Home
last modified time | relevance | path

Searched refs:crypt_len (Results 1 - 20 of 20) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes-siv.c170 size_t crypt_len; in aes_siv_decrypt() local
179 crypt_len = iv_c_len - AES_BLOCK_SIZE; in aes_siv_decrypt()
189 _len[num_elem] = crypt_len; in aes_siv_decrypt()
192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); in aes_siv_decrypt()
197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len); in aes_siv_decrypt()
H A Daes-gcm.c230 const u8 *crypt, size_t crypt_len, u8 *S) in aes_gcm_ghash()
242 ghash(H, crypt, crypt_len, S); in aes_gcm_ghash()
244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); in aes_gcm_ghash()
289 const u8 *crypt, size_t crypt_len, in aes_gcm_ad()
304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); in aes_gcm_ad()
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad()
229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) aes_gcm_ghash() argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) aes_gcm_ad() argument
H A Daes-ccm.c179 size_t M, const u8 *crypt, size_t crypt_len, in aes_ccm_ad()
199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); in aes_ccm_ad()
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); in aes_ccm_ad()
202 aes_ccm_auth(aes, plain, crypt_len, x); in aes_ccm_ad()
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
H A Dcrypto_internal-rsa.c112 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1()
116 crypt, crypt_len, plain, plain_len); in crypto_public_key_decrypt_pkcs1()
111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
H A Daes_wrap.h59 const u8 *crypt, size_t crypt_len,
69 size_t M, const u8 *crypt, size_t crypt_len,
H A Dcrypto_libtomcrypt.c616 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1()
624 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC, in crypto_public_key_decrypt_pkcs1()
615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
H A Dcrypto.h411 * @crypt_len: Encrypted signature data length
412 * @plain: Buffer for plaintext (at least crypt_len bytes)
417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Daes-siv.c170 size_t crypt_len; in aes_siv_decrypt() local
179 crypt_len = iv_c_len - AES_BLOCK_SIZE; in aes_siv_decrypt()
189 _len[num_elem] = crypt_len; in aes_siv_decrypt()
192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); in aes_siv_decrypt()
197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len); in aes_siv_decrypt()
H A Daes-gcm.c230 const u8 *crypt, size_t crypt_len, u8 *S) in aes_gcm_ghash()
242 ghash(H, crypt, crypt_len, S); in aes_gcm_ghash()
244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); in aes_gcm_ghash()
289 const u8 *crypt, size_t crypt_len, in aes_gcm_ad()
304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); in aes_gcm_ad()
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad()
229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) aes_gcm_ghash() argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) aes_gcm_ad() argument
H A Daes-ccm.c179 size_t M, const u8 *crypt, size_t crypt_len, in aes_ccm_ad()
199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); in aes_ccm_ad()
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); in aes_ccm_ad()
202 aes_ccm_auth(aes, plain, crypt_len, x); in aes_ccm_ad()
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
H A Dcrypto_internal-rsa.c112 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1()
116 crypt, crypt_len, plain, plain_len); in crypto_public_key_decrypt_pkcs1()
111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
H A Daes_wrap.h59 const u8 *crypt, size_t crypt_len,
69 size_t M, const u8 *crypt, size_t crypt_len,
H A Dcrypto_libtomcrypt.c616 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1()
624 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC, in crypto_public_key_decrypt_pkcs1()
615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
H A Dcrypto.h411 * @crypt_len: Encrypted signature data length
412 * @plain: Buffer for plaintext (at least crypt_len bytes)
417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dmesh_rsn.c643 size_t crypt_len; in mesh_rsn_process_ampe() local
677 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe()
678 if (crypt_len < 2 + AES_BLOCK_SIZE) { in mesh_rsn_process_ampe()
684 crypt = os_zalloc(crypt_len); in mesh_rsn_process_ampe()
691 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
693 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, in mesh_rsn_process_ampe()
700 crypt_len -= AES_BLOCK_SIZE; in mesh_rsn_process_ampe()
702 ampe_buf, crypt_len); in mesh_rsn_process_ampe()
708 (size_t) 2 + ampe_ie_len > crypt_len || in mesh_rsn_process_ampe()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dmesh_rsn.c651 size_t crypt_len; in mesh_rsn_process_ampe() local
685 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe()
686 if (crypt_len < 2 + AES_BLOCK_SIZE) { in mesh_rsn_process_ampe()
692 crypt = os_zalloc(crypt_len); in mesh_rsn_process_ampe()
699 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
701 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, in mesh_rsn_process_ampe()
708 crypt_len -= AES_BLOCK_SIZE; in mesh_rsn_process_ampe()
710 ampe_buf, crypt_len); in mesh_rsn_process_ampe()
716 (size_t) 2 + ampe_ie_len > crypt_len || in mesh_rsn_process_ampe()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs1.h22 const u8 *crypt, size_t crypt_len,
H A Dpkcs1.c135 const u8 *crypt, size_t crypt_len, in pkcs1_decrypt_public_key()
142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key()
134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) pkcs1_decrypt_public_key() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dpkcs1.h22 const u8 *crypt, size_t crypt_len,
H A Dpkcs1.c135 const u8 *crypt, size_t crypt_len, in pkcs1_decrypt_public_key()
142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key()
134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) pkcs1_decrypt_public_key() argument

Completed in 12 milliseconds