); 51 uint64_t key_len; local 57 key_len = key->len; 58 key_len *= sizeof(uint32_t); 61 if (RSA1024NUMBYTES != key_len && 62 RSA2048NUMBYTES != key_len && 63 RSA4096NUMBYTES != key_len & [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 67 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { 79 while (key_len > 0) { 81 if (todo > key_len) { 82 todo = key_len; 113 key_len -= todo; 142 unsigned iterations, size_t key_len, 145 EVP_sha1(), key_len, out_key);
|
/external/webrtc/talk/session/media/ |
externalhmac.cc | 92 err_status_t external_hmac_alloc(auth_t** a, int key_len, int out_len) { 97 if (key_len > 20) 117 (*a)->key_len = key_len; 135 int key_len) { 136 if (key_len > HMAC_KEY_LENGTH) 139 memset(state->key, 0, key_len); 140 memcpy(state->key, key, key_len); 141 state->key_length = key_len;
|
/hardware/intel/common/libva/va/drm/ |
va_drm_utils.c | 34 int key_len; member in struct:driver_name_map 64 if (drm_version->name_len >= m->key_len && 65 strncmp(drm_version->name, m->key, m->key_len) == 0)
|
/external/pdfium/core/fpdfapi/parser/ |
cpdf_security_handler.h | 52 int32_t key_len); 57 int key_len); 64 int& key_len); 70 int32_t key_len); 75 int32_t key_len); 97 bool CheckSecurity(int32_t key_len);
|