/external/boringssl/src/ssl/ |
ssl_aead_ctx.cc | 60 Span<const uint8_t> mac_key, Span<const uint8_t> fixed_iv) { 70 expected_mac_key_len != mac_key.size()) { 76 if (!mac_key.empty()) { 79 if (mac_key.size() + enc_key.size() + fixed_iv.size() > 84 OPENSSL_memcpy(merged_key, mac_key.data(), mac_key.size()); 85 OPENSSL_memcpy(merged_key + mac_key.size(), enc_key.data(), enc_key.size()); 86 OPENSSL_memcpy(merged_key + mac_key.size() + enc_key.size(), 89 enc_key.size() + mac_key.size() + fixed_iv.size()); 111 if (mac_key.empty()) [all...] |
internal.h | 621 Span<const uint8_t> mac_key, [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
e_tls.c | 36 // mac_key is the portion of the key used for the MAC. It is retained 38 uint8_t mac_key[EVP_MAX_MD_SIZE]; member in struct:__anon14291 83 OPENSSL_memcpy(tls_ctx->mac_key, key, mac_key_len); 343 tls_ctx->mac_key, tls_ctx->mac_key_len)) {
|
/system/bt/stack/smp/ |
smp_int.h | 310 BT_OCTET16 mac_key; member in struct:__anon2545 367 uint8_t* a2, uint8_t* mac_key, uint8_t* ltk); 523 uint8_t* a2, uint8_t* mac_key, uint8_t* ltk);
|
smp_keys.cc | [all...] |
smp_utils.cc | [all...] |