Searched refs:key_data_length (Results 1 - 5 of 5) sorted by relevance
/third_party/mbedtls/library/ |
H A D | psa_crypto_storage.c | 269 size_t *key_data_length, in psa_parse_key_data_from_storage() 291 *key_data_length = MBEDTLS_GET_UINT32_LE(storage_format->data_len, 0); in psa_parse_key_data_from_storage() 292 if (*key_data_length > (storage_data_length - sizeof(*storage_format)) || in psa_parse_key_data_from_storage() 293 *key_data_length > PSA_CRYPTO_MAX_STORAGE_SIZE) { in psa_parse_key_data_from_storage() 297 if (*key_data_length == 0) { in psa_parse_key_data_from_storage() 300 *key_data = mbedtls_calloc(1, *key_data_length); in psa_parse_key_data_from_storage() 304 memcpy(*key_data, storage_format->key_data, *key_data_length); in psa_parse_key_data_from_storage() 350 void psa_free_persistent_key_data(uint8_t *key_data, size_t key_data_length) in psa_free_persistent_key_data() argument 352 mbedtls_zeroize_and_free(key_data, key_data_length); in psa_free_persistent_key_data() 266 psa_parse_key_data_from_storage(const uint8_t *storage_data, size_t storage_data_length, uint8_t **key_data, size_t *key_data_length, psa_key_attributes_t *attr) psa_parse_key_data_from_storage() argument
|
H A D | psa_crypto_storage.h | 150 * \param key_data_length Size of the key data buffer. 153 void psa_free_persistent_key_data(uint8_t *key_data, size_t key_data_length); 177 * \param[out] key_data_length Length of the key data buffer 188 size_t *key_data_length,
|
H A D | psa_crypto_slot_management.c | 249 size_t key_data_length = 0; in psa_load_persistent_key_into_slot() local 252 &key_data, &key_data_length); in psa_load_persistent_key_into_slot() 265 if (key_data_length != sizeof(*data)) { in psa_load_persistent_key_into_slot() 276 status = psa_copy_key_material_into_slot(slot, key_data, key_data_length); in psa_load_persistent_key_into_slot() 282 psa_free_persistent_key_data(key_data, key_data_length); in psa_load_persistent_key_into_slot()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 1045 u16 key_info, key_data_length; in wpa_receive() local 1070 key_data_length = WPA_GET_BE16(mic + mic_len); in wpa_receive() 1072 " key_info=0x%x type=%u mic_len=%zu key_data_length=%u", in wpa_receive() 1074 mic_len, key_data_length); in wpa_receive() 1080 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive() 1083 key_data_length, in wpa_receive() 1130 } else if (key_data_length == 0 || in wpa_receive() 1132 key_data_length == AES_BLOCK_SIZE)) { in wpa_receive() 1354 &key_data_length) < 0) { in wpa_receive() 1398 } else if (key_data_length > in wpa_receive() 2967 u16 key_data_length; SM_STATE() local 3968 u16 key_data_length; SM_STATE() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 956 u16 key_info, key_data_length; in wpa_receive() local 981 key_data_length = WPA_GET_BE16(mic + mic_len); in wpa_receive() 983 " key_info=0x%x type=%u mic_len=%u key_data_length=%u", in wpa_receive() 985 (unsigned int) mic_len, key_data_length); in wpa_receive() 991 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive() 994 key_data_length, in wpa_receive() 1042 } else if (key_data_length == 0 || in wpa_receive() 1044 key_data_length == AES_BLOCK_SIZE)) { in wpa_receive() 1276 &key_data_length) < 0) { in wpa_receive() 1322 } else if (key_data_length > in wpa_receive() 2825 u16 key_data_length; SM_STATE() local 3631 u16 key_data_length; SM_STATE() local [all...] |
Completed in 9 milliseconds