/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal.c | 35 size_t key_len; member 40 size_t key_len) in crypto_hash_init() 76 if (key_len > sizeof(k_pad)) { in crypto_hash_init() 78 MD5Update(&ctx->u.md5, key, key_len); in crypto_hash_init() 81 key_len = 16; in crypto_hash_init() 83 os_memcpy(ctx->key, key, key_len); in crypto_hash_init() 84 ctx->key_len = key_len; in crypto_hash_init() 86 os_memcpy(k_pad, key, key_len); in crypto_hash_init() 87 if (key_len < sizeo in crypto_hash_init() 39 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument [all...] |
H A D | aes-siv.c | 64 static int aes_s2v(const u8 *key, size_t key_len, in aes_s2v() argument 79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v() 84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp); in aes_s2v() 89 ret = omac1_aes_vector(key, key_len, 1, &addr[i], &len[i], in aes_s2v() 104 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac); in aes_s2v() 115 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v() 119 int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 132 (key_len != 32 && key_len != 48 && key_len ! in aes_siv_encrypt() 162 aes_siv_decrypt(const u8 *key, size_t key_len, const u8 *iv_crypt, size_t iv_c_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *out) aes_siv_decrypt() argument [all...] |
H A D | crypto_gnutls.c | 101 static int gnutls_hmac_vector(int algo, const u8 *key, size_t key_len, in gnutls_hmac_vector() argument 114 if (gcry_md_setkey(hd, key, key_len) != GPG_ERR_NO_ERROR) { in gnutls_hmac_vector() 128 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 131 return gnutls_hmac_vector(GCRY_MD_MD5, key, key_len, num_elem, addr, in hmac_md5_vector() 136 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 139 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 143 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 146 return gnutls_hmac_vector(GCRY_MD_SHA1, key, key_len, num_elem, addr, in hmac_sha1_vector() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, in hmac_sha1() 160 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 168 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 179 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 187 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 198 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 206 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 402 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 44 if (key_len > 64) { in hmac_sha1_vector() 45 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector() 48 key_len = 20; in hmac_sha1_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 78 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 98 * @key_len: Length of the key in bytes 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 107 return hmac_sha1_vector(key, key_len, in hmac_sha1() [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 43 if (key_len > 64) { in hmac_sha256_vector() 44 if (sha256_vector(1, &key, &key_len, tk) < 0) in hmac_sha256_vector() 47 key_len = 32; in hmac_sha256_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in hmac_sha256() argument 103 return hmac_sha256_vector(key, key_len, in hmac_sha256() [all...] |
H A D | sha384.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha384_vector() argument 43 if (key_len > 128) { in hmac_sha384_vector() 44 if (sha384_vector(1, &key, &key_len, tk) < 0) in hmac_sha384_vector() 47 key_len = 48; in hmac_sha384_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, in hmac_sha384() argument 103 return hmac_sha384_vector(key, key_len, in hmac_sha384() [all...] |
H A D | sha512.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha512_vector() argument 43 if (key_len > 128) { in hmac_sha512_vector() 44 if (sha512_vector(1, &key, &key_len, tk) < 0) in hmac_sha512_vector() 47 key_len = 64; in hmac_sha512_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data, in hmac_sha512() argument 103 return hmac_sha512_vector(key, key_len, in hmac_sha512() [all...] |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 44 if (key_len > 64) { in hmac_md5_vector() 45 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector() 48 key_len = 16; in hmac_md5_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 79 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 108 return hmac_md5_vector(key, key_len, in hmac_md5() [all...] |
H A D | crypto_nettle.c | 108 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 117 hmac_md5_set_key(&ctx, key_len, key); in hmac_md5_vector() 126 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 129 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 133 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 142 hmac_sha1_set_key(&ctx, key_len, key); in hmac_sha1_vector() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 160 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 169 hmac_sha256_set_key(&ctx, key_len, ke in hmac_sha256_vector() 178 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 189 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 207 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 218 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 236 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 411 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
