/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
|
H A D | ikev2_common.h | 258 size_t key_len; member in struct:ikev2_integ_alg 264 size_t key_len; member in struct:ikev2_prf_alg 270 size_t key_len; member in struct:ikev2_encr_alg 275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal-cipher.c | 45 size_t key_len) 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 79 if (key_len != 24) { 87 if (key_len != 8) { 43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument 179 aes = aes_encrypt_init(key, key_len); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pax_common.h | 79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
|
H A D | ikev2_common.h | 258 size_t key_len; member in struct:ikev2_integ_alg 264 size_t key_len; member in struct:ikev2_prf_alg 270 size_t key_len; member in struct:ikev2_encr_alg 275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal-cipher.c | 45 size_t key_len) 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 79 if (key_len != 24) { 87 if (key_len != 8) { 43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument 179 aes = aes_encrypt_init(key, key_len); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.h | 79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
|
H A D | ikev2_common.h | 258 size_t key_len; member in struct:ikev2_integ_alg 264 size_t key_len; member in struct:ikev2_prf_alg 270 size_t key_len; member in struct:ikev2_encr_alg 275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
/external/openssh/ |
H A D | mac.c | 55 int key_len; /* just for UMAC */ member in struct:__anon9648 83 mac->key_len = mac->mac_len = (u_int)evp_len; 86 mac->key_len = macs[which].key_len / 8; 119 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md);
|
H A D | cipher.c | 64 u_int key_len; member in struct:Cipher 107 return (c->key_len); 230 if (keylen < cipher->key_len) 242 if (type->key_len > 0 && type->key_len != keylen) { 244 type->key_len, keylen); 245 type->key_len = keylen;
|
/external/openssl/crypto/hmac/ |
H A D | hmactest.c | 85 int key_len; member in struct:test_st 139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 146 test[i].key, test[i].key_len,
|
/external/ipsec-tools/src/racoon/ |
H A D | admin.h | 108 size_t key_len; member in struct:admin_com_psk
|
/external/srtp/test/ |
H A D | dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 173 key_len = srtp_profile_get_master_key_length(profile); 175 memset(key, 0xff, key_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 61 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/common/ |
H A D | privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 53 size_t key_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument 179 aes = aes_encrypt_init(key, key_len); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_atmel.c | 88 u16 key_len; member in struct:atmel_param 194 const u8 *key, size_t key_len) 227 "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx, 228 (unsigned long) seq_len, (unsigned long) key_len); 233 blen = sizeof(*param) + key_len; 252 param->key_len = key_len; 253 os_memcpy((u8 *)param->key, key, key_len); 191 wpa_driver_atmel_set_key(void *priv, wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|