Searched defs:in (Results 76 - 100 of 1566) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/src/crypto/
H A Dmd4-internal.c48 * written by Colin Plumb in 1993, no copyright is claimed.
49 * This code is in the public domain; do with it what you wish.
128 /* Process data in MD4_BLOCK_LENGTH-byte chunks. */
150 /* Convert count to 8 bytes in little endian order. */
163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
185 /* This is the central step in the MD4 algorithm. */
197 u32 a, b, c, d, in[MD4_BLOCK_LENGTH / 4]; local
200 os_memcpy(in, block, sizeof(in));
203 in[
[all...]
H A Dmd5-internal.c17 static void MD5Transform(u32 buf[4], u32 const in[16]);
25 * @num_elem: Number of elements in the data vector
48 * written by Colin Plumb in 1993, no copyright is claimed.
49 * This code is in the public domain; do with it what you wish.
110 t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */
115 unsigned char *p = (unsigned char *) ctx->in + t;
123 byteReverse(ctx->in, 16);
124 MD5Transform(ctx->buf, (u32 *) ctx->in);
128 /* Process data in 64-byte chunks */
131 os_memcpy(ctx->in, bu
205 MD5Transform(u32 buf[4], u32 const in[16]) argument
[all...]
H A Dmd5_i.h15 u8 in[64]; member in struct:MD5Context
H A Dsha256-internal.c19 * @num_elem: Number of elements in the data vector
43 /* This is based on SHA256 implementation in LibTomCrypt that was released into
141 @param in The data to hash
145 int sha256_process(struct sha256_state *md, const unsigned char *in, argument
155 if (sha256_compress(md, (unsigned char *) in) < 0)
158 in += SHA256_BLOCK_SIZE;
162 os_memcpy(md->buf + md->curlen, in, n);
164 in += n;
/external/wpa_supplicant_8/src/tls/
H A Dpkcs1.c19 const u8 *in, size_t inlen,
32 * k = length of modulus in octets (modlen)
75 os_memcpy(pos, in, inlen); /* D */
82 int use_private, const u8 *in, size_t inlen,
89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen,
98 const u8 *in, size_t inlen,
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1);
151 * k = length of modulus in octets
18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Drsa.c58 * @len: Key buffer length in bytes
106 "RSA: Extra data in public key SEQUENCE",
145 * @len: Key buffer length in bytes
210 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
231 "RSA: Extra data in public key SEQUENCE",
257 * @in: Input data
265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument
279 if (bignum_set_unsigned_bin(tmp, in, inlen) < 0)
/external/wpa_supplicant_8/src/utils/
H A Dbase64.c27 * not included in out_len.
33 const unsigned char *end, *in; local
47 in = src;
50 while (end - in >= 3) {
51 *pos++ = base64_table[in[0] >> 2];
52 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
53 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
54 *pos++ = base64_table[in[
[all...]
H A Dhttp_curl.c878 BIO *in, *out; local
884 in = BIO_new_file(fname, "r");
885 if (in == NULL) {
890 cert = d2i_X509_bio(in, NULL);
891 BIO_free(in);
H A Dxml-utils.c228 xml_node_t *in, const char *uri)
236 xml_node_for_each_child(ctx, node, in) {
227 node_to_tnds(struct xml_node_ctx *ctx, xml_node_t *out, xml_node_t *in, const char *uri) argument
/external/wpa_supplicant_8/src/wps/
H A Dupnp_xml.c22 * XML is a markup language based on unicode; usually (and in our case,
33 * characters that would appear in the payload data are rewritten using
51 * As it turns out, we can ignore the namespaces, in fact we can ignore the
53 * unique (not in general, but for this application). We do however have to be
58 * any special chars in our payload.
63 * @in: Input
75 * Note that angle brackets present in the original data must have been encoded
78 int xml_next_tag(const char *in, const char **out, argument
81 while (*in && *in !