H A D | crypto_linux.c | 58 size_t key_len, size_t num_elem, in linux_af_alg_hash_vector() 71 if (key && setsockopt(s, SOL_ALG, ALG_SET_KEY, key, key_len) < 0) { in linux_af_alg_hash_vector() 171 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 174 return linux_af_alg_hash_vector("hmac(md5)", key, key_len, num_elem, in hmac_md5_vector() 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 182 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 186 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 189 return linux_af_alg_hash_vector("hmac(sha1)", key, key_len, num_elem, in hmac_sha1_vector() 194 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 197 return hmac_sha1_vector(key, key_len, in hmac_sha1() 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) linux_af_alg_hash_vector() argument 201 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 209 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 216 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 224 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 239 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 415 linux_af_alg_skcipher(const char *alg, const u8 *key, size_t key_len) linux_af_alg_skcipher() argument 757 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument 858 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal.c | 35 size_t key_len; member 40 size_t key_len) in crypto_hash_init() 76 if (key_len > sizeof(k_pad)) { in crypto_hash_init() 78 MD5Update(&ctx->u.md5, key, key_len); in crypto_hash_init() 81 key_len = 16; in crypto_hash_init() 83 os_memcpy(ctx->key, key, key_len); in crypto_hash_init() 84 ctx->key_len = key_len; in crypto_hash_init() 86 os_memcpy(k_pad, key, key_len); in crypto_hash_init() 87 if (key_len < sizeo in crypto_hash_init() 39 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument [all...] |
H A D | aes-siv.c | 64 static int aes_s2v(const u8 *key, size_t key_len, in aes_s2v() argument 79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v() 84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp); in aes_s2v() 89 ret = omac1_aes_vector(key, key_len, 1, &addr[i], &len[i], in aes_s2v() 104 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac); in aes_s2v() 115 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v() 119 int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 132 (key_len != 32 && key_len != 48 && key_len ! in aes_siv_encrypt() 162 aes_siv_decrypt(const u8 *key, size_t key_len, const u8 *iv_crypt, size_t iv_c_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *out) aes_siv_decrypt() argument [all...] |
H A D | crypto_gnutls.c | 101 static int gnutls_hmac_vector(int algo, const u8 *key, size_t key_len, in gnutls_hmac_vector() argument 114 if (gcry_md_setkey(hd, key, key_len) != GPG_ERR_NO_ERROR) { in gnutls_hmac_vector() 128 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 131 return gnutls_hmac_vector(GCRY_MD_MD5, key, key_len, num_elem, addr, in hmac_md5_vector() 136 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 139 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 143 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 146 return gnutls_hmac_vector(GCRY_MD_SHA1, key, key_len, num_elem, addr, in hmac_sha1_vector() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, in hmac_sha1() 160 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 168 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 179 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 187 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 198 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 206 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 402 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
H A D | sha1.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 44 if (key_len > 64) { in hmac_sha1_vector() 45 if (sha1_vector(1, &key, &key_len, tk)) in hmac_sha1_vector() 48 key_len = 20; in hmac_sha1_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 78 os_memcpy(k_pad, key, key_len); in hmac_sha1_vector() 98 * @key_len: Length of the key in bytes 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 107 return hmac_sha1_vector(key, key_len, in hmac_sha1() [all...] |
H A D | sha256.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 43 if (key_len > 64) { in hmac_sha256_vector() 44 if (sha256_vector(1, &key, &key_len, tk) < 0) in hmac_sha256_vector() 47 key_len = 32; in hmac_sha256_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha256_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in hmac_sha256() argument 103 return hmac_sha256_vector(key, key_len, in hmac_sha256() [all...] |
H A D | sha384.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha384_vector() argument 43 if (key_len > 128) { in hmac_sha384_vector() 44 if (sha384_vector(1, &key, &key_len, tk) < 0) in hmac_sha384_vector() 47 key_len = 48; in hmac_sha384_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha384_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, in hmac_sha384() argument 103 return hmac_sha384_vector(key, key_len, in hmac_sha384() [all...] |
H A D | sha512.c | 19 * @key_len: Length of the key in bytes 26 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha512_vector() argument 43 if (key_len > 128) { in hmac_sha512_vector() 44 if (sha512_vector(1, &key, &key_len, tk) < 0) in hmac_sha512_vector() 47 key_len = 64; in hmac_sha512_vector() 61 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 77 os_memcpy(k_pad, key, key_len); in hmac_sha512_vector() 94 * @key_len: Length of the key in bytes 100 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data, in hmac_sha512() argument 103 return hmac_sha512_vector(key, key_len, in hmac_sha512() [all...] |
H A D | md5.c | 19 * @key_len: Length of the key in bytes 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 44 if (key_len > 64) { in hmac_md5_vector() 45 if (md5_vector(1, &key, &key_len, tk)) in hmac_md5_vector() 48 key_len = 16; in hmac_md5_vector() 62 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 79 os_memcpy(k_pad, key, key_len); in hmac_md5_vector() 99 * @key_len: Length of the key in bytes 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 108 return hmac_md5_vector(key, key_len, in hmac_md5() [all...] |
