/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-siv.c | 170 size_t crypt_len; in aes_siv_decrypt() local 179 crypt_len = iv_c_len - AES_BLOCK_SIZE; in aes_siv_decrypt() 189 _len[num_elem] = crypt_len; in aes_siv_decrypt() 192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); in aes_siv_decrypt() 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len); in aes_siv_decrypt()
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) in aes_gcm_ghash() 242 ghash(H, crypt, crypt_len, S); in aes_gcm_ghash() 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); in aes_gcm_ghash() 289 const u8 *crypt, size_t crypt_len, in aes_gcm_ad() 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); in aes_gcm_ad() 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) aes_gcm_ghash() argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) aes_gcm_ad() argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, in aes_ccm_ad() 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); in aes_ccm_ad() 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); in aes_ccm_ad() 202 aes_ccm_auth(aes, plain, crypt_len, x); in aes_ccm_ad() 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
|
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1() 116 crypt, crypt_len, plain, plain_len); in crypto_public_key_decrypt_pkcs1() 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto_libtomcrypt.c | 616 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1() 624 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC, in crypto_public_key_decrypt_pkcs1() 615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
|
H A D | crypto.h | 411 * @crypt_len: Encrypted signature data length 412 * @plain: Buffer for plaintext (at least crypt_len bytes) 417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-siv.c | 170 size_t crypt_len; in aes_siv_decrypt() local 179 crypt_len = iv_c_len - AES_BLOCK_SIZE; in aes_siv_decrypt() 189 _len[num_elem] = crypt_len; in aes_siv_decrypt() 192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); in aes_siv_decrypt() 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len); in aes_siv_decrypt()
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) in aes_gcm_ghash() 242 ghash(H, crypt, crypt_len, S); in aes_gcm_ghash() 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); in aes_gcm_ghash() 289 const u8 *crypt, size_t crypt_len, in aes_gcm_ad() 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); in aes_gcm_ad() 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) aes_gcm_ghash() argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) aes_gcm_ad() argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, in aes_ccm_ad() 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); in aes_ccm_ad() 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); in aes_ccm_ad() 202 aes_ccm_auth(aes, plain, crypt_len, x); in aes_ccm_ad() 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
|
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1() 116 crypt, crypt_len, plain, plain_len); in crypto_public_key_decrypt_pkcs1() 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto_libtomcrypt.c | 616 const u8 *crypt, size_t crypt_len, in crypto_public_key_decrypt_pkcs1() 624 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC, in crypto_public_key_decrypt_pkcs1() 615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument
|
H A D | crypto.h | 411 * @crypt_len: Encrypted signature data length 412 * @plain: Buffer for plaintext (at least crypt_len bytes) 417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.c | 643 size_t crypt_len; in mesh_rsn_process_ampe() local 677 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe() 678 if (crypt_len < 2 + AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 684 crypt = os_zalloc(crypt_len); in mesh_rsn_process_ampe() 691 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe() 693 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, in mesh_rsn_process_ampe() 700 crypt_len -= AES_BLOCK_SIZE; in mesh_rsn_process_ampe() 702 ampe_buf, crypt_len); in mesh_rsn_process_ampe() 708 (size_t) 2 + ampe_ie_len > crypt_len || in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | mesh_rsn.c | 651 size_t crypt_len; in mesh_rsn_process_ampe() local 685 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe() 686 if (crypt_len < 2 + AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 692 crypt = os_zalloc(crypt_len); in mesh_rsn_process_ampe() 699 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe() 701 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, in mesh_rsn_process_ampe() 708 crypt_len -= AES_BLOCK_SIZE; in mesh_rsn_process_ampe() 710 ampe_buf, crypt_len); in mesh_rsn_process_ampe() 716 (size_t) 2 + ampe_ie_len > crypt_len || in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, in pkcs1_decrypt_public_key() 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key() 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) pkcs1_decrypt_public_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, in pkcs1_decrypt_public_key() 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key() 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) pkcs1_decrypt_public_key() argument
|