/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 48 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 44 len[2] = seed_len; in tls_prf_sha256()
|
D | sha384-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 44 len[2] = seed_len; in tls_prf_sha384()
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 45 len[2] = seed_len; in sha1_t_prf()
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha384.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 48 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 44 len[2] = seed_len; in tls_prf_sha256()
|
D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 45 len[2] = seed_len; in sha1_t_prf()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_gen.c | 27 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex() argument 32 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 39 seed_in, seed_len, NULL, counter_ret, in DSA_generate_parameters_ex() 46 size_t seed_len, unsigned char *seed_out, in dsa_builtin_paramgen() argument 84 if (seed_len < (size_t)qsize) { in dsa_builtin_paramgen() 88 if (seed_len > (size_t)qsize) { in dsa_builtin_paramgen() 90 seed_len = qsize; in dsa_builtin_paramgen() 92 memcpy(seed, seed_in, seed_len); in dsa_builtin_paramgen() 308 size_t seed_len, int idx, unsigned char *seed_out, in dsa_builtin_paramgen2() argument 347 if (seed_len == 0) in dsa_builtin_paramgen2() [all …]
|
D | dsa_local.h | 60 const unsigned char *seed, int seed_len, 69 size_t seed_len, unsigned char *seed_out, 75 size_t seed_len, int idx, unsigned char *seed_out,
|
D | dsa_depr.c | 36 unsigned char *seed_in, int seed_len, 52 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len,
|
/third_party/openssl/crypto/kdf/ |
D | tls1_prf.c | 18 const unsigned char *seed, size_t seed_len, 177 const unsigned char *seed, size_t seed_len, in tls1_prf_P_hash() argument 204 if (seed != NULL && !EVP_DigestSignUpdate(ctx, seed, seed_len)) in tls1_prf_P_hash() 217 if (seed && !EVP_DigestSignUpdate(ctx, seed, seed_len)) in tls1_prf_P_hash() 249 const unsigned char *seed, size_t seed_len, in tls1_prf_alg() argument 257 seed, seed_len, out, olen)) in tls1_prf_alg() 265 seed, seed_len, tmp, olen)) { in tls1_prf_alg() 274 if (!tls1_prf_P_hash(md, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg()
|
/third_party/openssl/crypto/ec/ |
D | ec_curve.c | 22 seed_len, param_len; member 3019 int seed_len, param_len; in ec_group_new_from_data() local 3034 seed_len = data->seed_len; in ec_group_new_from_data() 3037 params += seed_len; /* skip seed */ in ec_group_new_from_data() 3095 if (seed_len) { in ec_group_new_from_data() 3096 if (!EC_GROUP_set_seed(group, params - seed_len, seed_len)) { in ec_group_new_from_data() 3240 size_t i, seed_len; in ec_curve_nid_from_params() local 3256 seed_len = EC_GROUP_get_seed_len(group); in ec_curve_nid_from_params() 3312 params = params_seed + data->seed_len; in ec_curve_nid_from_params() 3322 && (data->seed_len == 0 || seed_len == 0 in ec_curve_nid_from_params() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() argument 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() argument 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() [all …]
|