Searched defs:key_data_len (Results 1 - 13 of 13) sorted by relevance

/external/chromium_org/components/autofill/core/browser/crypto/
H A Drc4_decryptor.h66 void PrepareKey(const uint8 *key_data, int key_data_len) { argument
81 index1 = (index1 + 1) % key_data_len;
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 size_t key_data_len)
671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
763 size_t key_data_len)
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
809 size_t key_data_len)
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_t key_data_len)
653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
H A Dwpa.c383 size_t key_data_len)
406 key_data, key_data_len);
407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1073 size_t key_data_len)
1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1241 size_t key_data_len, u16 key_info,
1247 maxkeylen = key_data_len;
1267 if (key_data_len > sizeof(gd->gtk)) {
1270 (unsigned long) key_data_len);
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1598 size_t plen, data_len, key_data_len; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 size_t key_data_len)
671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
763 size_t key_data_len)
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
809 size_t key_data_len)
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_t key_data_len)
653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
H A Dwpa.c383 size_t key_data_len)
406 key_data, key_data_len);
407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1073 size_t key_data_len)
1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1241 size_t key_data_len, u16 key_info,
1247 maxkeylen = key_data_len;
1267 if (key_data_len > sizeof(gd->gtk)) {
1270 (unsigned long) key_data_len);
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1598 size_t plen, data_len, key_data_len; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h45 const u8 *key_data, size_t key_data_len);
65 const u8 *key_data, size_t key_data_len)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
H A Dpeerkey.c657 size_t key_data_len)
671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
672 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 ||
763 size_t key_data_len)
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 ||
809 size_t key_data_len)
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) {
1115 const u8 *key_data, size_t key_data_len)
653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
[all...]
H A Dwpa.c383 size_t key_data_len)
406 key_data, key_data_len);
407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1073 size_t key_data_len)
1084 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1085 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1241 size_t key_data_len, u16 key_info,
1247 maxkeylen = key_data_len;
1267 if (key_data_len > sizeof(gd->gtk)) {
1270 (unsigned long) key_data_len);
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1598 size_t plen, data_len, key_data_len; local
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c1289 int key_data_len, pad_len = 0; local
1319 key_data_len = kde_len;
1324 pad_len = key_data_len % 8;
1327 key_data_len += pad_len + 8;
1330 len += key_data_len;
1376 buf = os_zalloc(key_data_len);
1389 buf, key_data_len);
1394 (key_data_len - 8) / 8, buf,
1400 WPA_PUT_BE16(key->key_data_length, key_data_len);
1408 os_memcpy(key + 1, buf, key_data_len);
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.c1289 int key_data_len, pad_len = 0; local
1319 key_data_len = kde_len;
1324 pad_len = key_data_len % 8;
1327 key_data_len += pad_len + 8;
1330 len += key_data_len;
1376 buf = os_zalloc(key_data_len);
1389 buf, key_data_len);
1394 (key_data_len - 8) / 8, buf,
1400 WPA_PUT_BE16(key->key_data_length, key_data_len);
1408 os_memcpy(key + 1, buf, key_data_len);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth.c1289 int key_data_len, pad_len = 0; local
1319 key_data_len = kde_len;
1324 pad_len = key_data_len % 8;
1327 key_data_len += pad_len + 8;
1330 len += key_data_len;
1376 buf = os_zalloc(key_data_len);
1389 buf, key_data_len);
1394 (key_data_len - 8) / 8, buf,
1400 WPA_PUT_BE16(key->key_data_length, key_data_len);
1408 os_memcpy(key + 1, buf, key_data_len);
[all...]

Completed in 883 milliseconds