Searched defs:key (Results 376 - 400 of 3586) sorted by relevance

<<11121314151617181920>>

/external/webrtc/webrtc/modules/rtp_rtcp/source/
H A Ddtmf_queue.cc28 int32_t DTMFqueue::AddDTMF(uint8_t key, uint16_t len, uint8_t level) { argument
35 dtmf_key_[index] = key;
/external/webrtc/webrtc/voice_engine/
H A Ddtmf_inband_queue.cc32 DtmfInbandQueue::AddDtmf(uint8_t key, uint16_t len, uint8_t level) argument
43 _DtmfKey[index] = key;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
34 ctx = aes_encrypt_init(key, 16);
54 * @key: Decryption key
60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
70 ctx = aes_decrypt_init(key, 16);
H A Daes-ctr.c18 * @key: Key for encryption (key_len bytes)
19 * @key_len: Length of the key (16, 24, or 32 bytes)
25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument
34 ctx = aes_encrypt_init(key, key_len);
61 * @key: Key for encryption (key_len bytes)
67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
H A Dmd5.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = MD5(key) */
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
29 j = (j + S[i] + key[kpos]) & 0xff;
H A Dsha1-prf.c18 * @key: Key for PRF
19 * @key_len: Length of the key in bytes
21 * @data: Extra data to bind into the key
23 * @buf: Buffer for the generated pseudo-random key
24 * @buf_len: Number of bytes of key to generate
28 * given key (e.g., PMK in IEEE 802.11i).
30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
H A Dsha1-tprf.c17 * @key: Key for PRF
18 * @key_len: Length of the key in bytes
20 * @seed: Seed value to bind into the key
22 * @buf: Buffer for the generated pseudo-random key
23 * @buf_len: Number of bytes of key to generate
27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5.
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Dsha1.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Dsha256.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
54 * where K is an n byte key
100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Dsha384.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */
42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */
44 if (sha384_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
54 * where K is an n byte key
100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs8.c2 * PKCS #8 (Private-key information syntax)
62 "beginning of private key; not found; assume "
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
180 struct crypto_private_key *key; local
181 key = pkcs8_key_import(data, data_len);
183 return key;
H A Dtlsv1_cred.h15 struct crypto_private_key *key; member in struct:tlsv1_credentials
/external/wpa_supplicant_8/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
34 ctx = aes_encrypt_init(key, 16);
54 * @key: Decryption key
60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
70 ctx = aes_decrypt_init(key, 16);
H A Daes-ctr.c18 * @key: Key for encryption (key_len bytes)
19 * @key_len: Length of the key (16, 24, or 32 bytes)
25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument
34 ctx = aes_encrypt_init(key, key_len);
61 * @key: Key for encryption (key_len bytes)
67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
H A Dmd5.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = MD5(key) */
45 if (md5_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, argument
29 j = (j + S[i] + key[kpos]) & 0xff;
H A Dsha1-prf.c18 * @key: Key for PRF
19 * @key_len: Length of the key in bytes
21 * @data: Extra data to bind into the key
23 * @buf: Buffer for the generated pseudo-random key
24 * @buf_len: Number of bytes of key to generate
28 * given key (e.g., PMK in IEEE 802.11i).
30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument
51 if (hmac_sha1_vector(key, key_len, 3, addr, len,
56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
H A Dsha1-tprf.c17 * @key: Key for PRF
18 * @key_len: Length of the key in bytes
20 * @seed: Seed value to bind into the key
22 * @buf: Buffer for the generated pseudo-random key
23 * @buf_len: Number of bytes of key to generate
27 * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5.
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash))
H A Dsha1.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
43 /* if key is longer than 64 bytes reset it to key = SHA1(key) */
45 if (sha1_vector(1, &key, &key_len, tk))
47 key = tk;
55 * where K is an n byte key
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Dsha256.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
42 /* if key is longer than 64 bytes reset it to key = SHA256(key) */
44 if (sha256_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
54 * where K is an n byte key
100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Dsha384.c18 * @key: Key for HMAC operations
19 * @key_len: Length of the key in bytes
26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, argument
29 unsigned char k_pad[128]; /* padding - key XORd with ipad/opad */
42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */
44 if (sha384_vector(1, &key, &key_len, tk) < 0)
46 key = tk;
54 * where K is an n byte key
100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dpkcs8.c2 * PKCS #8 (Private-key information syntax)
62 "beginning of private key; not found; assume "
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
180 struct crypto_private_key *key; local
181 key = pkcs8_key_import(data, data_len);
183 return key;
H A Dtlsv1_cred.h15 struct crypto_private_key *key; member in struct:tlsv1_credentials
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-cbc.c18 * @key: Encryption key
24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
34 ctx = aes_encrypt_init(key, 16);
54 * @key: Decryption key
60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
70 ctx = aes_decrypt_init(key, 16);

Completed in 250 milliseconds

<<11121314151617181920>>