/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal.c | 29 size_t key_len; member 34 size_t key_len) in crypto_hash_init() argument 55 if (key_len > sizeof(k_pad)) { in crypto_hash_init() 57 MD5Update(&ctx->u.md5, key, key_len); in crypto_hash_init() 60 key_len = 16; in crypto_hash_init() 62 os_memcpy(ctx->key, key, key_len); in crypto_hash_init() 63 ctx->key_len = key_len; in crypto_hash_init() 65 os_memcpy(k_pad, key, key_len); in crypto_hash_init() 66 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 73 if (key_len > sizeof(k_pad)) { in crypto_hash_init() [all …]
|
D | sha1.c | 32 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 49 if (key_len > 64) { in hmac_sha1_vector() 50 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector() 53 key_len = 20; in hmac_sha1_vector() 67 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 83 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 106 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 109 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 127 int sha1_prf(const u8 *key, size_t key_len, const char *label, in sha1_prf() argument 148 if (hmac_sha1_vector(key, key_len, 3, addr, len, in sha1_prf() [all …]
|
D | sha256.c | 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 48 if (key_len > 64) { in hmac_sha256_vector() 49 sha256_vector(1, &key, &key_len, tk); in hmac_sha256_vector() 51 key_len = 32; in hmac_sha256_vector() 65 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 80 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in hmac_sha256() argument 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 122 void sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 147 hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf() [all …]
|
D | md5-non-fips.c | 32 int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len, in hmac_md5_vector_non_fips_allow() argument 50 if (key_len > 64) { in hmac_md5_vector_non_fips_allow() 51 if (md5_vector_non_fips_allow(1, &key, &key_len, tk)) in hmac_md5_vector_non_fips_allow() 54 key_len = 16; in hmac_md5_vector_non_fips_allow() 68 os_memcpy(k_pad, key, key_len); in hmac_md5_vector_non_fips_allow() 85 os_memcpy(k_pad, key, key_len); in hmac_md5_vector_non_fips_allow() 108 int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data, in hmac_md5_non_fips_allow() argument 111 return hmac_md5_vector_non_fips_allow(key, key_len, 1, &data, in hmac_md5_non_fips_allow()
|
D | md5.c | 32 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 49 if (key_len > 64) { in hmac_md5_vector() 50 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector() 53 key_len = 16; in hmac_md5_vector() 67 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 84 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 107 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 110 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5()
|
D | md5.h | 20 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 22 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 25 int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len, 28 int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data,
|
D | sha1.h | 20 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 int sha1_prf(const u8 *key, size_t key_len, const char *label, 26 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
D | crypto_internal-cipher.c | 52 size_t key_len) in crypto_cipher_init() argument 64 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 68 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 69 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 72 if (key_len > sizeof(ctx->u.aes.cbc)) { in crypto_cipher_init() 76 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); in crypto_cipher_init() 81 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); in crypto_cipher_init() 87 ctx->u.aes.block_size = key_len; in crypto_cipher_init() 91 if (key_len != 24) { in crypto_cipher_init() 99 if (key_len != 8) { in crypto_cipher_init()
|
/external/wpa_supplicant/ |
D | crypto_internal.c | 62 size_t key_len; member 67 size_t key_len) in crypto_hash_init() argument 88 if (key_len > sizeof(k_pad)) { in crypto_hash_init() 90 MD5Update(&ctx->u.md5, key, key_len); in crypto_hash_init() 93 key_len = 16; in crypto_hash_init() 95 os_memcpy(ctx->key, key, key_len); in crypto_hash_init() 96 ctx->key_len = key_len; in crypto_hash_init() 98 os_memcpy(k_pad, key, key_len); in crypto_hash_init() 99 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 106 if (key_len > sizeof(k_pad)) { in crypto_hash_init() [all …]
|
D | sha256.c | 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 48 if (key_len > 64) { in hmac_sha256_vector() 49 sha256_vector(1, &key, &key_len, tk); in hmac_sha256_vector() 51 key_len = 32; in hmac_sha256_vector() 65 memcpy(k_pad, key, key_len); in hmac_sha256_vector() 80 memcpy(k_pad, key, key_len); in hmac_sha256_vector() 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in hmac_sha256() argument 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 122 void sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 144 hmac_sha256_vector(key, key_len, 3, addr, len, in sha256_prf() [all …]
|
D | sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_internal.c | 63 size_t key_len; member 68 size_t key_len) in crypto_hash_init() argument 89 if (key_len > sizeof(k_pad)) { in crypto_hash_init() 91 MD5Update(&ctx->u.md5, key, key_len); in crypto_hash_init() 94 key_len = 16; in crypto_hash_init() 96 os_memcpy(ctx->key, key, key_len); in crypto_hash_init() 97 ctx->key_len = key_len; in crypto_hash_init() 99 os_memcpy(k_pad, key, key_len); in crypto_hash_init() 100 os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); in crypto_hash_init() 107 if (key_len > sizeof(k_pad)) { in crypto_hash_init() [all …]
|