H A D | crypto_nettle.c | 108 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 117 hmac_md5_set_key(&ctx, key_len, key); in hmac_md5_vector() 126 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 129 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 133 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 142 hmac_sha1_set_key(&ctx, key_len, key); in hmac_sha1_vector() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 160 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha256_vector() argument 169 hmac_sha256_set_key(&ctx, key_len, ke in hmac_sha256_vector() 178 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 189 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 207 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 218 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 236 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 411 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument [all...] |
/third_party/curl/lib/ |
H A D | hash.c | 47 e->key_len = 0; in hash_element_dtor() 80 mk_hash_element(const void *key, size_t key_len, const void *p) in mk_hash_element() argument 84 key_len); in mk_hash_element() 87 memcpy(he->key, key, key_len); in mk_hash_element() 88 he->key_len = key_len; in mk_hash_element() 105 Curl_hash_add(struct Curl_hash *h, void *key, size_t key_len, void *p) in Curl_hash_add() argument 122 l = FETCH_LIST(h, key, key_len); in Curl_hash_add() 126 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_add() 148 Curl_hash_delete(struct Curl_hash *h, void *key, size_t key_len) Curl_hash_delete() argument 175 Curl_hash_pick(struct Curl_hash *h, void *key, size_t key_len) Curl_hash_pick() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_attr_process.c | 169 const u8 *key, size_t key_len) in wps_process_cred_network_key() 184 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); in wps_process_cred_network_key() 185 if (key_len <= sizeof(cred->key)) { in wps_process_cred_network_key() 186 os_memcpy(cred->key, key, key_len); in wps_process_cred_network_key() 187 cred->key_len = key_len; in wps_process_cred_network_key() 213 cred->key_len > 8 && cred->key_len < 64 && in wps_workaround_cred_key() 214 cred->key[cred->key_len - 1] == 0) { in wps_workaround_cred_key() 219 cred->key, cred->key_len); in wps_workaround_cred_key() 168 wps_process_cred_network_key(struct wps_credential *cred, const u8 *key, size_t key_len) wps_process_cred_network_key() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_attr_process.c | 170 const u8 *key, size_t key_len) in wps_process_cred_network_key() 185 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key", key, key_len); in wps_process_cred_network_key() 186 if (key_len <= sizeof(cred->key)) { in wps_process_cred_network_key() 187 os_memcpy(cred->key, key, key_len); in wps_process_cred_network_key() 188 cred->key_len = key_len; in wps_process_cred_network_key() 214 cred->key_len > 8 && cred->key_len < 64 && in wps_workaround_cred_key() 215 cred->key[cred->key_len - 1] == 0) { in wps_workaround_cred_key() 220 cred->key, cred->key_len); in wps_workaround_cred_key() 169 wps_process_cred_network_key(struct wps_credential *cred, const u8 *key, size_t key_len) wps_process_cred_network_key() argument [all...] |
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | evp.h | 135 int key_len; member 248 key_len, iv_len, flags, init_key, cleanup, \ 251 nid##_##nmode, block_size, key_len, iv_len, \ 263 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 266 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 269 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 273 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 276 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 280 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 283 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | krb5kdf.c | 46 const unsigned char *key, size_t key_len, 54 size_t key_len; member 90 OPENSSL_clear_free(ctx->key, ctx->key_len); in krb5kdf_reset() 129 return KRB5KDF(cipher, engine, ctx->key, ctx->key_len, in krb5kdf_derive() 147 if (!krb5kdf_set_membuf(&ctx->key, &ctx->key_len, p)) in krb5kdf_set_ctx_params() 328 const unsigned char *key, size_t key_len) in cipher_init() 337 if (key_len != (size_t)klen) { in cipher_init() 338 ret = EVP_CIPHER_CTX_set_key_length(ctx, key_len); in cipher_init() 356 const unsigned char *key, size_t key_len, in KRB5KDF() 371 if (key_len ! in KRB5KDF() 326 cipher_init(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *engine, const unsigned char *key, size_t key_len) cipher_init() argument 355 KRB5KDF(const EVP_CIPHER *cipher, ENGINE *engine, const unsigned char *key, size_t key_len, const unsigned char *constant, size_t constant_len, unsigned char *okey, size_t okey_len) KRB5KDF() argument [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | krb5kdf.c | 46 const unsigned char *key, size_t key_len, 54 size_t key_len; member 90 OPENSSL_clear_free(ctx->key, ctx->key_len); in krb5kdf_reset() 129 return KRB5KDF(cipher, engine, ctx->key, ctx->key_len, in krb5kdf_derive() 147 if (!krb5kdf_set_membuf(&ctx->key, &ctx->key_len, p)) in krb5kdf_set_ctx_params() 328 const unsigned char *key, size_t key_len) in cipher_init() 337 if (key_len != (size_t)klen) { in cipher_init() 338 ret = EVP_CIPHER_CTX_set_key_length(ctx, key_len); in cipher_init() 356 const unsigned char *key, size_t key_len, in KRB5KDF() 371 if (key_len ! in KRB5KDF() 326 cipher_init(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *engine, const unsigned char *key, size_t key_len) cipher_init() argument 355 KRB5KDF(const EVP_CIPHER *cipher, ENGINE *engine, const unsigned char *key, size_t key_len, const unsigned char *constant, size_t constant_len, unsigned char *okey, size_t okey_len) KRB5KDF() argument [all...] |