/external/wpa_supplicant_8/src/tls/ |
pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len);
|
aes-siv.c | 170 size_t crypt_len; local 179 crypt_len = iv_c_len - AES_BLOCK_SIZE; 189 _len[num_elem] = crypt_len; 192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
|
aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x);
|
aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
crypto.h | 411 * @crypt_len: Encrypted signature data length 412 * @plain: Buffer for plaintext (at least crypt_len bytes) 417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
crypto_libtomcrypt.c | 613 const u8 *crypt, size_t crypt_len, 621 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 632 size_t crypt_len; local 664 crypt_len = elems_len - (elems->mic - start); 665 if (crypt_len < 2 + AES_BLOCK_SIZE) { 671 crypt = os_zalloc(crypt_len); 678 os_memcpy(crypt, elems->mic, crypt_len); 680 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, 687 crypt_len -= AES_BLOCK_SIZE; 689 ampe_buf, crypt_len); 695 (size_t) 2 + ampe_ie_len > crypt_len ||
|