/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-siv.c | 171 size_t crypt_len; local 180 crypt_len = iv_c_len - AES_BLOCK_SIZE; 190 _len[num_elem] = crypt_len; 193 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 198 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x); 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto.h | 408 * @crypt_len: Encrypted signature data length 409 * @plain: Buffer for plaintext (at least crypt_len bytes) 414 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-siv.c | 171 size_t crypt_len; local 180 crypt_len = iv_c_len - AES_BLOCK_SIZE; 190 _len[num_elem] = crypt_len; 193 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 198 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x); 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto.h | 408 * @crypt_len: Encrypted signature data length 409 * @plain: Buffer for plaintext (at least crypt_len bytes) 414 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-siv.c | 171 size_t crypt_len; local 180 crypt_len = iv_c_len - AES_BLOCK_SIZE; 190 _len[num_elem] = crypt_len; 193 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 198 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x); 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto.h | 408 * @crypt_len: Encrypted signature data length 409 * @plain: Buffer for plaintext (at least crypt_len bytes) 414 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh_rsn.c | 624 size_t crypt_len; local 656 crypt_len = elems_len - (elems->mic - start); 657 if (crypt_len < 2 + AES_BLOCK_SIZE) { 663 crypt = os_zalloc(crypt_len); 670 os_memcpy(crypt, elems->mic, crypt_len); 672 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, 679 crypt_len -= AES_BLOCK_SIZE; 681 ampe_buf, crypt_len); 687 (size_t) 2 + ampe_ie_len > crypt_len ||
|