/external/zopfli/src/zopflipng/ |
H A D | zopflipng_bin.cc | 127 void PrintSize(const char* label, size_t size) { argument 128 printf("%s: %d (%dK)\n", label, (int) size, (int) size / 1024); 131 void PrintResultSize(const char* label, size_t oldsize, size_t newsize) { argument 133 label, (int) newsize, (int) newsize / 1024, newsize * 100.0 / oldsize);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1233 static int wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, argument 1256 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1258 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len)
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 77 * @label: Label to use in derivation 95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 122 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-prf.c | 20 * @label: A unique label for each purpose of the PRF 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, argument 36 size_t label_len = os_strlen(label) + 1; 40 addr[0] = (u8 *) label;
|
H A D | sha1-tlsprf.c | 20 * @label: A unique label for each purpose of the PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 48 MD5_addr[1] = (unsigned char *) label; 49 MD5_len[1] = os_strlen(label); 55 SHA1_addr[1] = (unsigned char *) label; 56 SHA1_len[1] = os_strlen(label); 63 * PRF = P_MD5(S1, label + seed) XOR P_SHA-1(S2, label + seed)
|
H A D | sha1-tprf.c | 19 * @label: A unique label for each purpose of the PRF 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, argument 35 size_t label_len = os_strlen(label); 42 addr[1] = (unsigned char *) label;
|
H A D | sha256-prf.c | 20 * @label: A unique label for each purpose of the PRF 29 void sha256_prf(const u8 *key, size_t key_len, const char *label, argument 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 40 * @label: A unique label for each purpose of the PRF 51 void sha256_prf_bits(const u8 *key, size_t key_len, const char *label, argument 65 addr[1] = (u8 *) label; 66 len[1] = os_strlen(label);
|
H A D | sha256-tlsprf.c | 19 * @label: A unique label for each purpose of the PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 41 addr[1] = (unsigned char *) label; 42 len[1] = os_strlen(label); 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
|
H A D | tls_gnutls.c | 788 const char *label, int server_random_first, 795 return gnutls_prf(conn->session, os_strlen(label), label, 787 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tls_internal.c | 327 const char *label, int server_random_first, 332 return tlsv1_client_prf(conn->client, label, 339 return tlsv1_server_prf(conn->server, label, 326 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tls_none.c | 89 const char *label, int server_random_first, 88 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tls_nss.c | 425 const char *label, int server_random_first, 435 if (SSL_ExportKeyingMaterial(conn->fd, label, NULL, 0, out, out_len) != 438 "(label='%s' out_len=%d", label, (int) out_len); 424 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tls_openssl.c | 1203 return 1; /* full label match completes suffix match */ 1205 wpa_printf(MSG_DEBUG, "TLS: Reject due to incomplete label match"); 2545 const char *label, int server_random_first, 2555 if (SSL_export_keying_material(ssl, out, out_len, label, 2556 os_strlen(label), NULL, 0, 0) == 1) { 2544 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tls_schannel.c | 189 const char *label, int server_random_first, 202 os_strcmp(label, "client EAP encryption") != 0 || 188 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 460 const char *label = "EAP-EKE Keys"; local 482 label_len = os_strlen(label); 487 os_memcpy(data, label, label_len); 513 const char *label = "EAP-EKE Ka"; local 523 label_len = os_strlen(label); 529 os_memcpy(pos, label, label_len); 559 const char *label = "EAP-EKE Exported Keys"; local 568 label_len = os_strlen(label); 574 os_memcpy(pos, label, label_len); 718 int eap_eke_auth(struct eap_eke_session *sess, const char *label, argument [all...] |
H A D | eap_fast_common.c | 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 88 "PAC to master secret label hash", 97 const char *label, size_t len) 111 if (tls_connection_prf(ssl_ctx, conn, label, 1, out, block_size + len) 131 label, rnd, keys.client_random_len + 96 eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, const char *label, size_t len) argument
|
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 22 size_t label_len = os_strlen(label); 29 addr[1] = (unsigned char *) label; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_pwd_common.c | 40 static int eap_pwd_kdf(const u8 *key, size_t keylen, const u8 *label, argument 61 crypto_hash_update(hash, label, labellen);
|
H A D | eap_sake_common.c | 197 * @label: A unique label for each purpose of the KDF 208 static void eap_sake_kdf(const u8 *key, size_t key_len, const char *label, argument 216 size_t label_len = os_strlen(label) + 1; 220 addr[0] = (u8 *) label; /* Label | Y */
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 290 * in the end of the label just before ISK; is that just a typo?) 1014 char *label; local 1020 * encryption" as the label. However, most existing 1022 * label, "client EAP encryption", instead. Use the old 1023 * label by default, but allow it to be configured with 1026 label = "client PEAP encryption"; 1028 label = "client EAP encryption"; 1029 wpa_printf(MSG_DEBUG, "EAP-PEAP: using label '%s' in " 1030 "key derivation", label); [all...] |
H A D | eap_tls_common.c | 297 * @label: Label string for deriving the keys, e.g., "client EAP encryption" 303 * different label to bind the key usage into the generated material. 308 const char *label, size_t len) 320 if (tls_connection_prf(data->ssl_ctx, data->conn, label, 0, out, len) 345 label, rnd, keys.client_random_len + 307 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 101 char *label, size_t len) 110 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 129 label, rnd, keys.client_random_len + 100 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, char *label, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 34 static int aes_kdf_128(const u8 *kdk, const char *label, const u8 *context, argument 43 lab_len = os_strlen(label); 58 os_memcpy(buf + 1, label, lab_len);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 515 * @label: Label (e.g., description of the key) for PRF 522 int tlsv1_client_prf(struct tlsv1_client *conn, const char *label, argument 542 label, seed, 2 * TLS_RANDOM_LEN, out, out_len);
|
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|