/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-kdf.c | 21 * @seed_len: Length of the seed 30 const char *label, const u8 *seed, size_t seed_len, 44 len[2] = seed_len; 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 34 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 42 if (seed_len < sizeof(xkey)) 43 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 45 seed_len = sizeof(xkey); 49 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-kdf.c | 21 * @seed_len: Length of the seed 30 const char *label, const u8 *seed, size_t seed_len, 44 len[2] = seed_len; 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 34 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 42 if (seed_len < sizeof(xkey)) 43 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 45 seed_len = sizeof(xkey); 49 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-kdf.c | 21 * @seed_len: Length of the seed 30 const char *label, const u8 *seed, size_t seed_len, 44 len[2] = seed_len; 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | fips_prf_openssl.c | 34 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 42 if (seed_len < sizeof(xkey)) 43 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 45 seed_len = sizeof(xkey); 49 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_gpsk_common.c | 110 const u8 *seed, size_t seed_len, 139 data_len = 2 + psk_len + 6 + seed_len; 152 os_memcpy(pos, seed, seed_len); /* inputString */ 163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 189 const u8 *seed, size_t seed_len, 217 psk, psk_len, seed, seed_len, 225 const u8 *seed, size_t seed_len, 251 psk, psk_len, seed, seed_len, 345 size_t seed_len, u8 method_type) 370 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 342 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 154 size_t seed_len, int *out_counter, 157 return dsa->meth->generate_parameters(dsa, bits, seed_in, seed_len, 160 return DSA_default_method.generate_parameters(dsa, bits, seed_in, seed_len, 153 DSA_generate_parameters_ex(DSA *dsa, unsigned bits, const uint8_t *seed_in, size_t seed_len, int *out_counter, unsigned long *out_h, BN_GENCB *cb) argument
|
H A D | dsa_impl.c | 451 size_t seed_len, int *counter_ret, unsigned long *h_ret, 490 /* NB: seed_len == 0 is special case: copy generated seed to 492 if (seed_len && (seed_len < (size_t)qsize)) { 495 if (seed_len > (size_t)qsize) { 496 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED, 500 memcpy(seed, seed_in, seed_len); 537 if (!seed_len) { 544 seed_len = 0; /* use random seed if 'seed_in' turns out to be bad*/ 450 paramgen(DSA *ret, unsigned bits, const uint8_t *seed_in, size_t seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|