/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_gpsk_common.c | 119 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 148 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 161 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 198 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 226 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 234 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 260 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 296 size_t seed_len; in eap_gpsk_derive_keys() local 308 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len; in eap_gpsk_derive_keys() [all …]
|
D | eap_peap_common.c | 22 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 38 len[2] = seed_len; in peap_prfplus()
|
D | eap_peap_common.h | 19 const char *label, const u8 *seed, size_t seed_len,
|
/external/wpa_supplicant/ |
D | eap_gpsk_common.c | 118 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 147 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 160 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 197 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 225 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 233 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 259 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 295 size_t seed_len; in eap_gpsk_derive_keys() local 307 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len; in eap_gpsk_derive_keys() [all …]
|
D | crypto.c | 103 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 111 if (seed_len > sizeof(xkey)) in fips186_2_prf() 112 seed_len = sizeof(xkey); in fips186_2_prf() 116 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 117 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.c | 175 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 190 len[2] = seed_len; in sha1_t_prf() 230 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 250 MD5_len[2] = seed_len; in tls_prf() 257 SHA1_len[2] = seed_len; in tls_prf() 411 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 419 if (seed_len > sizeof(xkey)) in fips186_2_prf() 420 seed_len = sizeof(xkey); in fips186_2_prf() 424 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 425 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
D | crypto.h | 70 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen);
|
D | crypto_gnutls.c | 95 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
|
D | eap_fast.c | 856 size_t seed_len, server_random_len; in eap_fast_set_tls_master_secret() local 894 seed_len = keys.client_random_len + server_random_len; in eap_fast_set_tls_master_secret() 895 seed = os_malloc(seed_len); in eap_fast_set_tls_master_secret() 902 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: T-PRF seed", seed, seed_len); in eap_fast_set_tls_master_secret() 909 seed, seed_len, master_secret, sizeof(master_secret)); in eap_fast_set_tls_master_secret()
|
/external/openssl/crypto/dsa/ |
D | dsa_gen.c | 85 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex() argument 89 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 108 seed_in, seed_len, counter_ret, h_ret, cb); in DSA_generate_parameters_ex() 113 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, in dsa_builtin_paramgen() argument 146 if (seed_len && (seed_len < (size_t)qsize)) in dsa_builtin_paramgen() 148 if (seed_len > (size_t)qsize) in dsa_builtin_paramgen() 149 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED, in dsa_builtin_paramgen() 152 memcpy(seed, seed_in, seed_len); in dsa_builtin_paramgen() 183 if (!seed_len) in dsa_builtin_paramgen() 191 seed_len=0; /* use random seed if 'seed_in' turns out to be bad*/ in dsa_builtin_paramgen()
|
D | dsa_depr.c | 87 unsigned char *seed_in, int seed_len, in DSA_generate_parameters() argument 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters()
|
D | dsa.h | 134 const unsigned char *seed, int seed_len, 216 unsigned char *seed,int seed_len, 223 const unsigned char *seed,int seed_len,
|
D | dsa_locl.h | 58 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len,
|
/external/openssl/crypto/ec/ |
D | ec_curve.c | 79 seed_len, member 1916 int seed_len,param_len; in ec_group_new_from_data() local 1925 seed_len = data->seed_len; in ec_group_new_from_data() 1928 params += seed_len; /* skip seed */ in ec_group_new_from_data() 1983 if (seed_len) in ec_group_new_from_data() 1985 if (!EC_GROUP_set_seed(group, params-seed_len, seed_len)) in ec_group_new_from_data()
|
D | ec_lib.c | 111 ret->seed_len = 0; in EC_GROUP_new() 162 OPENSSL_cleanse(group->seed, group->seed_len); in EC_GROUP_clear_free() 230 dest->seed = OPENSSL_malloc(src->seed_len); in EC_GROUP_copy() 233 if (!memcpy(dest->seed, src->seed, src->seed_len)) in EC_GROUP_copy() 235 dest->seed_len = src->seed_len; in EC_GROUP_copy() 242 dest->seed_len = 0; in EC_GROUP_copy() 380 group->seed_len = 0; in EC_GROUP_set_seed() 389 group->seed_len = len; in EC_GROUP_set_seed() 403 return group->seed_len; in EC_GROUP_get_seed_len()
|
D | eck_prn.c | 157 size_t seed_len=0; in ECPKParameters_print() local 262 seed_len = EC_GROUP_get_seed_len(x); in ECPKParameters_print() 329 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off)) in ECPKParameters_print()
|
D | ec_lcl.h | 195 size_t seed_len; member
|
D | ec_asn1.c | 535 (int)group->seed_len)) in ec_asn1_group2curve() 922 ret->seed_len = params->curve->seed->length; in ec_asn1_parameters2group()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_openssl.c | 105 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 113 if (seed_len > sizeof(xkey)) in fips186_2_prf() 114 seed_len = sizeof(xkey); in fips186_2_prf() 118 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 119 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.c | 173 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 188 len[2] = seed_len; in sha1_t_prf() 230 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 250 MD5_len[2] = seed_len; in tls_prf() 257 SHA1_len[2] = seed_len; in tls_prf() 417 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 425 if (seed_len > sizeof(xkey)) in fips186_2_prf() 426 seed_len = sizeof(xkey); in fips186_2_prf() 430 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 431 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const char *label, const u8 *seed, size_t seed_len,
|
D | crypto.h | 70 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
|
D | crypto_gnutls.c | 95 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
|
/external/openssl/include/openssl/ |
D | dsa.h | 134 const unsigned char *seed, int seed_len, 216 unsigned char *seed,int seed_len, 223 const unsigned char *seed,int seed_len,
|