/external/zlib/src/contrib/puff/ |
H A D | puff.c | 101 unsigned long outlen; /* available space at out */ member in struct:state 185 if (s->outcnt + len > s->outlen) 466 if (s->outcnt == s->outlen) 491 if (s->outcnt + len > s->outlen) 804 s.outlen = *destlen; /* ignored if dest is NIL */
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto.h | 316 * @outlen: Length of output buffer in bytes; set to used length on success 325 u8 *out, size_t *outlen); 333 * @outlen: Length of output buffer in bytes; set to used length on success 342 u8 *out, size_t *outlen); 350 * @outlen: Length of output buffer in bytes; set to used length on success 359 u8 *out, size_t *outlen);
|
H A D | crypto_cryptoapi.c | 703 u8 *out, size_t *outlen) 709 if (*outlen < inlen) 711 tmp = malloc(*outlen); 717 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) { 724 *outlen = clen; 727 for (i = 0; i < *outlen; i++) 728 out[i] = tmp[*outlen - 1 - i]; 738 u8 *out, size_t *outlen) 701 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 736 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | crypto_libtomcrypt.c | 488 u8 *out, size_t *outlen) 503 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 505 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 507 (unsigned long) *outlen, 551 u8 *out, size_t *outlen) 559 out, outlen) < 0) 562 len = *outlen; 569 *outlen = len; 577 u8 *out, size_t *outlen) 580 out, outlen); 486 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 549 crypto_rsa_encrypt_pkcs1(int block_type, rsa_key *key, int key_type, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 575 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 584 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | crypto_openssl.c | 803 size_t outlen, i; local 815 if (!CMAC_Final(ctx, mac, &outlen) || outlen != 16)
|
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 79 for (i = 0; i < outlen; i++) { 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha1.h | 24 size_t seed_len, u8 *out, size_t outlen);
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256.h | 25 u8 *out, size_t outlen);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | pkcs1.h | 17 u8 *out, size_t *outlen); 20 u8 *out, size_t *outlen);
|
H A D | rsa.c | 260 * @outlen: Maximum size of the output buffer and used size on success 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument 330 if (modlen > *outlen) { 331 *outlen = modlen; 338 *outlen = modlen;
|
H A D | rsa.h | 22 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen,
|
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 327 out, outlen); 333 outlen); 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | tlsv1_common.h | 259 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
H A D | tlsv1_server_read.c | 488 size_t outlen, outbuflen; local 509 outbuflen = outlen = end - pos; 510 out = os_malloc(outlen >= TLS_PRE_MASTER_SECRET_LEN ? 511 outlen : TLS_PRE_MASTER_SECRET_LEN); 538 out, &outlen) < 0) { 540 "PreMasterSecret (encr_len=%u outlen=%lu)", 541 encr_len, (unsigned long) outlen); 545 if (!use_random && outlen != TLS_PRE_MASTER_SECRET_LEN) { 547 (unsigned long) outlen); 559 outlen [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto.h | 316 * @outlen: Length of output buffer in bytes; set to used length on success 325 u8 *out, size_t *outlen); 333 * @outlen: Length of output buffer in bytes; set to used length on success 342 u8 *out, size_t *outlen); 350 * @outlen: Length of output buffer in bytes; set to used length on success 359 u8 *out, size_t *outlen);
|
H A D | crypto_cryptoapi.c | 703 u8 *out, size_t *outlen) 709 if (*outlen < inlen) 711 tmp = malloc(*outlen); 717 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) { 724 *outlen = clen; 727 for (i = 0; i < *outlen; i++) 728 out[i] = tmp[*outlen - 1 - i]; 738 u8 *out, size_t *outlen) 701 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 736 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | crypto_libtomcrypt.c | 488 u8 *out, size_t *outlen) 503 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 505 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 507 (unsigned long) *outlen, 551 u8 *out, size_t *outlen) 559 out, outlen) < 0) 562 len = *outlen; 569 *outlen = len; 577 u8 *out, size_t *outlen) 580 out, outlen); 486 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 549 crypto_rsa_encrypt_pkcs1(int block_type, rsa_key *key, int key_type, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 575 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 584 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | crypto_openssl.c | 803 size_t outlen, i; local 815 if (!CMAC_Final(ctx, mac, &outlen) || outlen != 16)
|
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 79 for (i = 0; i < outlen; i++) { 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha1.h | 24 size_t seed_len, u8 *out, size_t outlen);
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|