/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_linux.c | 58 size_t key_len, size_t num_elem, in linux_af_alg_hash_vector() 71 if (key && setsockopt(s, SOL_ALG, ALG_SET_KEY, key, key_len) < 0) { in linux_af_alg_hash_vector() 171 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 174 return linux_af_alg_hash_vector("hmac(md5)", key, key_len, num_elem, in hmac_md5_vector() 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 182 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 186 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 189 return linux_af_alg_hash_vector("hmac(sha1)", key, key_len, num_elem, in hmac_sha1_vector() 194 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 197 return hmac_sha1_vector(key, key_len, in hmac_sha1() 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) linux_af_alg_hash_vector() argument 201 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 209 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 216 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 224 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 239 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 415 linux_af_alg_skcipher(const char *alg, const u8 *key, size_t key_len) linux_af_alg_skcipher() argument 757 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument 858 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
H A D | aes_wrap.h | 25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len, 36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, 52 int __must_check aes_gcm_ae(const u8 *key, size_t key_len, 57 int __must_check aes_gcm_ad(const u8 *key, size_t key_len, 62 int __must_check aes_gmac(const u8 *key, size_t key_len, 65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
H A D | sha256-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, in sha256_prf() 41 * @key_len: Length of the key in bytes 54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, in sha256_prf_bits() argument 81 if (hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf_bits() 86 if (hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf_bits()
|
H A D | sha384-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha384_prf(const u8 *key, size_t key_len, const char *label, in sha384_prf() argument 33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, in sha384_prf() 41 * @key_len: Length of the key in bytes 54 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label, in sha384_prf_bits() argument 81 if (hmac_sha384_vector(key, key_len, 4, addr, len, in sha384_prf_bits() 86 if (hmac_sha384_vector(key, key_len, 4, addr, len, in sha384_prf_bits()
|
H A D | sha512-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha512_prf(const u8 *key, size_t key_len, const char *label, in sha512_prf() argument 33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, in sha512_prf() 41 * @key_len: Length of the key in bytes 54 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label, in sha512_prf_bits() argument 81 if (hmac_sha512_vector(key, key_len, 4, addr, len, in sha512_prf_bits() 86 if (hmac_sha512_vector(key, key_len, 4, addr, len, in sha512_prf_bits()
|
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
H A D | sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 18 int sha256_prf(const u8 *key, size_t key_len, const char *label, 20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | sha384.h | 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, 18 int sha384_prf(const u8 *key, size_t key_len, const char *label, 20 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | sha512.h | 14 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data, 18 int sha512_prf(const u8 *key, size_t key_len, const char *label, 20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_linux.c | 58 size_t key_len, size_t num_elem, in linux_af_alg_hash_vector() 71 if (key && setsockopt(s, SOL_ALG, ALG_SET_KEY, key, key_len) < 0) { in linux_af_alg_hash_vector() 171 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 174 return linux_af_alg_hash_vector("hmac(md5)", key, key_len, num_elem, in hmac_md5_vector() 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 182 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 186 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 189 return linux_af_alg_hash_vector("hmac(sha1)", key, key_len, num_elem, in hmac_sha1_vector() 194 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 197 return hmac_sha1_vector(key, key_len, in hmac_sha1() 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) linux_af_alg_hash_vector() argument 201 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 209 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 216 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 224 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 239 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 415 linux_af_alg_skcipher(const char *alg, const u8 *key, size_t key_len) linux_af_alg_skcipher() argument 757 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument 858 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
H A D | aes_wrap.h | 25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len, 36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, 52 int __must_check aes_gcm_ae(const u8 *key, size_t key_len, 57 int __must_check aes_gcm_ad(const u8 *key, size_t key_len, 62 int __must_check aes_gmac(const u8 *key, size_t key_len, 65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
H A D | sha256-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, in sha256_prf() 41 * @key_len: Length of the key in bytes 54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, in sha256_prf_bits() argument 81 if (hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf_bits() 86 if (hmac_sha256_vector(key, key_len, 4, addr, len, in sha256_prf_bits()
|
H A D | sha384-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha384_prf(const u8 *key, size_t key_len, const char *label, in sha384_prf() argument 33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, in sha384_prf() 41 * @key_len: Length of the key in bytes 54 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label, in sha384_prf_bits() argument 81 if (hmac_sha384_vector(key, key_len, 4, addr, len, in sha384_prf_bits() 86 if (hmac_sha384_vector(key, key_len, 4, addr, len, in sha384_prf_bits()
