/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-kdf.c | 16 * hmac_sha256_kdf - HMAC-SHA256 based KDF (RFC 5295) 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, function
|
H A D | sha256.h | 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | crypto_module_tests.c | 1770 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1774 "Unexpected hmac_sha256_kdf(outlen=8160) failure"); 1778 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1782 "Unexpected hmac_sha256_kdf(outlen=8161) success");
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 16 * hmac_sha256_kdf - HMAC-SHA256 based KDF (RFC 5295) 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, function
|
H A D | sha256.h | 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | crypto_module_tests.c | 1770 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1774 "Unexpected hmac_sha256_kdf(outlen=8160) failure"); 1778 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1782 "Unexpected hmac_sha256_kdf(outlen=8161) success");
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-kdf.c | 16 * hmac_sha256_kdf - HMAC-SHA256 based KDF (RFC 5295) 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, function
|
H A D | sha256.h | 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | crypto_module_tests.c | 1770 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1774 "Unexpected hmac_sha256_kdf(outlen=8160) failure"); 1778 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", 1782 "Unexpected hmac_sha256_kdf(outlen=8161) success");
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 456 if (hmac_sha256_kdf(sm->eap_if.eapSessionId, sm->eap_if.eapSessionIdLen, 470 if (hmac_sha256_kdf(emsk, emsk_len, 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 456 if (hmac_sha256_kdf(sm->eap_if.eapSessionId, sm->eap_if.eapSessionIdLen, 470 if (hmac_sha256_kdf(emsk, emsk_len, 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 456 if (hmac_sha256_kdf(sm->eap_if.eapSessionId, sm->eap_if.eapSessionIdLen, 470 if (hmac_sha256_kdf(emsk, emsk_len, 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 530 if (hmac_sha256_kdf(sm->eapSessionId, sm->eapSessionIdLen, "EMSK", 544 if (hmac_sha256_kdf(emsk, emsk_len, 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 530 if (hmac_sha256_kdf(sm->eapSessionId, sm->eapSessionIdLen, "EMSK", 544 if (hmac_sha256_kdf(emsk, emsk_len, 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 530 if (hmac_sha256_kdf(sm->eapSessionId, sm->eapSessionIdLen, "EMSK", 544 if (hmac_sha256_kdf(emsk, emsk_len, 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
|