/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha256.h | 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() function
|
D | crypto_module_tests.c | 1770 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", in test_sha256() 1778 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", in test_sha256() 2015 if (hmac_sha256_kdf(prk1, sizeof(prk1), NULL, info1, sizeof(info1), in test_extract_expand_hkdf() 2030 if (hmac_sha256_kdf(prk2, sizeof(prk2), NULL, info2, sizeof(info2), in test_extract_expand_hkdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha256.h | 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() function
|
D | crypto_module_tests.c | 1919 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", in test_sha256() 1927 res = hmac_sha256_kdf((u8 *) "secret", 6, "label", in test_sha256() 2164 if (hmac_sha256_kdf(prk1, sizeof(prk1), NULL, info1, sizeof(info1), in test_extract_expand_hkdf() 2179 if (hmac_sha256_kdf(prk2, sizeof(prk2), NULL, info2, sizeof(info2), in test_extract_expand_hkdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server.c | 456 if (hmac_sha256_kdf(sm->eap_if.eapSessionId, sm->eap_if.eapSessionIdLen, in eap_server_erp_init() 470 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server.c | 463 if (hmac_sha256_kdf(sm->eap_if.eapSessionId, sm->eap_if.eapSessionIdLen, in eap_server_erp_init() 477 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap.c | 744 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init() 757 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 1926 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap.c | 752 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init() 765 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 1964 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dpp_crypto.c | 117 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 1637 res = hmac_sha256_kdf(prk, hash_len, NULL, info, info_len, in dpp_pkex_derive_z()
|
D | sae.c | 560 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa.c | 4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | ap_config_file.c | 1057 ret = hmac_sha256_kdf(oldkey, sizeof(oldkey), "FT OLDKEY", NULL, 0, in rkh_derive_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | dpp.c | 409 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 7205 res = hmac_sha256_kdf(prk, hash_len, NULL, info, info_len, in dpp_pkex_derive_z()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa.c | 5203 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | ap_config_file.c | 965 ret = hmac_sha256_kdf(oldkey, sizeof(oldkey), "FT OLDKEY", NULL, 0, in rkh_derive_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_11.c | 2775 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11.c | 4292 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
|