/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 56 * @key_len: Length of key in octets 70 static int wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_decrypt() argument 81 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): decrypt using key", key, key_len); in wpa_ft_rrb_decrypt() 105 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt() 114 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt() 474 static int wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_encrypt() argument 486 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): encrypt using key", key, key_len); in wpa_ft_rrb_encrypt() 492 } else if (aes_siv_encrypt(key, key_len, plain, plain_len, in wpa_ft_rrb_encrypt() 507 * @key_len: Length of key in octets 519 static int wpa_ft_rrb_build(const u8 *key, const size_t key_len, in wpa_ft_rrb_build() argument 925 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument 1937 size_t packet_len, key_len; wpa_ft_pull_pmk_r1() local 2171 size_t key_len; wpa_ft_gtk_subelem() local 2794 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len, enum key_flag key_flag) wpa_auth_set_key() argument 3730 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) wpa_ft_rrb_build_r0() argument 3812 size_t key_len; wpa_ft_rrb_rx_pull() local 3973 size_t key_len; wpa_ft_rrb_rx_r1() local 4260 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument 4390 size_t packet_len = 0, key_len = 0; wpa_ft_rrb_rx_seq_req() local 4454 size_t key_len = 0; wpa_ft_rrb_rx_seq_resp() local [all...] |
H A D | wps_hostapd.c | 409 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory() 417 if (cred->key_len >= 8 && cred->key_len < 64) { in hapd_wps_reconfig_in_memory() 419 bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1); in hapd_wps_reconfig_in_memory() 422 cred->key_len); in hapd_wps_reconfig_in_memory() 424 } else if (cred->key_len == 64) { in hapd_wps_reconfig_in_memory() 479 cred->key, cred->key_len); in hapd_wps_cred_cb() 508 if (cred->key_len == 0) { in hapd_wps_cred_cb() 513 (cred->key_len < 8 || cred->key_len > in hapd_wps_cred_cb() [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/microchip/wilc1000/ |
H A D | cfg80211.c | 324 priv->wep_key_len[sme->key_idx] = sme->key_len; in connect() 326 sme->key_len); in connect() 329 wilc_add_wep_key_bss_sta(vif, sme->key, sme->key_len, in connect() 334 priv->wep_key_len[sme->key_idx] = sme->key_len; in connect() 336 sme->key_len); in connect() 339 wilc_add_wep_key_bss_sta(vif, sme->key, sme->key_len, in connect() 494 priv->wep_key_len[key_index] = params->key_len; in wilc_wfi_cfg_copy_wep_info() 495 memcpy(priv->wep_key[key_index], params->key, params->key_len); in wilc_wfi_cfg_copy_wep_info() 522 key_info->key = kmemdup(params->key, params->key_len, GFP_KERNEL); in wilc_wfi_cfg_copy_wpa_info() 536 key_info->key_len in wilc_wfi_cfg_copy_wpa_info() [all...] |
/third_party/skia/third_party/externals/libpng/ |
H A D | pngwutil.c | 1533 png_uint_32 key_len; in png_write_tEXt() local 1538 key_len = png_check_keyword(png_ptr, key, new_key); in png_write_tEXt() 1540 if (key_len == 0) in png_write_tEXt() 1549 if (text_len > PNG_UINT_31_MAX - (key_len+1)) in png_write_tEXt() 1554 (png_uint_32)/*checked above*/(key_len + text_len + 1)); in png_write_tEXt() 1561 png_write_chunk_data(png_ptr, new_key, key_len + 1); in png_write_tEXt() 1576 png_uint_32 key_len; in png_write_zTXt() local 1591 key_len = png_check_keyword(png_ptr, key, new_key); in png_write_zTXt() 1593 if (key_len == 0) in png_write_zTXt() 1597 new_key[++key_len] in png_write_zTXt() 1627 png_uint_32 key_len, prefix_len; png_write_iTXt() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wps_hostapd.c | 359 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory() 369 if (cred->key_len >= 8 && cred->key_len < 64) { in hapd_wps_reconfig_in_memory() 371 bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1); in hapd_wps_reconfig_in_memory() 374 cred->key_len); in hapd_wps_reconfig_in_memory() 376 } else if (cred->key_len == 64) { in hapd_wps_reconfig_in_memory() 431 cred->key, cred->key_len); in hapd_wps_cred_cb() 460 if (cred->key_len == 0) { in hapd_wps_cred_cb() 465 (cred->key_len < 8 || cred->key_len > in hapd_wps_cred_cb() [all...] |
H A D | wpa_auth_ft.c | 55 * @key_len: Length of key in octets 69 static int wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_decrypt() argument 80 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): decrypt using key", key, key_len); in wpa_ft_rrb_decrypt() 104 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt() 113 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, in wpa_ft_rrb_decrypt() 473 static int wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, in wpa_ft_rrb_encrypt() argument 485 wpa_hexdump_key(MSG_DEBUG, "FT(RRB): encrypt using key", key, key_len); in wpa_ft_rrb_encrypt() 491 } else if (aes_siv_encrypt(key, key_len, plain, plain_len, in wpa_ft_rrb_encrypt() 506 * @key_len: Length of key in octets 518 static int wpa_ft_rrb_build(const u8 *key, const size_t key_len, in wpa_ft_rrb_build() argument 924 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument 1935 size_t packet_len, key_len; wpa_ft_pull_pmk_r1() local 2171 size_t key_len; wpa_ft_gtk_subelem() local 2614 wpa_auth_set_key(struct wpa_authenticator *wpa_auth, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) wpa_auth_set_key() argument 3503 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) wpa_ft_rrb_build_r0() argument 3588 size_t key_len; wpa_ft_rrb_rx_pull() local 3745 size_t key_len; wpa_ft_rrb_rx_r1() local 4032 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument 4162 size_t packet_len = 0, key_len = 0; wpa_ft_rrb_rx_seq_req() local 4222 size_t key_len = 0; wpa_ft_rrb_rx_seq_resp() local [all...] |
