/external/webrtc/webrtc/modules/rtp_rtcp/source/ |
H A D | dtmf_queue.cc | 28 int32_t DTMFqueue::AddDTMF(uint8_t key, uint16_t len, uint8_t level) { argument 35 dtmf_key_[index] = key;
|
/external/webrtc/webrtc/voice_engine/ |
H A D | dtmf_inband_queue.cc | 32 DtmfInbandQueue::AddDtmf(uint8_t key, uint16_t len, uint8_t level) argument 43 _DtmfKey[index] = key;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 34 ctx = aes_encrypt_init(key, 16); 54 * @key: Decryption key 60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 70 ctx = aes_decrypt_init(key, 16);
|
H A D | aes-ctr.c | 18 * @key: Key for encryption (key_len bytes) 19 * @key_len: Length of the key (16, 24, or 32 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument 34 ctx = aes_encrypt_init(key, key_len); 61 * @key: Key for encryption (key_len bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
|
H A D | md5.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 29 j = (j + S[i] + key[kpos]) & 0xff;
|
H A D | sha1-prf.c | 18 * @key: Key for PRF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key (e.g., PMK in IEEE 802.11i). 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 17 * @key: Key for PRF 18 * @key_len: Length of the key in bytes 20 * @seed: Seed value to bind into the key 22 * @buf: Buffer for the generated pseudo-random key 23 * @buf_len: Number of bytes of key to generate 27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5. 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */ 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | sha256.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */ 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk; 54 * where K is an n byte key 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | sha384.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ 42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */ 44 if (sha384_vector(1, &key, &key_len, tk) < 0) 46 key = tk; 54 * where K is an n byte key 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs8.c | 2 * PKCS #8 (Private-key information syntax) 62 "beginning of private key; not found; assume " 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 180 struct crypto_private_key *key; local 181 key = pkcs8_key_import(data, data_len); 183 return key;
|
H A D | tlsv1_cred.h | 15 struct crypto_private_key *key; member in struct:tlsv1_credentials
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 34 ctx = aes_encrypt_init(key, 16); 54 * @key: Decryption key 60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 70 ctx = aes_decrypt_init(key, 16);
|
H A D | aes-ctr.c | 18 * @key: Key for encryption (key_len bytes) 19 * @key_len: Length of the key (16, 24, or 32 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument 34 ctx = aes_encrypt_init(key, key_len); 61 * @key: Key for encryption (key_len bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
|
H A D | md5.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = MD5(key) */ 45 if (md5_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument 29 j = (j + S[i] + key[kpos]) & 0xff;
|
H A D | sha1-prf.c | 18 * @key: Key for PRF 19 * @key_len: Length of the key in bytes 21 * @data: Extra data to bind into the key 23 * @buf: Buffer for the generated pseudo-random key 24 * @buf_len: Number of bytes of key to generate 28 * given key (e.g., PMK in IEEE 802.11i). 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 17 * @key: Key for PRF 18 * @key_len: Length of the key in bytes 20 * @seed: Seed value to bind into the key 22 * @buf: Buffer for the generated pseudo-random key 23 * @buf_len: Number of bytes of key to generate 27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5. 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
|
H A D | sha1.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */ 45 if (sha1_vector(1, &key, &key_len, tk)) 47 key = tk; 55 * where K is an n byte key 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | sha256.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */ 42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */ 44 if (sha256_vector(1, &key, &key_len, tk) < 0) 46 key = tk; 54 * where K is an n byte key 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | sha384.c | 18 * @key: Key for HMAC operations 19 * @key_len: Length of the key in bytes 26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, argument 29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */ 42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */ 44 if (sha384_vector(1, &key, &key_len, tk) < 0) 46 key = tk; 54 * where K is an n byte key 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs8.c | 2 * PKCS #8 (Private-key information syntax) 62 "beginning of private key; not found; assume " 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 180 struct crypto_private_key *key; local 181 key = pkcs8_key_import(data, data_len); 183 return key;
|
H A D | tlsv1_cred.h | 15 struct crypto_private_key *key; member in struct:tlsv1_credentials
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-cbc.c | 18 * @key: Encryption key 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 34 ctx = aes_encrypt_init(key, 16); 54 * @key: Decryption key 60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 70 ctx = aes_decrypt_init(key, 16);
|