Searched defs:label (Results 1 - 25 of 843) sorted by last modified time

1234567891011>>

/external/zopfli/src/zopflipng/
H A Dzopflipng_bin.cc127 void PrintSize(const char* label, size_t size) { argument
128 printf("%s: %d (%dK)\n", label, (int) size, (int) size / 1024);
131 void PrintResultSize(const char* label, size_t oldsize, size_t newsize) { argument
133 label, (int) newsize, (int) newsize / 1024, newsize * 100.0 / oldsize);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c1233 static int wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, argument
1256 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len);
1258 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len)
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c77 * @label: Label to use in derivation
95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument
122 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-prf.c20 * @label: A unique label for each purpose of the PRF
30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument
36 size_t label_len = os_strlen(label) + 1;
40 addr[0] = (u8 *) label;
H A Dsha1-tlsprf.c20 * @label: A unique label for each purpose of the PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
48 MD5_addr[1] = (unsigned char *) label;
49 MD5_len[1] = os_strlen(label);
55 SHA1_addr[1] = (unsigned char *) label;
56 SHA1_len[1] = os_strlen(label);
63 * PRF = P_MD5(S1, label + seed) XOR P_SHA-1(S2, label + seed)
H A Dsha1-tprf.c19 * @label: A unique label for each purpose of the PRF
29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument
35 size_t label_len = os_strlen(label);
42 addr[1] = (unsigned char *) label;
H A Dsha256-prf.c20 * @label: A unique label for each purpose of the PRF
29 void sha256_prf(const u8 *key, size_t key_len, const char *label, argument
32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8);
40 * @label: A unique label for each purpose of the PRF
51 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label, argument
65 addr[1] = (u8 *) label;
66 len[1] = os_strlen(label);
H A Dsha256-tlsprf.c19 * @label: A unique label for each purpose of the PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
41 addr[1] = (unsigned char *) label;
42 len[1] = os_strlen(label);
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
H A Dtls_gnutls.c788 const char *label, int server_random_first,
795 return gnutls_prf(conn->session, os_strlen(label), label,
787 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
H A Dtls_internal.c327 const char *label, int server_random_first,
332 return tlsv1_client_prf(conn->client, label,
339 return tlsv1_server_prf(conn->server, label,
326 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
H A Dtls_none.c89 const char *label, int server_random_first,
88 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
H A Dtls_nss.c425 const char *label, int server_random_first,
435 if (SSL_ExportKeyingMaterial(conn->fd, label, NULL, 0, out, out_len) !=
438 "(label='%s' out_len=%d", label, (int) out_len);
424 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
H A Dtls_openssl.c1203 return 1; /* full label match completes suffix match */
1205 wpa_printf(MSG_DEBUG, "TLS: Reject due to incomplete label match");
2545 const char *label, int server_random_first,
2555 if (SSL_export_keying_material(ssl, out, out_len, label,
2556 os_strlen(label), NULL, 0, 0) == 1) {
2544 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
H A Dtls_schannel.c189 const char *label, int server_random_first,
202 os_strcmp(label, "client EAP encryption") != 0 ||
188 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c460 const char *label = "EAP-EKE Keys"; local
482 label_len = os_strlen(label);
487 os_memcpy(data, label, label_len);
513 const char *label = "EAP-EKE Ka"; local
523 label_len = os_strlen(label);
529 os_memcpy(pos, label, label_len);
559 const char *label = "EAP-EKE Exported Keys"; local
568 label_len = os_strlen(label);
574 os_memcpy(pos, label, label_len);
718 int eap_eke_auth(struct eap_eke_session *sess, const char *label, argument
[all...]
H A Deap_fast_common.c82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
88 "PAC to master secret label hash",
97 const char *label, size_t len)
111 if (tls_connection_prf(ssl_ctx, conn, label, 1, out, block_size + len)
131 label, rnd, keys.client_random_len +
96 eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, const char *label, size_t len) argument
H A Deap_peap_common.c16 const char *label, const u8 *seed, size_t seed_len,
22 size_t label_len = os_strlen(label);
29 addr[1] = (unsigned char *) label;
15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
H A Deap_pwd_common.c40 static int eap_pwd_kdf(const u8 *key, size_t keylen, const u8 *label, argument
61 crypto_hash_update(hash, label, labellen);
H A Deap_sake_common.c197 * @label: A unique label for each purpose of the KDF
208 static void eap_sake_kdf(const u8 *key, size_t key_len, const char *label, argument
216 size_t label_len = os_strlen(label) + 1;
220 addr[0] = (u8 *) label; /* Label | Y */
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_peap.c87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key "
290 * in the end of the label just before ISK; is that just a typo?)
1014 char *label; local
1020 * encryption" as the label. However, most existing
1022 * label, "client EAP encryption", instead. Use the old
1023 * label by default, but allow it to be configured with
1026 label = "client PEAP encryption";
1028 label = "client EAP encryption";
1029 wpa_printf(MSG_DEBUG, "EAP-PEAP: using label '%s' in "
1030 "key derivation", label);
[all...]
H A Deap_tls_common.c297 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
303 * different label to bind the key usage into the generated material.
308 const char *label, size_t len)
320 if (tls_connection_prf(data->ssl_ctx, data->conn, label, 0, out, len)
345 label, rnd, keys.client_random_len +
307 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_tls_common.c101 char *label, size_t len)
110 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) ==
129 label, rnd, keys.client_random_len +
100 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, char *label, size_t len) argument
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.c34 static int aes_kdf_128(const u8 *kdk, const char *label, const u8 *context, argument
43 lab_len = os_strlen(label);
58 os_memcpy(buf + 1, label, lab_len);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c515 * @label: Label (e.g., description of the key) for PRF
522 int tlsv1_client_prf(struct tlsv1_client *conn, const char *label, argument
542 label, seed, 2 * TLS_RANDOM_LEN, out, out_len);
H A Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,

Completed in 1555 milliseconds

1234567891011>>