Searched defs:len (Results 601 - 625 of 5216) sorted by last modified time

<<21222324252627282930>>

/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dcommon_module_tests.c18 size_t len; member in struct:ieee802_11_parse_test_data
64 res = ieee802_11_parse_elems(test->data, test->len, &elems, 1);
66 ieee802_11_ie_count(test->data, test->len) != test->count) {
86 size_t len; member in struct:rsn_ie_parse_test_data
150 if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
H A Dgas.c221 u8 *len; local
244 len = wpabuf_mhead_u8(buf) + offset;
245 WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2);
H A Dieee802_11_common.c29 "information element ignored (len=%lu)",
52 "(len=%lu)",
75 "(subtype=%d len=%lu)",
88 "(type=%d len=%lu)",
119 "(type=%d len=%lu)",
134 "(type=%d len=%lu)",
143 "%02x:%02x:%02x len=%lu)",
155 * @len: Length of IE buffer in octets
160 ParseRes ieee802_11_parse_elems(const u8 *start, size_t len, argument
164 size_t left = len;
381 get_hdr_bssid(const struct ieee80211_hdr *hdr, size_t len) argument
[all...]
H A Dieee802_11_defs.h1222 u8 len; member in struct:wnm_sleep_element
H A Dsae.c105 static void buf_shift_right(u8 *buf, size_t len, size_t bits) argument
108 for (i = len - 1; i > 0; i--)
297 size_t len[2]; local
321 len[0] = password_len;
323 len[1] = sizeof(counter);
341 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len,
373 size_t len[2]; local
393 len[0] = password_len;
395 len[1] = sizeof(counter);
408 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len,
893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument
928 size_t len[5]; local
1025 sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len) argument
[all...]
H A Dwpa_common.c28 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame)
41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument
49 return hmac_md5(key, 16, buf, len, mic);
52 if (hmac_sha1(key, 16, buf, len, hash))
58 return omac1_aes_128(key, buf, len, mic);
63 return omac1_aes_128(key, buf, len, mic);
461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
469 hdr->len != rsn_ie_len - 2 ||
643 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
651 hdr->len !
746 size_t len[2]; local
797 size_t len[4]; local
855 size_t len[6]; local
914 const size_t len[3] = { 8, ETH_ALEN, ETH_ALEN }; local
[all...]
H A Dwpa_common.h228 u8 len; member in struct:wpa_ie_hdr
260 u8 len; member in struct:rsn_ie_hdr
330 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len,
H A Dwpa_ctrl.c281 size_t len; local
414 len = sizeof(buf) - 1;
415 if (wpa_ctrl_request(ctrl, "GET_COOKIE", 10, buf, &len, NULL) == 0) {
416 buf[len] = '\0';
420 if (wpa_ctrl_request(ctrl, "IFNAME", 6, buf, &len, NULL) == 0) {
421 buf[len] = '\0';
454 void (*msg_cb)(char *msg, size_t len))
555 size_t len = 10; local
558 buf, &len, NULL);
561 if (len
452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
709 DWORD len = *reply_len; local
[all...]
H A Dwpa_helpers.c39 size_t len; local
45 len = sizeof(buf);
46 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL) < 0) {
52 buf[len] = '\0';
65 size_t len; local
71 len = resp_size;
72 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), resp, &len, NULL) < 0) {
78 resp[len] = '\0';
116 size_t len; local
131 len
169 size_t len, flen; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-ccm.c64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) argument
66 size_t last = len % AES_BLOCK_SIZE;
69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) {
92 static void aes_ccm_encr(void *aes, size_t L, const u8 *in, size_t len, u8 *out, argument
95 size_t last = len % AES_BLOCK_SIZE;
99 for (i = 1; i <= len / AES_BLOCK_SIZE; i++) {
H A Daes-ctr.c28 size_t j, len, left = data_len; local
41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE;
42 for (j = 0; j < len; j++)
44 pos += len;
45 left -= len;
H A Daes-gcm.c197 /* Prepare block J_0 = IV || 0^31 || 1 [len(IV) = 96] */
203 * s = 128 * ceil(len(IV)/128) - len(IV)
204 * J_0 = GHASH_H(IV || 0^(s+64) || [len(IV)]_64)
215 static void aes_gcm_gctr(void *aes, const u8 *J0, const u8 *in, size_t len, argument
220 if (len == 0)
225 aes_gctr(aes, J0inc, in, len, out);
235 * u = 128 * ceil[len(C)/128] - len(C)
236 * v = 128 * ceil[len(
[all...]
H A Daes-internal-dec.c59 void * aes_decrypt_init(const u8 *key, size_t len) argument
66 res = rijndaelKeySetupDec(rk, key, len * 8);
H A Daes-internal-enc.c98 void * aes_encrypt_init(const u8 *key, size_t len) argument
105 res = rijndaelKeySetupEnc(rk, key, len * 8);
H A Daes-omac1.c34 * @len: Lengths of the data blocks
43 const u8 *addr[], const size_t *len, u8 *mac)
57 total_len += len[e];
62 end = pos + len[0];
70 end = pos + len[e];
88 end = pos + len[e];
42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
H A Dcrypto_cryptoapi.c107 const u8 *addr[], const size_t *len, u8 *mac)
127 if (!CryptHashData(hash, (BYTE *) addr[i], len[i], 0)) {
147 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
149 return cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac);
162 DWORD len; member in struct:__anon34087
171 key_blob.len = 8;
218 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
220 return cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac);
224 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
226 return cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, ma
106 cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
236 aes_encrypt_init(const u8 *key, size_t len) argument
241 DWORD len; member in struct:__anon34088
317 aes_decrypt_init(const u8 *key, size_t len) argument
359 DWORD len; member in struct:__anon34089
455 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument
467 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument
514 DWORD len; member in struct:__anon34090
590 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
607 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
642 crypto_public_key_import(const u8 *key, size_t len) argument
