/external/chromium_org/components/autofill/core/browser/crypto/ |
H A D | rc4_decryptor.h | 66 void PrepareKey(const uint8 *key_data, int key_data_len) { argument 81 index1 = (index1 + 1) % key_data_len;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 size_t key_data_len) 671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 763 size_t key_data_len) 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 809 size_t key_data_len) 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_t key_data_len) 653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
H A D | wpa.c | 383 size_t key_data_len) 406 key_data, key_data_len); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1073 size_t key_data_len) 1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1241 size_t key_data_len, u16 key_info, 1247 maxkeylen = key_data_len; 1267 if (key_data_len > sizeof(gd->gtk)) { 1270 (unsigned long) key_data_len); 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1598 size_t plen, data_len, key_data_len; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 size_t key_data_len) 671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 763 size_t key_data_len) 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 809 size_t key_data_len) 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_t key_data_len) 653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
H A D | wpa.c | 383 size_t key_data_len) 406 key_data, key_data_len); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1073 size_t key_data_len) 1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1241 size_t key_data_len, u16 key_info, 1247 maxkeylen = key_data_len; 1267 if (key_data_len > sizeof(gd->gtk)) { 1270 (unsigned long) key_data_len); 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1598 size_t plen, data_len, key_data_len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
|
H A D | peerkey.c | 657 size_t key_data_len) 671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || 763 size_t key_data_len) 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || 809 size_t key_data_len) 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { 1115 const u8 *key_data, size_t key_data_len) 653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument [all...] |
H A D | wpa.c | 383 size_t key_data_len) 406 key_data, key_data_len); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1073 size_t key_data_len) 1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1241 size_t key_data_len, u16 key_info, 1247 maxkeylen = key_data_len; 1267 if (key_data_len > sizeof(gd->gtk)) { 1270 (unsigned long) key_data_len); 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1598 size_t plen, data_len, key_data_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1289 int key_data_len, pad_len = 0; local 1319 key_data_len = kde_len; 1324 pad_len = key_data_len % 8; 1327 key_data_len += pad_len + 8; 1330 len += key_data_len; 1376 buf = os_zalloc(key_data_len); 1389 buf, key_data_len); 1394 (key_data_len - 8) / 8, buf, 1400 WPA_PUT_BE16(key->key_data_length, key_data_len); 1408 os_memcpy(key + 1, buf, key_data_len); [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1289 int key_data_len, pad_len = 0; local 1319 key_data_len = kde_len; 1324 pad_len = key_data_len % 8; 1327 key_data_len += pad_len + 8; 1330 len += key_data_len; 1376 buf = os_zalloc(key_data_len); 1389 buf, key_data_len); 1394 (key_data_len - 8) / 8, buf, 1400 WPA_PUT_BE16(key->key_data_length, key_data_len); 1408 os_memcpy(key + 1, buf, key_data_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 1289 int key_data_len, pad_len = 0; local 1319 key_data_len = kde_len; 1324 pad_len = key_data_len % 8; 1327 key_data_len += pad_len + 8; 1330 len += key_data_len; 1376 buf = os_zalloc(key_data_len); 1389 buf, key_data_len); 1394 (key_data_len - 8) / 8, buf, 1400 WPA_PUT_BE16(key->key_data_length, key_data_len); 1408 os_memcpy(key + 1, buf, key_data_len); [all...] |