/external/openssl/crypto/dsa/ |
H A D | dsa_depr.c | 87 unsigned char *seed_in, int seed_len, 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, 86 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback)(int, int, void *), void *cb_arg) argument
|
H A D | dsa_gen.c | 89 const unsigned char *seed_in, int seed_len, 101 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 107 seed_in, seed_len, 128 seed_in, seed_len, NULL, counter_ret, h_ret, cb); 133 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, 164 /* NB: seed_len == 0 is special case: copy generated seed to 167 if (seed_len && (seed_len < (size_t)qsize)) 169 if (seed_len > (size_t)qsize) 170 seed_len 88 DSA_generate_parameters_ex(DSA *ret, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument 132 dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits, const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, unsigned char *seed_out, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 26 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 26 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 26 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_gpsk_common.c | 110 const u8 *seed, size_t seed_len, 139 data_len = 2 + psk_len + 6 + seed_len; 152 os_memcpy(pos, seed, seed_len); /* inputString */ 163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 189 const u8 *seed, size_t seed_len, 217 psk, psk_len, seed, seed_len, 225 const u8 *seed, size_t seed_len, 251 psk, psk_len, seed, seed_len, 345 size_t seed_len, u8 method_type) 370 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 342 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | helpers.cc | 106 virtual bool Init(const void* seed, size_t seed_len) { argument
|
/external/openssl/crypto/ec/ |
H A D | eck_prn.c | 157 size_t seed_len=0; local 263 seed_len = EC_GROUP_get_seed_len(x); 330 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off))
|
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 151 size_t seed_len, int *out_counter, 154 return dsa->meth->generate_parameters(dsa, bits, seed_in, seed_len, 157 return DSA_default_method.generate_parameters(dsa, bits, seed_in, seed_len, 150 DSA_generate_parameters_ex(DSA *dsa, unsigned bits, const uint8_t *seed_in, size_t seed_len, int *out_counter, unsigned long *out_h, BN_GENCB *cb) argument
|
H A D | dsa_impl.c | 457 size_t seed_len, int *counter_ret, unsigned long *h_ret, 494 /* NB: seed_len == 0 is special case: copy generated seed to 496 if (seed_len && (seed_len < (size_t)qsize)) 498 if (seed_len > (size_t)qsize) 499 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED, 502 memcpy(seed, seed_in, seed_len); 532 if (!seed_len) { 537 seed_len = 0; /* use random seed if 'seed_in' turns out to be bad*/ 456 paramgen(DSA *ret, unsigned bits, const uint8_t *seed_in, size_t seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument
|