649 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument
658 crypto_public_key_from_cert(const u8 *buf, size_t len) argument
[all...]
H A Dcrypto_gnutls.c15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
24 gcry_md_write(hd, addr[i], len[i]);
55 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
64 gcry_md_write(hd, addr[i], len[i]);
73 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
82 gcry_md_write(hd, addr[i], len[i]);
91 void * aes_encrypt_init(const u8 *key, size_t len) argument
100 if (gcry_cipher_setkey(hd, key, len) != GPG_ERR_NO_ERROR) {
124 void * aes_decrypt_init(const u8 *key, size_t len) argument
131 if (gcry_cipher_setkey(hd, key, len) !
274 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
284 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
H A Dcrypto_internal-cipher.c104 u8 *crypt, size_t len)
111 os_memcpy(crypt, plain, len);
113 ctx->u.rc4.used_bytes, crypt, len);
114 ctx->u.rc4.used_bytes += len;
117 if (len % AES_BLOCK_SIZE)
119 blocks = len / AES_BLOCK_SIZE;
131 if (len % 8)
133 blocks = len / 8;
145 if (len % 8)
147 blocks = len /
103 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
H A Dcrypto_internal-rsa.c22 struct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len) argument
25 crypto_rsa_import_public_key(key, len);
39 size_t len,
45 res = pkcs8_key_import(key, len);
51 res = pkcs8_enc_key_import(key, len, passwd);
60 crypto_rsa_import_private_key(key, len);
65 size_t len)
38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument
64 crypto_public_key_from_cert(const u8 *buf, size_t len) argument
H A Dcrypto_internal.c125 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument
133 MD5Update(&ctx->u.md5, data, len);
137 SHA1Update(&ctx->u.sha1, data, len);
142 sha256_process(&ctx->u.sha256, data, len);
151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument
159 if (mac == NULL || len == NULL) {
166 if (*len < 16) {
167 *len = 16;
171 *len = 16;
175 if (*len < 2
[all...]
H A Dcrypto_libtomcrypt.c25 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
32 md4_process(&md, addr[i], len[i]);
59 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
66 md5_process(&md, addr[i], len[i]);
72 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
79 sha1_process(&md, addr[i], len[i]);
85 void * aes_encrypt_init(const u8 *key, size_t len) argument
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
114 void * aes_decrypt_init(const u8 *key, size_t len) argument
120 if (aes_setup(key, len,
194 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument
214 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument
350 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
374 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
416 crypto_public_key_import(const u8 *key, size_t len) argument
446 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument
478 crypto_public_key_from_cert(const u8 *buf, size_t len) argument
553 unsigned long len, modlen; local
616 unsigned long len; local
[all...]
H A Dcrypto_none.c15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
H A Dcrypto_nss.c25 size_t num_elem, const u8 *addr[], const size_t *len,
38 HASH_Update(ctx, addr[i], len[i]);
74 item.len = 8;
119 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
121 return nss_hash(HASH_AlgMD5, 16, num_elem, addr, len, mac);
125 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
127 return nss_hash(HASH_AlgSHA1, 20, num_elem, addr, len, mac);
131 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, argument
134 return nss_hash(HASH_AlgSHA256, 32, num_elem, addr, len, mac);
138 void * aes_encrypt_init(const u8 *key, size_t len) argument
24 nss_hash(HASH_HashType type, unsigned int max_res_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
154 aes_decrypt_init(const u8 *key, size_t len) argument
191 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
198 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
H A Dcrypto_openssl.c82 const u8 *addr[], const size_t *len, u8 *mac)
95 if (!EVP_DigestUpdate(&ctx, addr[i], len[i])) {
112 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
114 return openssl_digest_vector(EVP_md4(), num_elem, addr, len, mac);
158 size_t len = skip;
159 if (len > sizeof(skip_buf))
160 len = sizeof(skip_buf);
161 if (!EVP_CipherUpdate(&ctx, skip_buf, &outl, skip_buf, len))
163 skip -= len;
176 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u argument
81 openssl_digest_vector(const EVP_MD *type, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
182 sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
189 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
214 aes_encrypt_init(const u8 *key, size_t len) argument
251 int len = sizeof(buf); local
265 aes_decrypt_init(const u8 *key, size_t len) argument
302 int len = sizeof(buf); local
440 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
450 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
650 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument
658 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument
707 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
748 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
789 crypto_get_random(void *buf, size_t len) argument
798 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
838 crypto_bignum_init_set(const u8 *buf, size_t len) argument
1127 int len = BN_num_bytes(e->prime); local
1157 int len = BN_num_bytes(e->prime); local
[all...]
H A Dmd4-internal.c25 static void MD4Update(MD4_CTX *ctx, const unsigned char *input, size_t len);
29 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
36 MD4Update(&ctx, addr[i], len[i]);
108 static void MD4Update(MD4_CTX *ctx, const unsigned char *input, size_t len) argument
117 ctx->count += (u64)len << 3;
119 if (len >= need) {
124 len -= need;
129 while (len >= MD4_BLOCK_LENGTH) {
132 len -= MD4_BLOCK_LENGTH;
137 if (len !
[all...]

Completed in 222 milliseconds

<<21222324252627282930>>