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-ccm.c92 static void aes_ccm_encr(void *aes, size_t L, const u8 *in, size_t len, u8 *out, argument
103 xor_aes_block(out, in);
105 in += AES_BLOCK_SIZE;
112 *out++ ^= *in++;
H A Daes-encblock.c19 * @in: Input data (16 bytes)
23 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out) argument
29 aes_encrypt(ctx, in, out);
H A Daes-gcm.c64 /* Multiplication in GF(2^128) */
215 static void aes_gcm_gctr(void *aes, const u8 *J0, const u8 *in, size_t len, argument
225 aes_gctr(aes, J0inc, in, len, out);
238 * (i.e., zero padded to block size A || C and lengths of each in bits)
H A Dcrypto_cryptoapi.c702 const u8 *in, size_t inlen,
715 os_memcpy(tmp, in, inlen);
737 const u8 *in, size_t inlen,
701 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
736 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Dcrypto_internal-rsa.c67 /* No X.509 support in crypto_internal.c */
73 const u8 *in, size_t inlen,
77 0, in, inlen, out, outlen);
82 const u8 *in, size_t inlen,
86 in, inlen, out, outlen);
91 const u8 *in, size_t inlen,
95 1, in, inlen, out, outlen);
72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Dcrypto_libtomcrypt.c481 /* No X.509 support in LibTomCrypt */
487 const u8 *in, size_t inlen,
500 * k = length of modulus in octets (modlen)
543 os_memcpy(pos, in, inlen); /* D */
550 const u8 *in, size_t inlen,
558 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen,
576 const u8 *in, size_t inlen,
579 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen,
585 const u8 *in, size_t inlen,
588 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inle
486 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
549 crypto_rsa_encrypt_pkcs1(int block_type, rsa_key *key, int key_type, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
575 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
584 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
[all...]
H A Dmd4-internal.c48 * written by Colin Plumb in 1993, no copyright is claimed.
49 * This code is in the public domain; do with it what you wish.
128 /* Process data in MD4_BLOCK_LENGTH-byte chunks. */
150 /* Convert count to 8 bytes in little endian order. */
163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
185 /* This is the central step in the MD4 algorithm. */
197 u32 a, b, c, d, in[MD4_BLOCK_LENGTH / 4]; local
200 os_memcpy(in, block, sizeof(in));
203 in[
[all...]
H A Dmd5-internal.c17 static void MD5Transform(u32 buf[4], u32 const in[16]);
25 * @num_elem: Number of elements in the data vector
48 * written by Colin Plumb in 1993, no copyright is claimed.
49 * This code is in the public domain; do with it what you wish.
110 t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */
115 unsigned char *p = (unsigned char *) ctx->in + t;
123 byteReverse(ctx->in, 16);
124 MD5Transform(ctx->buf, (u32 *) ctx->in);
128 /* Process data in 64-byte chunks */
131 os_memcpy(ctx->in, bu
205 MD5Transform(u32 buf[4], u32 const in[16]) argument
[all...]
H A Dmd5_i.h15 u8 in[64]; member in struct:MD5Context
H A Dsha256-internal.c19 * @num_elem: Number of elements in the data vector
43 /* This is based on SHA256 implementation in LibTomCrypt that was released into
141 @param in The data to hash
145 int sha256_process(struct sha256_state *md, const unsigned char *in, argument
155 if (sha256_compress(md, (unsigned char *) in) < 0)
158 in += SHA256_BLOCK_SIZE;
162 os_memcpy(md->buf + md->curlen, in, n);
164 in += n;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs1.c19 const u8 *in, size_t inlen,
32 * k = length of modulus in octets (modlen)
75 os_memcpy(pos, in, inlen); /* D */
82 int use_private, const u8 *in, size_t inlen,
89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen,
98 const u8 *in, size_t inlen,
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1);
151 * k = length of modulus in octets
18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Drsa.c58 * @len: Key buffer length in bytes
106 "RSA: Extra data in public key SEQUENCE",
145 * @len: Key buffer length in bytes
210 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
231 "RSA: Extra data in public key SEQUENCE",
257 * @in: Input data
265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument
279 if (bignum_set_unsigned_bin(tmp, in, inlen) < 0)
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dbase64.c27 * not included in out_len.
33 const unsigned char *end, *in; local
47 in = src;
50 while (end - in >= 3) {
51 *pos++ = base64_table[in[0] >> 2];
52 *pos++ = base64_table[((in[0] & 0x03) << 4) | (in[1] >> 4)];
53 *pos++ = base64_table[((in[1] & 0x0f) << 2) | (in[2] >> 6)];
54 *pos++ = base64_table[in[
[all...]
H A Dhttp_curl.c878 BIO *in, *out; local
884 in = BIO_new_file(fname, "r");
885 if (in == NULL) {
890 cert = d2i_X509_bio(in, NULL);
891 BIO_free(in);
H A Dxml-utils.c228 xml_node_t *in, const char *uri)
236 xml_node_for_each_child(ctx, node, in) {
227 node_to_tnds(struct xml_node_ctx *ctx, xml_node_t *out, xml_node_t *in, const char *uri) argument

Completed in 147 milliseconds

1234567891011>>