D | sha256.c | 31 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 48 if (key_len > 64) { in hmac_sha256_vector() 49 sha256_vector(1, &key, &key_len, tk); in hmac_sha256_vector() 51 key_len = 32; in hmac_sha256_vector() 65 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 80 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 102 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in hmac_sha256() argument 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 122 void sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 147 hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf() [all …]
|
D | sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/external/openssl/crypto/evp/ |
D | evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ argument 137 nid##_##nmode, block_size, key_len, iv_len, \ 149 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ argument 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 155 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ argument 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 162 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ argument 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 169 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ argument 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \ [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
D | wps_attr_process.c | 175 const u8 *key, size_t key_len) in wps_process_cred_network_key() argument 186 cred->key_len = 0; in wps_process_cred_network_key() 192 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); in wps_process_cred_network_key() 193 if (key_len <= sizeof(cred->key)) { in wps_process_cred_network_key() 194 os_memcpy(cred->key, key, key_len); in wps_process_cred_network_key() 195 cred->key_len = key_len; in wps_process_cred_network_key() 272 cred->key_len > 8 && cred->key_len < 64 && in wps_workaround_cred_key() 273 cred->key[cred->key_len - 1] == 0) { in wps_workaround_cred_key() 281 cred->key_len--; in wps_workaround_cred_key()
|
/external/srtp/crypto/hash/ |
D | hmac.c | 57 hmac_alloc(auth_t **a, int key_len, int out_len) { in hmac_alloc() argument 61 debug_print(mod_hmac, "allocating auth func with key length %d", key_len); in hmac_alloc() 68 if (key_len > 20) in hmac_alloc() 85 (*a)->key_len = key_len; in hmac_alloc() 112 hmac_init(hmac_ctx_t *state, const uint8_t *key, int key_len) { in hmac_init() argument 120 if (key_len > 20) in hmac_init() 127 for (i=0; i < key_len; i++) { in hmac_init()
|
D | null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { in null_auth_alloc() argument 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); in null_auth_alloc() 74 (*a)->key_len = key_len; in null_auth_alloc() 100 null_auth_init(null_auth_ctx_t *state, const uint8_t *key, int key_len) { in null_auth_init() argument
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_process.c | 175 const u8 *key, size_t key_len) in wps_process_cred_network_key() argument 190 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); in wps_process_cred_network_key() 191 if (key_len <= sizeof(cred->key)) { in wps_process_cred_network_key() 192 os_memcpy(cred->key, key, key_len); in wps_process_cred_network_key() 193 cred->key_len = key_len; in wps_process_cred_network_key() 270 cred->key_len > 8 && cred->key_len < 64 && in wps_workaround_cred_key() 271 cred->key[cred->key_len - 1] == 0) { in wps_workaround_cred_key() 276 cred->key, cred->key_len); in wps_workaround_cred_key() 286 cred->key_len--; in wps_workaround_cred_key()
|
/external/chromium/net/data/cache_tests/list_loop/ |
D | contents.txt | 27 key_len: 5 48 key_len: 6 69 key_len: 5 90 key_len: 7 111 key_len: 5 132 key_len: 6 153 key_len: 5 174 key_len: 5
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | ikev2_common.c | 61 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 68 if (key_len != 20) in ikev2_integ_hash() 70 hmac_sha1(key, key_len, data, data_len, tmphash); in ikev2_integ_hash() 74 if (key_len != 16) in ikev2_integ_hash() 76 hmac_md5(key, key_len, data, data_len, tmphash); in ikev2_integ_hash() 100 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 106 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 109 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 119 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 149 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 62 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 69 if (key_len != 20) in ikev2_integ_hash() 71 hmac_sha1(key, key_len, data, data_len, tmphash); in ikev2_integ_hash() 75 if (key_len != 16) in ikev2_integ_hash() 77 hmac_md5(key, key_len, data, data_len, tmphash); in ikev2_integ_hash() 101 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 107 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 110 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 120 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 150 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() [all …]
|
/external/srtp/crypto/include/ |
D | xfm.h | 77 unsigned key_len; member 84 #define xfm_get_key_len(xfm) ((xfm)->key_len) 117 unsigned key_len; member 125 #define cryptoalg_get_key_len(cryptoalg) ((cryptoalg)->key_len)
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_vendor_test.c | 157 const int key_len = 64; in eap_vendor_test_getKey() local 162 key = os_malloc(key_len); in eap_vendor_test_getKey() 166 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 167 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 168 *len = key_len; in eap_vendor_test_getKey()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_vendor_test.c | 157 const int key_len = 64; in eap_vendor_test_getKey() local 162 key = os_malloc(key_len); in eap_vendor_test_getKey() 166 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 167 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 168 *len = key_len; in eap_vendor_test_getKey()
|