/external/boringssl/src/crypto/cipher/ |
H A D | internal.h | 75 uint8_t key_len; member in struct:evp_aead_st 82 int (*init)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len, 84 int (*init_with_direction)(EVP_AEAD_CTX *, const uint8_t *key, size_t key_len,
|
/external/openssh/ |
H A D | mac.h | 36 u_int key_len; member in struct:sshmac
|
/external/srtp/crypto/cipher/ |
H A D | null_cipher.c | 56 null_cipher_alloc(cipher_t **c, int key_len) { argument 61 "allocating cipher with key length %d", key_len); 74 (*c)->key_len = key_len;
|
/external/srtp/crypto/include/ |
H A D | cryptoalg.h | 106 unsigned key_len; member in struct:cryptoalg_ctx_t 114 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (md5_vector(1, &key, &key_len, tk)) 48 key_len = 16; 62 os_memcpy(k_pad, key, key_len); 79 os_memcpy(k_pad, key, key_len); 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 108 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (sha1_vector(1, &key, &key_len, tk)) 48 key_len = 20; 62 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 106 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
H A D | crypto_internal.c | 27 size_t key_len; member in struct:crypto_hash 32 size_t key_len) 58 if (key_len > sizeof(k_pad)) { 60 MD5Update(&ctx->u.md5, key, key_len); 63 key_len = 16; 65 os_memcpy(ctx->key, key, key_len); 66 ctx->key_len = key_len; 68 os_memcpy(k_pad, key, key_len); 69 if (key_len < sizeo 31 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) argument [all...] |
H A D | sha256-prf.c | 19 * @key_len: Length of the key in bytes 29 void sha256_prf(const u8 *key, size_t key_len, const char *label, argument 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 39 * @key_len: Length of the key in bytes 51 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label, argument 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (md5_vector(1, &key, &key_len, tk)) 48 key_len = 16; 62 os_memcpy(k_pad, key, key_len); 79 os_memcpy(k_pad, key, key_len); 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 108 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (sha1_vector(1, &key, &key_len, tk)) 48 key_len = 20; 62 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 106 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (md5_vector(1, &key, &key_len, tk)) 48 key_len = 16; 62 os_memcpy(k_pad, key, key_len); 79 os_memcpy(k_pad, key, key_len); 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 108 return hmac_md5_vector(key, key_len, [all...] |
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 44 if (key_len > 64) { 45 if (sha1_vector(1, &key, &key_len, tk)) 48 key_len = 20; 62 os_memcpy(k_pad, key, key_len); 78 os_memcpy(k_pad, key, key_len); 97 * @key_len: Length of the key in bytes 103 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 106 return hmac_sha1_vector(key, key_len, [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 43 if (key_len > 64) { 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 47 key_len = 32; 61 os_memcpy(k_pad, key, key_len); 77 os_memcpy(k_pad, key, key_len); 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 103 return hmac_sha256_vector(key, key_len, [all...] |
/external/srtp/crypto/hash/ |
H A D | null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { argument 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 74 (*a)->key_len = key_len; 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) { argument
|
/external/tcpdump/ |
H A D | signature.c | 54 unsigned int key_len, u_int8_t *digest) 63 if (key_len > 64) { 68 MD5_Update(&tctx, key, key_len); 72 key_len = 16; 89 memcpy(k_ipad, key, key_len); 90 memcpy(k_opad, key, key_len); 53 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument
|
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | rsa_utility.c | 16 int key_len; /* Key length in bytes. (int type matches siglen_map) */ local 18 key_len = siglen_map[algorithm]; 20 * 2 * key_len bytes for the n and rr arrays 23 *out_size = (2 * key_len + sizeof(uint32_t) + sizeof(uint32_t)); 51 uint64_t key_len; local 57 key_len = key->len; 58 key_len *= sizeof(uint32_t); 61 if (RSA1024NUMBYTES != key_len && 62 RSA2048NUMBYTES != key_len && 63 RSA4096NUMBYTES != key_len [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
|