Searched refs:decrypt_len (Results 1 - 7 of 7) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c521 size_t decrypt_len; local
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
593 size_t decrypt_len; local
612 decrypt_len = sizeof(nonce);
614 nonce, &decrypt_len) < 0) {
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c521 size_t decrypt_len; local
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
593 size_t decrypt_len; local
612 decrypt_len = sizeof(nonce);
614 nonce, &decrypt_len) < 0) {
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c521 size_t decrypt_len; local
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
593 size_t decrypt_len; local
612 decrypt_len = sizeof(nonce);
614 nonce, &decrypt_len) < 0) {
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c511 size_t decrypt_len; local
533 decrypt_len = sizeof(nonces);
535 nonces, &decrypt_len) < 0) {
540 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c511 size_t decrypt_len; local
533 decrypt_len = sizeof(nonces);
535 nonces, &decrypt_len) < 0) {
540 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c511 size_t decrypt_len; local
533 decrypt_len = sizeof(nonces);
535 nonces, &decrypt_len) < 0) {
540 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
/external/boringssl/src/ssl/
H A Ds3_srvr.c1682 size_t rsa_size, decrypt_len, premaster_index, j; local
1743 if (!RSA_decrypt(rsa, &decrypt_len, decrypt_buf, rsa_size,
1748 if (decrypt_len != rsa_size) {
1756 /* Remove the PKCS#1 padding and adjust |decrypt_len| as appropriate.
1761 decrypt_buf, decrypt_len, &premaster_index),
1763 decrypt_len = decrypt_len - premaster_index;
1765 /* decrypt_len should be SSL_MAX_MASTER_KEY_LENGTH. */
1766 good &= constant_time_eq_8(decrypt_len, SSL_MAX_MASTER_KEY_LENGTH);

Completed in 196 milliseconds