/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 18 unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN]; in pbkdf2_sha1_f() 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 47 SHA1_MAC_LEN, tmp2)) in pbkdf2_sha1_f() 49 os_memcpy(tmp, tmp2, SHA1_MAC_LEN); in pbkdf2_sha1_f() 50 for (j = 0; j < SHA1_MAC_LEN; j++) in pbkdf2_sha1_f() 78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1()
|
D | sha1-tlsprf.c | 35 u8 A_MD5[MD5_MAC_LEN], A_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 36 u8 P_MD5[MD5_MAC_LEN], P_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 51 SHA1_len[0] = SHA1_MAC_LEN; in tls_prf_sha1_md5() 75 SHA1_pos = SHA1_MAC_LEN; in tls_prf_sha1_md5() 82 if (SHA1_pos == SHA1_MAC_LEN) { in tls_prf_sha1_md5() 86 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5() 97 os_memset(A_SHA1, 0, SHA1_MAC_LEN); in tls_prf_sha1_md5() 98 os_memset(P_SHA1, 0, SHA1_MAC_LEN); in tls_prf_sha1_md5()
|
D | sha1-tprf.c | 34 u8 hash[SHA1_MAC_LEN]; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in sha1_t_prf() 61 pos += SHA1_MAC_LEN; in sha1_t_prf() 66 len[0] = SHA1_MAC_LEN; in sha1_t_prf() 69 os_memset(hash, 0, SHA1_MAC_LEN); in sha1_t_prf()
|
D | sha1-prf.c | 35 u8 hash[SHA1_MAC_LEN]; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 54 pos += SHA1_MAC_LEN; in sha1_prf()
|
D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 251 const size_t len2[3] = { SHA1_MAC_LEN, 8, sizeof(magic2) }; in generate_authenticator_response_pwhash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() 412 if (session_key_len > SHA1_MAC_LEN) in get_asymetric_start_key() 413 session_key_len = SHA1_MAC_LEN; in get_asymetric_start_key()
|
D | sha1.h | 12 #define SHA1_MAC_LEN 20 macro
|
D | fips_prf_internal.c | 63 xpos += SHA1_MAC_LEN; in fips186_2_prf()
|
D | sha1.c | 87 _len[1] = SHA1_MAC_LEN; in hmac_sha1_vector()
|
D | crypto_linux.c | 143 mac, SHA1_MAC_LEN); in sha1_vector() 190 addr, len, mac, SHA1_MAC_LEN); in hmac_sha1_vector() 256 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init() 264 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init()
|
D | random.c | 107 u8 hash[SHA1_MAC_LEN]; in random_extract()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in peap_prfplus() 76 pos += SHA1_MAC_LEN; in peap_prfplus() 81 len[0] = SHA1_MAC_LEN; in peap_prfplus()
|
D | eap_eke_common.c | 96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len() 111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len() 150 return SHA1_MAC_LEN; in eap_eke_auth_len() 211 u8 hash[SHA1_MAC_LEN]; in eap_eke_prf_hmac_sha1() 219 vlen[0] = SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 235 if (len > SHA1_MAC_LEN) { in eap_eke_prf_hmac_sha1() 236 os_memcpy(res, hash, SHA1_MAC_LEN); in eap_eke_prf_hmac_sha1() 237 res += SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 238 len -= SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 576 return hmac_sha1(key, SHA1_MAC_LEN, data, data_len, res); in eap_eke_mac() [all …]
|
D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() 93 u8 hash[SHA1_MAC_LEN]; in eap_pax_mac()
|
D | eap_sake_common.c | 215 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf() 232 if (plen >= SHA1_MAC_LEN) { in eap_sake_kdf() 235 pos += SHA1_MAC_LEN; in eap_sake_kdf()
|
D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; in eap_sim_derive_keys_reauth() 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); in eap_sim_derive_keys_reauth() 168 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_verify_mac() 207 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_add_mac()
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_linux.c | 37 u8 last_hash[SHA1_MAC_LEN]; 38 u8 last_hash_prev[SHA1_MAC_LEN]; 171 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive() 193 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 199 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) == 0) { in l2_packet_receive() 204 os_memcpy(l2->last_hash_prev, l2->last_hash, SHA1_MAC_LEN); in l2_packet_receive() 206 os_memcpy(l2->last_hash, hash, SHA1_MAC_LEN); in l2_packet_receive() 223 u8 hash[SHA1_MAC_LEN]; in l2_packet_receive_br() 250 os_memcmp(hash, l2->last_hash, SHA1_MAC_LEN) == 0) { in l2_packet_receive_br() 255 os_memcmp(hash, l2->last_hash_prev, SHA1_MAC_LEN) == 0) { in l2_packet_receive_br() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 891 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos; in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1101 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_process_client_finished() 1218 hlen = SHA1_MAC_LEN; in tls_process_client_finished() 1228 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_process_client_finished()
|
D | tlsv1_client_ocsp.c | 54 u8 hash[SHA1_MAC_LEN]; in ocsp_responder_id_match() 60 return os_memcmp(hash, key_hash, SHA1_MAC_LEN) == 0; in ocsp_responder_id_match() 552 if (hdr.length != SHA1_MAC_LEN) { in tls_process_basic_ocsp_response() 555 hdr.length, SHA1_MAC_LEN); in tls_process_basic_ocsp_response()
|
D | tlsv1_client_write.c | 667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 787 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_write_client_finished() 819 hlen = SHA1_MAC_LEN; in tls_write_client_finished() 829 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_write_client_finished()
|
D | pkcs5.c | 431 u = SHA1_MAC_LEN; in pkcs12_key_gen() 461 u8 hash[SHA1_MAC_LEN]; in pkcs12_key_gen() 473 len[0] = SHA1_MAC_LEN; in pkcs12_key_gen()
|
D | tlsv1_server_write.c | 837 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_write_server_finished() 871 hlen = SHA1_MAC_LEN; in tls_write_server_finished() 881 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_write_server_finished()
|
D | tlsv1_client_read.c | 1317 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_process_server_finished() 1398 hlen = SHA1_MAC_LEN; in tls_process_server_finished() 1408 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_process_server_finished()
|
D | tlsv1_record.c | 49 rl->hash_size = SHA1_MAC_LEN; in tlsv1_record_set_cipher_suite()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_peap.c | 347 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); in eap_tlv_add_cryptobinding() 401 u8 buf[61], mac[SHA1_MAC_LEN]; in eap_tlv_validate_cryptobinding() 441 if (os_memcmp_const(mac, pos, SHA1_MAC_LEN) != 0) { in eap_tlv_validate_cryptobinding() 445 pos, SHA1_MAC_LEN); in eap_tlv_validate_cryptobinding() 447 mac, SHA1_MAC_LEN); in eap_tlv_validate_cryptobinding()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 463 mac, SHA1_MAC_LEN); in eap_peap_build_phase2_tlv() 611 u8 buf[61], mac[SHA1_MAC_LEN]; in eap_tlv_validate_cryptobinding() 643 if (os_memcmp_const(mac, pos, SHA1_MAC_LEN) != 0) { in eap_tlv_validate_cryptobinding()
|