|
H A D | sha512-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha512_prf(const u8 *key, size_t key_len, const char *label, in sha512_prf() argument 33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, in sha512_prf() 41 * @key_len: Length of the key in bytes 54 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label, in sha512_prf_bits() argument 81 if (hmac_sha512_vector(key, key_len, 4, addr, len, in sha512_prf_bits() 86 if (hmac_sha512_vector(key, key_len, 4, addr, len, in sha512_prf_bits()
|
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-des3.c | 38 unsigned int key_len) in ccp_des3_setkey() 53 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 55 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 56 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 69 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 96 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 121 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm() 37 ccp_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_des3_setkey() argument
|
H A D | ccp-crypto-aes.c | 39 unsigned int key_len) in ccp_aes_setkey() 44 switch (key_len) { in ccp_aes_setkey() 58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 74 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 100 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 125 ctx->u.aes.key_len in ccp_aes_init_tfm() 38 ccp_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_setkey() argument 144 ccp_aes_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_rfc3686_setkey() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 38 unsigned int key_len) in ccp_aes_setkey() 43 switch (key_len) { in ccp_aes_setkey() 57 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 59 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 60 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 74 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 100 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 127 ctx->u.aes.key_len in ccp_aes_init_tfm() 37 ccp_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_setkey() argument 146 ccp_aes_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_rfc3686_setkey() argument [all...] |
/kernel/linux/linux-6.6/drivers/nvme/common/ |
H A D | auth.c | 159 int ret, key_len; in nvme_auth_extract_key() local 175 key_len = base64_decode(secret, allocated_len, key->key); in nvme_auth_extract_key() 176 if (key_len < 0) { in nvme_auth_extract_key() 178 key_len); in nvme_auth_extract_key() 179 ret = key_len; in nvme_auth_extract_key() 183 if (key_len != 36 && key_len != 52 && in nvme_auth_extract_key() 184 key_len != 68) { in nvme_auth_extract_key() 185 pr_err("Invalid key len %d\n", key_len); in nvme_auth_extract_key() 191 (key_len in nvme_auth_extract_key() [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | httpauth.c | 32 int key_len, char **dest, int *dest_len) in handle_basic_params() 34 if (!strncmp(key, "realm=", key_len)) { in handle_basic_params() 41 int key_len, char **dest, int *dest_len) in handle_digest_params() 45 if (!strncmp(key, "realm=", key_len)) { in handle_digest_params() 48 } else if (!strncmp(key, "nonce=", key_len)) { in handle_digest_params() 51 } else if (!strncmp(key, "opaque=", key_len)) { in handle_digest_params() 54 } else if (!strncmp(key, "algorithm=", key_len)) { in handle_digest_params() 57 } else if (!strncmp(key, "qop=", key_len)) { in handle_digest_params() 60 } else if (!strncmp(key, "stale=", key_len)) { in handle_digest_params() 67 int key_len, cha in handle_digest_update() 31 handle_basic_params(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len) handle_basic_params() argument 40 handle_digest_params(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len) handle_digest_params() argument 66 handle_digest_update(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len) handle_digest_update() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 63 if (key_len != 20) in ikev2_integ_hash() 65 if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 70 if (key_len != 16) in ikev2_integ_hash() 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 103 return hmac_sha1_vector(key, key_len, num_elem, addr, len, in ikev2_prf_hash() 106 return hmac_md5_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 143 res = ikev2_prf_hash(alg, key, key_len, in ikev2_prf_plus() 175 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) ikev2_encr_encrypt() argument 210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 63 if (key_len != 20) in ikev2_integ_hash() 65 if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 70 if (key_len != 16) in ikev2_integ_hash() 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 103 return hmac_sha1_vector(key, key_len, num_elem, addr, len, in ikev2_prf_hash() 106 return hmac_md5_vector(key, key_len, num_elem, addr, len, hash); in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 143 res = ikev2_prf_hash(alg, key, key_len, in ikev2_prf_plus() 175 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) ikev2_encr_encrypt() argument 210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_vendor_test.c | 144 const int key_len = 64; in eap_vendor_test_getKey() local 149 key = os_malloc(key_len); in eap_vendor_test_getKey() 153 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 154 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 155 *len = key_len; in eap_vendor_test_getKey()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_vendor_test.c | 152 const int key_len = 64; in eap_vendor_test_getKey() local 157 key = os_malloc(key_len); in eap_vendor_test_getKey() 161 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 162 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 163 *len = key_len; in eap_vendor_test_getKey()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_vendor_test.c | 144 const int key_len = 64; in eap_vendor_test_getKey() local 149 key = os_malloc(key_len); in eap_vendor_test_getKey() 153 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 154 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 155 *len = key_len; in eap_vendor_test_getKey()
|