Home
last modified time | relevance | path

Searched refs:key_len (Results 226 - 250 of 1104) sorted by relevance

12345678910>>...45

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_ft.c56 * @key_len: Length of key in octets
70 static int wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_decrypt() argument
81 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): decrypt using key", key, key_len); in wpa_ft_rrb_decrypt()
105 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt()
114 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt()
474 static int wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_encrypt() argument
486 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): encrypt using key", key, key_len); in wpa_ft_rrb_encrypt()
492 } else if (aes_siv_encrypt(key, key_len, plain, plain_len, in wpa_ft_rrb_encrypt()
507 * @key_len: Length of key in octets
519 static int wpa_ft_rrb_build(const u8 *key, const size_t key_len, in wpa_ft_rrb_build() argument
925 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument
1937 size_t packet_len, key_len; wpa_ft_pull_pmk_r1() local
2171 size_t key_len; wpa_ft_gtk_subelem() local
2794 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len, enum key_flag key_flag) wpa_auth_set_key() argument
3730 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) wpa_ft_rrb_build_r0() argument
3812 size_t key_len; wpa_ft_rrb_rx_pull() local
3973 size_t key_len; wpa_ft_rrb_rx_r1() local
4260 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument
4390 size_t packet_len = 0, key_len = 0; wpa_ft_rrb_rx_seq_req() local
4454 size_t key_len = 0; wpa_ft_rrb_rx_seq_resp() local
[all...]
H A Dwps_hostapd.c409 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory()
417 if (cred->key_len >= 8 && cred->key_len < 64) { in hapd_wps_reconfig_in_memory()
419 bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1); in hapd_wps_reconfig_in_memory()
422 cred->key_len); in hapd_wps_reconfig_in_memory()
424 } else if (cred->key_len == 64) { in hapd_wps_reconfig_in_memory()
479 cred->key, cred->key_len); in hapd_wps_cred_cb()
508 if (cred->key_len == 0) { in hapd_wps_cred_cb()
513 (cred->key_len < 8 || cred->key_len > in hapd_wps_cred_cb()
[all...]
/kernel/linux/linux-5.10/drivers/net/wireless/microchip/wilc1000/
H A Dcfg80211.c324 priv->wep_key_len[sme->key_idx] = sme->key_len; in connect()
326 sme->key_len); in connect()
329 wilc_add_wep_key_bss_sta(vif, sme->key, sme->key_len, in connect()
334 priv->wep_key_len[sme->key_idx] = sme->key_len; in connect()
336 sme->key_len); in connect()
339 wilc_add_wep_key_bss_sta(vif, sme->key, sme->key_len, in connect()
494 priv->wep_key_len[key_index] = params->key_len; in wilc_wfi_cfg_copy_wep_info()
495 memcpy(priv->wep_key[key_index], params->key, params->key_len); in wilc_wfi_cfg_copy_wep_info()
522 key_info->key = kmemdup(params->key, params->key_len, GFP_KERNEL); in wilc_wfi_cfg_copy_wpa_info()
536 key_info->key_len in wilc_wfi_cfg_copy_wpa_info()
[all...]
/third_party/skia/third_party/externals/libpng/
H A Dpngwutil.c1533 png_uint_32 key_len; in png_write_tEXt() local
1538 key_len = png_check_keyword(png_ptr, key, new_key); in png_write_tEXt()
1540 if (key_len == 0) in png_write_tEXt()
1549 if (text_len > PNG_UINT_31_MAX - (key_len+1)) in png_write_tEXt()
1554 (png_uint_32)/*checked above*/(key_len + text_len + 1)); in png_write_tEXt()
1561 png_write_chunk_data(png_ptr, new_key, key_len + 1); in png_write_tEXt()
1576 png_uint_32 key_len; in png_write_zTXt() local
1591 key_len = png_check_keyword(png_ptr, key, new_key); in png_write_zTXt()
1593 if (key_len == 0) in png_write_zTXt()
1597 new_key[++key_len] in png_write_zTXt()
1627 png_uint_32 key_len, prefix_len; png_write_iTXt() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwps_hostapd.c359 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory()
369 if (cred->key_len >= 8 && cred->key_len < 64) { in hapd_wps_reconfig_in_memory()
371 bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1); in hapd_wps_reconfig_in_memory()
374 cred->key_len); in hapd_wps_reconfig_in_memory()
376 } else if (cred->key_len == 64) { in hapd_wps_reconfig_in_memory()
431 cred->key, cred->key_len); in hapd_wps_cred_cb()
460 if (cred->key_len == 0) { in hapd_wps_cred_cb()
465 (cred->key_len < 8 || cred->key_len > in hapd_wps_cred_cb()
[all...]
H A Dwpa_auth_ft.c55 * @key_len: Length of key in octets
69 static int wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_decrypt() argument
80 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): decrypt using key", key, key_len); in wpa_ft_rrb_decrypt()
104 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt()
113 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt()
473 static int wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_encrypt() argument
485 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): encrypt using key", key, key_len); in wpa_ft_rrb_encrypt()
491 } else if (aes_siv_encrypt(key, key_len, plain, plain_len, in wpa_ft_rrb_encrypt()
506 * @key_len: Length of key in octets
518 static int wpa_ft_rrb_build(const u8 *key, const size_t key_len, in wpa_ft_rrb_build() argument
924 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument
1935 size_t packet_len, key_len; wpa_ft_pull_pmk_r1() local
2171 size_t key_len; wpa_ft_gtk_subelem() local
2614 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) wpa_auth_set_key() argument
3503 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) wpa_ft_rrb_build_r0() argument
3588 size_t key_len; wpa_ft_rrb_rx_pull() local
3745 size_t key_len; wpa_ft_rrb_rx_r1() local
4032 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument
4162 size_t packet_len = 0, key_len = 0; wpa_ft_rrb_rx_seq_req() local
4222 size_t key_len = 0; wpa_ft_rrb_rx_seq_resp() local
[all...]
/kernel/linux/linux-5.10/arch/s390/crypto/
H A Dpaes_s390.c189 unsigned int key_len) in ecb_paes_set_key()
195 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key()
302 unsigned int key_len) in cbc_paes_set_key()
308 rc = _key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key()
446 unsigned int ckey_len, key_len; in xts_paes_set_key() local
451 key_len = xts_key_len / 2; in xts_paes_set_key()
455 rc = _key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key()
458 rc = _key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key()
598 unsigned int key_len) in ctr_paes_set_key()
188 ecb_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_paes_set_key() argument
301 cbc_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_paes_set_key() argument
597 ctr_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_paes_set_key() argument
[all...]
/kernel/linux/linux-6.6/arch/arm64/crypto/
H A Dsm4-ce-glue.c77 unsigned int key_len) in sm4_setkey()
81 if (key_len != SM4_KEY_SIZE) in sm4_setkey()
92 unsigned int key_len) in sm4_xts_setkey()
97 if (key_len != SM4_KEY_SIZE * 2) in sm4_xts_setkey()
100 ret = xts_verify_key(tfm, key, key_len); in sm4_xts_setkey()
613 unsigned int key_len) in sm4_cbcmac_setkey()
617 if (key_len != SM4_KEY_SIZE) in sm4_cbcmac_setkey()
629 unsigned int key_len) in sm4_cmac_setkey()
635 if (key_len != SM4_KEY_SIZE) in sm4_cmac_setkey()
665 unsigned int key_len) in sm4_xcbc_setkey()
76 sm4_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) sm4_setkey() argument
91 sm4_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) sm4_xts_setkey() argument
612 sm4_cbcmac_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_cbcmac_setkey() argument
628 sm4_cmac_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_cmac_setkey() argument
664 sm4_xcbc_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_xcbc_setkey() argument
[all...]
/kernel/linux/linux-6.6/arch/s390/crypto/
H A Dpaes_s390.c199 unsigned int key_len) in ecb_paes_set_key()
205 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key()
314 unsigned int key_len) in cbc_paes_set_key()
320 rc = _key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key()
461 unsigned int ckey_len, key_len; in xts_paes_set_key() local
466 key_len = xts_key_len / 2; in xts_paes_set_key()
470 rc = _key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key()
473 rc = _key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key()
615 unsigned int key_len) in ctr_paes_set_key()
198 ecb_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_paes_set_key() argument
313 cbc_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_paes_set_key() argument
614 ctr_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_paes_set_key() argument
[all...]
/kernel/linux/linux-5.10/fs/fscache/
H A Dcookie.c48 pr_err("%c-key=[%u] '", prefix, cookie->key_len); in fscache_print_cookie()
49 k = (cookie->key_len <= sizeof(cookie->inline_key)) ? in fscache_print_cookie()
51 for (loop = 0; loop < cookie->key_len; loop++) in fscache_print_cookie()
62 if (cookie->key_len > sizeof(cookie->inline_key)) in fscache_free_cookie()
105 if (a->key_len != b->key_len) in fscache_compare_cookie()
106 return (long)a->key_len - (long)b->key_len; in fscache_compare_cookie()
110 if (a->key_len <= sizeof(a->inline_key)) { in fscache_compare_cookie()
117 return memcmp(ka, kb, a->key_len); in fscache_compare_cookie()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dmesh_rsn.c103 const u8 *addr, int idx, u8 *key, size_t key_len) in auth_set_key()
118 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key()
121 1, seq, 6, key, key_len); in auth_set_key()
647 size_t key_len; in mesh_rsn_process_ampe() local
757 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->group_cipher); in mesh_rsn_process_ampe()
758 if ((int) key_len + WPA_KEY_RSC_LEN + 4 > end - pos) { in mesh_rsn_process_ampe()
763 sta->mgtk_len = key_len; in mesh_rsn_process_ampe()
782 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->mgmt_group_cipher); in mesh_rsn_process_ampe()
783 if (end - pos >= (int) (2 + 6 + key_len)) { in mesh_rsn_process_ampe()
792 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe()
102 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) auth_set_key() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dmesh_rsn.c103 const u8 *addr, int idx, u8 *key, size_t key_len, in auth_set_key()
119 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key()
126 1, seq, 6, key, key_len, key_flag); in auth_set_key()
655 size_t key_len; in mesh_rsn_process_ampe() local
765 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->group_cipher); in mesh_rsn_process_ampe()
766 if ((int) key_len + WPA_KEY_RSC_LEN + 4 > end - pos) { in mesh_rsn_process_ampe()
771 sta->mgtk_len = key_len; in mesh_rsn_process_ampe()
789 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->mgmt_group_cipher); in mesh_rsn_process_ampe()
790 if (end - pos >= (int) (2 + 6 + key_len)) { in mesh_rsn_process_ampe()
799 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe()
102 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len, enum key_flag key_flag) auth_set_key() argument
[all...]
/kernel/linux/linux-5.10/drivers/crypto/ccree/
H A Dcc_cipher.c619 unsigned int key_len = (ctx_p->keylen / 2); in cc_setup_xex_state_desc() local
621 unsigned int key_offset = key_len; in cc_setup_xex_state_desc()
635 key_len = SHA256_DIGEST_SIZE; in cc_setup_xex_state_desc()
647 key_len, NS_BIT); in cc_setup_xex_state_desc()
651 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc()
660 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc()
696 unsigned int key_len = ctx_p->keylen; in cc_setup_key_desc() local
712 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_key_desc()
725 din_size = (key_len == 24) ? in cc_setup_key_desc()
726 AES_MAX_KEY_SIZE : key_len; in cc_setup_key_desc()
[all...]
/kernel/linux/linux-5.10/drivers/net/wireless/marvell/mwifiex/
H A Dsta_ioctl.c928 } else if (!encrypt_key->key_len) { in mwifiex_sec_ioctl_set_wep_key()
940 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key()
951 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wep_key()
953 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key()
1008 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { in mwifiex_sec_ioctl_set_wpa_key()
1032 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wpa_key()
1033 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, in mwifiex_sec_ioctl_set_wpa_key()
1034 sizeof(ibss_key->key_param_set.key_len)); in mwifiex_sec_ioctl_set_wpa_key()
1072 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP10 in mwifiex_sec_ioctl_encrypt_key()
1108 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) mwifiex_set_encode() argument
[all...]
/kernel/linux/linux-6.6/drivers/crypto/ccree/
H A Dcc_cipher.c622 unsigned int key_len = (ctx_p->keylen / 2); in cc_setup_xex_state_desc() local
624 unsigned int key_offset = key_len; in cc_setup_xex_state_desc()
638 key_len = SHA256_DIGEST_SIZE; in cc_setup_xex_state_desc()
650 key_len, NS_BIT); in cc_setup_xex_state_desc()
654 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc()
663 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc()
699 unsigned int key_len = ctx_p->keylen; in cc_setup_key_desc() local
715 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_key_desc()
728 din_size = (key_len == 24) ? in cc_setup_key_desc()
729 AES_MAX_KEY_SIZE : key_len; in cc_setup_key_desc()
[all...]
/kernel/linux/linux-6.6/drivers/net/wireless/marvell/mwifiex/
H A Dsta_ioctl.c916 } else if (!encrypt_key->key_len) { in mwifiex_sec_ioctl_set_wep_key()
928 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key()
939 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wep_key()
941 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key()
996 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { in mwifiex_sec_ioctl_set_wpa_key()
1020 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wpa_key()
1021 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, in mwifiex_sec_ioctl_set_wpa_key()
1022 sizeof(ibss_key->key_param_set.key_len)); in mwifiex_sec_ioctl_set_wpa_key()
1060 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP10 in mwifiex_sec_ioctl_encrypt_key()
1096 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) mwifiex_set_encode() argument
[all...]
/kernel/linux/linux-5.10/crypto/
H A Daes_ti.c13 unsigned int key_len) in aesti_set_key()
17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key()
12 aesti_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesti_set_key() argument
/kernel/linux/linux-5.10/include/linux/
H A Drhashtable-types.h46 * @key_len: Length of key
52 * @hashfn: Hash function (default: jhash2 if !(key_len % 4), or jhash)
58 u16 key_len; member
72 * @key_len: Key length for hashfn
83 unsigned int key_len; member
/kernel/linux/linux-6.6/include/linux/
H A Drhashtable-types.h46 * @key_len: Length of key
52 * @hashfn: Hash function (default: jhash2 if !(key_len % 4), or jhash)
58 u16 key_len; member
72 * @key_len: Key length for hashfn
83 unsigned int key_len; member
/kernel/linux/linux-6.6/crypto/
H A Daes_ti.c13 unsigned int key_len) in aesti_set_key()
17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key()
12 aesti_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesti_set_key() argument
H A Dsm4_generic.c23 * @key_len: The size of the key.
32 unsigned int key_len) in sm4_setkey()
36 return sm4_expandkey(ctx, in_key, key_len); in sm4_setkey()
31 sm4_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) sm4_setkey() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) in sha1_t_prf()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) in peap_prfplus()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha1-tprf.c18 * @key_len: Length of the key in bytes
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument
57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) in sha1_t_prf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) in peap_prfplus()

Completed in 28 milliseconds

12345678910>>...45