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | paes_s390.c | 189 unsigned int key_len) in ecb_paes_set_key() 195 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key() 302 unsigned int key_len) in cbc_paes_set_key() 308 rc = _key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key() 446 unsigned int ckey_len, key_len; in xts_paes_set_key() local 451 key_len = xts_key_len / 2; in xts_paes_set_key() 455 rc = _key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key() 458 rc = _key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key() 598 unsigned int key_len) in ctr_paes_set_key() 188 ecb_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_paes_set_key() argument 301 cbc_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_paes_set_key() argument 597 ctr_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_paes_set_key() argument [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sm4-ce-glue.c | 77 unsigned int key_len) in sm4_setkey() 81 if (key_len != SM4_KEY_SIZE) in sm4_setkey() 92 unsigned int key_len) in sm4_xts_setkey() 97 if (key_len != SM4_KEY_SIZE * 2) in sm4_xts_setkey() 100 ret = xts_verify_key(tfm, key, key_len); in sm4_xts_setkey() 613 unsigned int key_len) in sm4_cbcmac_setkey() 617 if (key_len != SM4_KEY_SIZE) in sm4_cbcmac_setkey() 629 unsigned int key_len) in sm4_cmac_setkey() 635 if (key_len != SM4_KEY_SIZE) in sm4_cmac_setkey() 665 unsigned int key_len) in sm4_xcbc_setkey() 76 sm4_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) sm4_setkey() argument 91 sm4_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) sm4_xts_setkey() argument 612 sm4_cbcmac_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_cbcmac_setkey() argument 628 sm4_cmac_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_cmac_setkey() argument 664 sm4_xcbc_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int key_len) sm4_xcbc_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | paes_s390.c | 199 unsigned int key_len) in ecb_paes_set_key() 205 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key() 314 unsigned int key_len) in cbc_paes_set_key() 320 rc = _key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key() 461 unsigned int ckey_len, key_len; in xts_paes_set_key() local 466 key_len = xts_key_len / 2; in xts_paes_set_key() 470 rc = _key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key() 473 rc = _key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key() 615 unsigned int key_len) in ctr_paes_set_key() 198 ecb_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_paes_set_key() argument 313 cbc_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_paes_set_key() argument 614 ctr_paes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_paes_set_key() argument [all...] |
/kernel/linux/linux-5.10/fs/fscache/ |
H A D | cookie.c | 48 pr_err("%c-key=[%u] '", prefix, cookie->key_len); in fscache_print_cookie() 49 k = (cookie->key_len <= sizeof(cookie->inline_key)) ? in fscache_print_cookie() 51 for (loop = 0; loop < cookie->key_len; loop++) in fscache_print_cookie() 62 if (cookie->key_len > sizeof(cookie->inline_key)) in fscache_free_cookie() 105 if (a->key_len != b->key_len) in fscache_compare_cookie() 106 return (long)a->key_len - (long)b->key_len; in fscache_compare_cookie() 110 if (a->key_len <= sizeof(a->inline_key)) { in fscache_compare_cookie() 117 return memcmp(ka, kb, a->key_len); in fscache_compare_cookie() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.c | 103 const u8 *addr, int idx, u8 *key, size_t key_len) in auth_set_key() 118 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key() 121 1, seq, 6, key, key_len); in auth_set_key() 647 size_t key_len; in mesh_rsn_process_ampe() local 757 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->group_cipher); in mesh_rsn_process_ampe() 758 if ((int) key_len + WPA_KEY_RSC_LEN + 4 > end - pos) { in mesh_rsn_process_ampe() 763 sta->mgtk_len = key_len; in mesh_rsn_process_ampe() 782 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->mgmt_group_cipher); in mesh_rsn_process_ampe() 783 if (end - pos >= (int) (2 + 6 + key_len)) { in mesh_rsn_process_ampe() 792 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 102 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len) auth_set_key() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | mesh_rsn.c | 103 const u8 *addr, int idx, u8 *key, size_t key_len, in auth_set_key() 119 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key() 126 1, seq, 6, key, key_len, key_flag); in auth_set_key() 655 size_t key_len; in mesh_rsn_process_ampe() local 765 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->group_cipher); in mesh_rsn_process_ampe() 766 if ((int) key_len + WPA_KEY_RSC_LEN + 4 > end - pos) { in mesh_rsn_process_ampe() 771 sta->mgtk_len = key_len; in mesh_rsn_process_ampe() 789 key_len = wpa_cipher_key_len(wpa_s->mesh_rsn->mgmt_group_cipher); in mesh_rsn_process_ampe() 790 if (end - pos >= (int) (2 + 6 + key_len)) { in mesh_rsn_process_ampe() 799 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 102 auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, const u8 *addr, int idx, u8 *key, size_t key_len, enum key_flag key_flag) auth_set_key() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 619 unsigned int key_len = (ctx_p->keylen / 2); in cc_setup_xex_state_desc() local 621 unsigned int key_offset = key_len; in cc_setup_xex_state_desc() 635 key_len = SHA256_DIGEST_SIZE; in cc_setup_xex_state_desc() 647 key_len, NS_BIT); in cc_setup_xex_state_desc() 651 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc() 660 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc() 696 unsigned int key_len = ctx_p->keylen; in cc_setup_key_desc() local 712 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_key_desc() 725 din_size = (key_len == 24) ? in cc_setup_key_desc() 726 AES_MAX_KEY_SIZE : key_len; in cc_setup_key_desc() [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_ioctl.c | 928 } else if (!encrypt_key->key_len) { in mwifiex_sec_ioctl_set_wep_key() 940 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 951 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wep_key() 953 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 1008 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { in mwifiex_sec_ioctl_set_wpa_key() 1032 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wpa_key() 1033 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, in mwifiex_sec_ioctl_set_wpa_key() 1034 sizeof(ibss_key->key_param_set.key_len)); in mwifiex_sec_ioctl_set_wpa_key() 1072 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP10 in mwifiex_sec_ioctl_encrypt_key() 1108 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) mwifiex_set_encode() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 622 unsigned int key_len = (ctx_p->keylen / 2); in cc_setup_xex_state_desc() local 624 unsigned int key_offset = key_len; in cc_setup_xex_state_desc() 638 key_len = SHA256_DIGEST_SIZE; in cc_setup_xex_state_desc() 650 key_len, NS_BIT); in cc_setup_xex_state_desc() 654 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc() 663 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_xex_state_desc() 699 unsigned int key_len = ctx_p->keylen; in cc_setup_key_desc() local 715 set_key_size_aes(&desc[*seq_size], key_len); in cc_setup_key_desc() 728 din_size = (key_len == 24) ? in cc_setup_key_desc() 729 AES_MAX_KEY_SIZE : key_len; in cc_setup_key_desc() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_ioctl.c | 916 } else if (!encrypt_key->key_len) { in mwifiex_sec_ioctl_set_wep_key() 928 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 939 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wep_key() 941 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 996 if (encrypt_key->key_len > WLAN_MAX_KEY_LEN) { in mwifiex_sec_ioctl_set_wpa_key() 1020 encrypt_key->key_len); in mwifiex_sec_ioctl_set_wpa_key() 1021 memcpy(&ibss_key->key_param_set.key_len, &encrypt_key->key_len, in mwifiex_sec_ioctl_set_wpa_key() 1022 sizeof(ibss_key->key_param_set.key_len)); in mwifiex_sec_ioctl_set_wpa_key() 1060 else if (encrypt_key->key_len > WLAN_KEY_LEN_WEP10 in mwifiex_sec_ioctl_encrypt_key() 1096 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) mwifiex_set_encode() argument [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | aes_ti.c | 13 unsigned int key_len) in aesti_set_key() 17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key() 12 aesti_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesti_set_key() argument
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | rhashtable-types.h | 46 * @key_len: Length of key 52 * @hashfn: Hash function (default: jhash2 if !(key_len % 4), or jhash) 58 u16 key_len; member 72 * @key_len: Key length for hashfn 83 unsigned int key_len; member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | rhashtable-types.h | 46 * @key_len: Length of key 52 * @hashfn: Hash function (default: jhash2 if !(key_len % 4), or jhash) 58 u16 key_len; member 72 * @key_len: Key length for hashfn 83 unsigned int key_len; member
|
/kernel/linux/linux-6.6/crypto/ |
H A D | aes_ti.c | 13 unsigned int key_len) in aesti_set_key() 17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key() 12 aesti_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aesti_set_key() argument
|
H A D | sm4_generic.c | 23 * @key_len: The size of the key. 32 unsigned int key_len) in sm4_setkey() 36 return sm4_expandkey(ctx, in_key, key_len); in sm4_setkey() 31 sm4_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) sm4_setkey() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) in sha1_t_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) in peap_prfplus()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1-tprf.c | 18 * @key_len: Length of the key in bytes 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) in sha1_t_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) in peap_prfplus()
|