Searched refs:key_len (Results 76 - 100 of 363) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
H A Dikev2_common.h258 size_t key_len; member in struct:ikev2_integ_alg
264 size_t key_len; member in struct:ikev2_prf_alg
270 size_t key_len; member in struct:ikev2_encr_alg
275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_internal-cipher.c45 size_t key_len)
57 if (key_len > sizeof(ctx->u.rc4.key)) {
61 ctx->u.rc4.keylen = key_len;
62 os_memcpy(ctx->u.rc4.key, key, key_len);
65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len);
70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len);
79 if (key_len != 24) {
87 if (key_len != 8) {
43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Daes-gcm.c175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument
179 aes = aes_encrypt_init(key, key_len);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
263 aes = aes_gcm_init_hash_subkey(key, key_len, H);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
297 aes = aes_gcm_init_hash_subkey(key, key_len, H);
322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pax_common.h79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
H A Dikev2_common.h258 size_t key_len; member in struct:ikev2_integ_alg
264 size_t key_len; member in struct:ikev2_prf_alg
270 size_t key_len; member in struct:ikev2_encr_alg
275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_internal-cipher.c45 size_t key_len)
57 if (key_len > sizeof(ctx->u.rc4.key)) {
61 ctx->u.rc4.keylen = key_len;
62 os_memcpy(ctx->u.rc4.key, key, key_len);
65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len);
70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len);
79 if (key_len != 24) {
87 if (key_len != 8) {
43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Daes-gcm.c175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument
179 aes = aes_encrypt_init(key, key_len);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
263 aes = aes_gcm_init_hash_subkey(key, key_len, H);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
297 aes = aes_gcm_init_hash_subkey(key, key_len, H);
322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pax_common.h79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
83 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
H A Dikev2_common.h258 size_t key_len; member in struct:ikev2_integ_alg
264 size_t key_len; member in struct:ikev2_prf_alg
270 size_t key_len; member in struct:ikev2_encr_alg
275 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
278 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
281 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
285 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
287 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
/external/openssh/
H A Dmac.c55 int key_len; /* just for UMAC */ member in struct:__anon9648
83 mac->key_len = mac->mac_len = (u_int)evp_len;
86 mac->key_len = macs[which].key_len / 8;
119 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md);
H A Dcipher.c64 u_int key_len; member in struct:Cipher
107 return (c->key_len);
230 if (keylen < cipher->key_len)
242 if (type->key_len > 0 && type->key_len != keylen) {
244 type->key_len, keylen);
245 type->key_len = keylen;
/external/openssl/crypto/hmac/
H A Dhmactest.c85 int key_len; member in struct:test_st
139 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
146 test[i].key, test[i].key_len,
/external/ipsec-tools/src/racoon/
H A Dadmin.h108 size_t key_len; member in struct:admin_com_psk
/external/srtp/test/
H A Ddtls_srtp_driver.c127 unsigned int key_len, salt_len; local
173 key_len = srtp_profile_get_master_key_length(profile);
175 memset(key, 0xff, key_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dprivsep_commands.h61 size_t key_len; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/hostapd/src/common/
H A Dprivsep_commands.h53 size_t key_len; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/src/common/
H A Dprivsep_commands.h53 size_t key_len; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dprivsep_commands.h53 size_t key_len; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-gcm.c175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) argument
179 aes = aes_encrypt_init(key, key_len);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
263 aes = aes_gcm_init_hash_subkey(key, key_len, H);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
297 aes = aes_gcm_init_hash_subkey(key, key_len, H);
322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Ddriver_atmel.c88 u16 key_len; member in struct:atmel_param
194 const u8 *key, size_t key_len)
227 "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx,
228 (unsigned long) seq_len, (unsigned long) key_len);
233 blen = sizeof(*param) + key_len;
252 param->key_len = key_len;
253 os_memcpy((u8 *)param->key, key, key_len);
191 wpa_driver_atmel_set_key(void *priv, wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument

Completed in 276 milliseconds

1234567891011>>