/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | rc4.h | 18 void rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_init.c | 24 @param keylen Length of secret key in octets 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 50 for (x = 0; (unsigned)x < keylen; x++) { 60 f9->keylen = keylen;
|
H A D | f9_memory.c | 23 @param keylen Length of key in octets 31 const unsigned char *key, unsigned long keylen, 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) { 30 f9_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
|
H A D | f9_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) { 30 f9_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
H A D | hmac_init.c | 27 @param keylen The length of the secret key (octets) 30 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) argument 48 if (keylen == 0) { 66 if(keylen > HMAC_BLOCKSIZE) { 68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { 74 keylen = hashsize; 76 XMEMCPY(hmac->key, key, (size_t)keylen); 77 if(keylen < HMAC_BLOCKSIZE) { 78 zeromem((hmac->key) + keylen, (size_t)(HMAC_BLOCKSIZE - keylen)); [all...] |
H A D | hmac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen); 61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { 31 hmac_memory(int hash, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
|
H A D | hmac_file.c | 25 @param keylen The length of the secret key 31 const unsigned char *key, unsigned long keylen, 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { 30 hmac_file(int hash, const char *fname, const unsigned char *key, unsigned long keylen, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_mac.h | 9 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 14 const unsigned char *key, unsigned long keylen, 18 const unsigned char *key, unsigned long keylen, 22 unsigned long keylen, 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 42 const unsigned char *key, unsigned long keylen, 46 const unsigned char *key, unsigned long keylen, 50 const unsigned char *key, unsigned long keylen, 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 77 const unsigned char *key, unsigned long keylen, 355 keylen, member in struct:__anon4563 [all...] |
H A D | tomcrypt_cipher.h | 102 ulong32 K[32], keylen; member in struct:cast5_key 333 @param keylen The length of the input key (octets) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 443 @param keylen The length of the secret key (octets) 458 const unsigned char *key, unsigned long keylen, 469 @param keylen The length of the secret key 483 const unsigned char *key, unsigned long keylen, 493 @param keylen The key length (octets) 501 const unsigned char *key, unsigned long keylen, 507 @param keylen Th [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
H A D | pelican_memory.c | 23 @param keylen The length of the key (octets) 29 int pelican_memory(const unsigned char *key, unsigned long keylen, argument 41 if ((err = pelican_init(pel, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/misc/crypt/ |
H A D | crypt_find_cipher_any.c | 22 @param keylen The minimum length of the key size desired (octets) 25 int find_cipher_any(const char *name, int blocklen, int keylen) argument 39 if (blocklen <= (int)cipher_descriptor[x].block_length && keylen <= (int)cipher_descriptor[x].max_key_length) {
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 25 @param keylen The length of the secret key (octets) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 31 omac_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
|
H A D | omac_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) { 30 omac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_memory.c | 23 @param keylen Length of key in octets 31 const unsigned char *key, unsigned long keylen, 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) { 30 xcbc_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
|
H A D | xcbc_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { 30 xcbc_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
H A D | cbc_start.c | 25 @param keylen The length of the secret key (octets) 31 int keylen, int num_rounds, symmetric_CBC *cbc) 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 30 cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CBC *cbc) argument
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
H A D | ofb_start.c | 26 @param keylen The length of the secret key (octets) 32 int keylen, int num_rounds, symmetric_OFB *ofb) 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key); 31 ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_OFB *ofb) argument
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
H A D | f8_start.c | 26 @param keylen The length of the secret key (octets) 34 const unsigned char *key, int keylen, 64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { 70 for (; x < keylen && x < (int)sizeof(tkey); x++) { 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */ 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { 91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key); 33 f8_start( int cipher, const unsigned char *IV, const unsigned char *key, int keylen, const unsigned char *salt_key, int skeylen, int num_rounds, symmetric_F8 *f8) argument
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_encrypt_authenticate_memory.c | 24 @param keylen The length of the secret key (octets) 37 const unsigned char *key, unsigned long keylen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) { 36 eax_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
H A D | pmac_file.c | 24 @param keylen The length of the secret key (octets) 31 const unsigned char *key, unsigned long keylen, 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { 30 pmac_file(int cipher, const unsigned char *key, unsigned long keylen, const char *filename, unsigned char *out, unsigned long *outlen) argument
|
H A D | pmac_memory.c | 24 @param keylen The length of the secret key (octets) 32 const unsigned char *key, unsigned long keylen, 50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) { 31 pmac_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) argument
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
H A D | cfb_start.c | 26 @param keylen The length of the secret key (octets) 32 int keylen, int num_rounds, symmetric_CFB *cfb) 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) { 31 cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CFB *cfb) argument
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
H A D | gcm_memory.c | 24 @param keylen The length of the secret key 38 const unsigned char *key, unsigned long keylen, 57 (key, keylen, 87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) { 37 gcm_memory( int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *IV, unsigned long IVlen, const unsigned char *adata, unsigned long adatalen, unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen, int direction) argument
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int keylen, unsigned char *out) 96 tkeylen = keylen; 142 h__dump (out, keylen); 149 int keylen, unsigned char *out) 152 keylen, out); 238 unsigned int keylen = 0; local 248 keylen = EVP_CIPHER_CTX_key_length(ctx); 249 OPENSSL_assert(keylen <= sizeof key); 267 keylen = EVP_CIPHER_CTX_key_length(ctx); 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 147 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |