Searched refs:keylen (Results 1 - 25 of 186) sorted by relevance

12345678

/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Drc4.h18 void rc4_skip(const u8 *key, size_t keylen, size_t skip,
/external/dropbear/libtomcrypt/src/mac/f9/
H A Df9_init.c24 @param keylen Length of secret key in octets
27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
50 for (x = 0; (unsigned)x < keylen; x++) {
60 f9->keylen = keylen;
H A Df9_memory.c23 @param keylen Length of key in octets
31 const unsigned char *key, unsigned long keylen,
45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen);
53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
30 f9_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
H A Df9_file.c24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/mac/hmac/
H A Dhmac_init.c27 @param keylen The length of the secret key (octets)
30 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) argument
48 if (keylen == 0) {
66 if(keylen > HMAC_BLOCKSIZE) {
68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) {
74 keylen = hashsize;
76 XMEMCPY(hmac->key, key, (size_t)keylen);
77 if(keylen < HMAC_BLOCKSIZE) {
78 zeromem((hmac->key) + keylen, (size_t)(HMAC_BLOCKSIZE - keylen));
[all...]
H A Dhmac_memory.c24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen);
61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) {
31 hmac_memory(int hash, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
H A Dhmac_file.c25 @param keylen The length of the secret key
31 const unsigned char *key, unsigned long keylen,
52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) {
30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_mac.h9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
14 const unsigned char *key, unsigned long keylen,
18 const unsigned char *key, unsigned long keylen,
22 unsigned long keylen,
38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
42 const unsigned char *key, unsigned long keylen,
46 const unsigned char *key, unsigned long keylen,
50 const unsigned char *key, unsigned long keylen,
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
77 const unsigned char *key, unsigned long keylen,
355 keylen, member in struct:__anon4563
[all...]
H A Dtomcrypt_cipher.h102 ulong32 K[32], keylen; member in struct:cast5_key
333 @param keylen The length of the input key (octets)
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
443 @param keylen The length of the secret key (octets)
458 const unsigned char *key, unsigned long keylen,
469 @param keylen The length of the secret key
483 const unsigned char *key, unsigned long keylen,
493 @param keylen The key length (octets)
501 const unsigned char *key, unsigned long keylen,
507 @param keylen Th
[all...]
/external/dropbear/libtomcrypt/src/mac/pelican/
H A Dpelican_memory.c23 @param keylen The length of the key (octets)
29 int pelican_memory(const unsigned char *key, unsigned long keylen, argument
41 if ((err = pelican_init(pel, key, keylen)) != CRYPT_OK) {
/external/dropbear/libtomcrypt/src/misc/crypt/
H A Dcrypt_find_cipher_any.c22 @param keylen The minimum length of the key size desired (octets)
25 int find_cipher_any(const char *name, int blocklen, int keylen) argument
39 if (blocklen <= (int)cipher_descriptor[x].block_length && keylen <= (int)cipher_descriptor[x].max_key_length) {
/external/dropbear/libtomcrypt/src/modes/ecb/
H A Decb_start.c25 @param keylen The length of the secret key (octets)
30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument
41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
/external/dropbear/libtomcrypt/src/mac/omac/
H A Domac_memory.c24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen);
61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
31 omac_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
H A Domac_file.c24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
30 omac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/mac/xcbc/
H A Dxcbc_memory.c23 @param keylen Length of key in octets
31 const unsigned char *key, unsigned long keylen,
45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen);
53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
30 xcbc_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
H A Dxcbc_file.c24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
30 xcbc_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/modes/cbc/
H A Dcbc_start.c25 @param keylen The length of the secret key (octets)
31 int keylen, int num_rounds, symmetric_CBC *cbc)
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
30 cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CBC *cbc) argument
/external/dropbear/libtomcrypt/src/modes/ofb/
H A Dofb_start.c26 @param keylen The length of the secret key (octets)
32 int keylen, int num_rounds, symmetric_OFB *ofb)
53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key);
31 ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_OFB *ofb) argument
/external/dropbear/libtomcrypt/src/modes/f8/
H A Df8_start.c26 @param keylen The length of the secret key (octets)
34 const unsigned char *key, int keylen,
64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) {
70 for (; x < keylen && x < (int)sizeof(tkey); x++) {
74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) {
91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
33 f8_start( int cipher, const unsigned char *IV, const unsigned char *key, int keylen, const unsigned char *salt_key, int skeylen, int num_rounds, symmetric_F8 *f8) argument
/external/dropbear/libtomcrypt/src/encauth/eax/
H A Deax_encrypt_authenticate_memory.c24 @param keylen The length of the secret key (octets)
37 const unsigned char *key, unsigned long keylen,
55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
36 eax_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
/external/dropbear/libtomcrypt/src/mac/pmac/
H A Dpmac_file.c24 @param keylen The length of the secret key (octets)
31 const unsigned char *key, unsigned long keylen,
54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
30 pmac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
H A Dpmac_memory.c24 @param keylen The length of the secret key (octets)
32 const unsigned char *key, unsigned long keylen,
50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
31 pmac_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
/external/dropbear/libtomcrypt/src/modes/cfb/
H A Dcfb_start.c26 @param keylen The length of the secret key (octets)
32 int keylen, int num_rounds, symmetric_CFB *cfb)
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
31 cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CFB *cfb) argument
/external/dropbear/libtomcrypt/src/encauth/gcm/
H A Dgcm_memory.c24 @param keylen The length of the secret key
38 const unsigned char *key, unsigned long keylen,
57 (key, keylen,
87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
37 gcm_memory( int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *IV, unsigned long IVlen, const unsigned char *adata, unsigned long adatalen, unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen, int direction) argument
/external/openssl/crypto/evp/
H A Dp5_crpt2.c83 int keylen, unsigned char *out)
96 tkeylen = keylen;
142 h__dump (out, keylen);
149 int keylen, unsigned char *out)
152 keylen, out);
238 unsigned int keylen = 0; local
248 keylen = EVP_CIPHER_CTX_key_length(ctx);
249 OPENSSL_assert(keylen <= sizeof key);
267 keylen = EVP_CIPHER_CTX_key_length(ctx);
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
147 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]

Completed in 333 milliseconds

12345678