/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 17 * aes_unwrap - Unwrap key with AES Key Wrap Algorithm (RFC3394) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
H A D | aes_wrap.h | 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_module_tests.c | 621 if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41, 642 if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42, 663 if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43, 684 if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44, 705 if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45, 725 if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46,
|
H A D | crypto_openssl.c | 374 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 17 * aes_unwrap - Unwrap key with AES Key Wrap Algorithm (RFC3394) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
H A D | aes_wrap.h | 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_module_tests.c | 621 if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41, 642 if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42, 663 if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43, 684 if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44, 705 if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45, 725 if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46,
|
H A D | crypto_openssl.c | 374 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 17 * aes_unwrap - Unwrap key with AES Key Wrap Algorithm (RFC3394) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
H A D | aes_wrap.h | 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_module_tests.c | 621 if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41, 642 if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42, 663 if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43, 684 if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44, 705 if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45, 725 if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46,
|
H A D | crypto_openssl.c | 374 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, function
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 562 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 642 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
|
H A D | wpa.c | 1435 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, 1671 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 562 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 642 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
|
H A D | wpa.c | 1435 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, 1671 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 562 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 642 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
|
H A D | wpa.c | 1435 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, 1671 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 1342 /* aes_unwrap() does not support inplace decryption, so use a temporary 1344 if (aes_unwrap(r1kh->key, sizeof(r1kh->key), 1476 /* aes_unwrap() does not support inplace decryption, so use a temporary 1478 if (aes_unwrap(r0kh->key, sizeof(r0kh->key), 1548 /* aes_unwrap() does not support inplace decryption, so use a temporary 1550 if (aes_unwrap(r0kh->key, sizeof(r0kh->key),
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 1342 /* aes_unwrap() does not support inplace decryption, so use a temporary 1344 if (aes_unwrap(r1kh->key, sizeof(r1kh->key), 1476 /* aes_unwrap() does not support inplace decryption, so use a temporary 1478 if (aes_unwrap(r0kh->key, sizeof(r0kh->key), 1548 /* aes_unwrap() does not support inplace decryption, so use a temporary 1550 if (aes_unwrap(r0kh->key, sizeof(r0kh->key),
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 1342 /* aes_unwrap() does not support inplace decryption, so use a temporary 1344 if (aes_unwrap(r1kh->key, sizeof(r1kh->key), 1476 /* aes_unwrap() does not support inplace decryption, so use a temporary 1478 if (aes_unwrap(r0kh->key, sizeof(r0kh->key), 1548 /* aes_unwrap() does not support inplace decryption, so use a temporary 1550 if (aes_unwrap(r0kh->key, sizeof(r0kh->key),
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 164 if (aes_unwrap(data->pac_opaque_encr, sizeof(data->pac_opaque_encr),
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 164 if (aes_unwrap(data->pac_opaque_encr, sizeof(data->pac_opaque_encr),
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 164 if (aes_unwrap(data->pac_opaque_encr, sizeof(data->pac_opaque_encr),
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 1619 if (aes_unwrap(participant->kek.key, 16, sak_len >> 3, wrap_sak,
|