/external/wpa_supplicant_8/src/crypto/ |
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 26 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 34 if (seed_len > sizeof(xkey)) in fips186_2_prf() 35 seed_len = sizeof(xkey); in fips186_2_prf() 39 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 40 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 51 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 58 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 44 len[2] = seed_len; in tls_prf_sha256()
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 45 len[2] = seed_len; in sha1_t_prf()
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
D | fips_prf_cryptoapi.c | 15 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
|
D | fips_prf_nss.c | 16 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
|
D | fips_prf_gnutls.c | 16 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_gpsk_common.c | 119 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 148 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 161 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 198 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 226 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 234 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 260 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 296 size_t seed_len; in eap_gpsk_derive_keys() local 308 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len; in eap_gpsk_derive_keys() [all …]
|
D | eap_peap_common.c | 22 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 38 len[2] = seed_len; in peap_prfplus()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 110 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 139 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 152 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 189 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 217 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 251 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 287 size_t seed_len; in eap_gpsk_derive_keys() local 299 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len; in eap_gpsk_derive_keys() [all …]
|
D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 32 len[2] = seed_len; in peap_prfplus()
|
/external/openssl/crypto/dsa/ |
D | dsa_gen.c | 89 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex() argument 101 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 107 seed_in, seed_len, in DSA_generate_parameters_ex() 128 seed_in, seed_len, NULL, counter_ret, h_ret, cb); in DSA_generate_parameters_ex() 133 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, in dsa_builtin_paramgen() argument 167 if (seed_len && (seed_len < (size_t)qsize)) in dsa_builtin_paramgen() 169 if (seed_len > (size_t)qsize) in dsa_builtin_paramgen() 170 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED, in dsa_builtin_paramgen() 173 memcpy(seed, seed_in, seed_len); in dsa_builtin_paramgen() 204 if (!seed_len) in dsa_builtin_paramgen() [all …]
|
D | dsa_depr.c | 87 unsigned char *seed_in, int seed_len, in DSA_generate_parameters() argument 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters()
|
D | dsa.h | 149 const unsigned char *seed, int seed_len, 231 unsigned char *seed,int seed_len, 238 const unsigned char *seed,int seed_len,
|
D | dsa_locl.h | 58 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_openssl.c | 105 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 113 if (seed_len > sizeof(xkey)) in fips186_2_prf() 114 seed_len = sizeof(xkey); in fips186_2_prf() 118 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 119 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.c | 173 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 188 len[2] = seed_len; in sha1_t_prf() 230 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 250 MD5_len[2] = seed_len; in tls_prf() 257 SHA1_len[2] = seed_len; in tls_prf() 417 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 425 if (seed_len > sizeof(xkey)) in fips186_2_prf() 426 seed_len = sizeof(xkey); in fips186_2_prf() 430 os_memcpy(xkey, seed, seed_len); in fips186_2_prf() 431 os_memset(xkey + seed_len, 0, 64 - seed_len); in fips186_2_prf()
|
D | sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const char *label, const u8 *seed, size_t seed_len,
|
/external/openssl/crypto/ec/ |
D | ec_curve.c | 80 seed_len, member 1942 int seed_len,param_len; in ec_group_new_from_data() local 1954 seed_len = data->seed_len; in ec_group_new_from_data() 1957 params += seed_len; /* skip seed */ in ec_group_new_from_data() 2024 if (seed_len) in ec_group_new_from_data() 2026 if (!EC_GROUP_set_seed(group, params-seed_len, seed_len)) in ec_group_new_from_data()
|
D | ec_lib.c | 111 ret->seed_len = 0; in EC_GROUP_new() 162 OPENSSL_cleanse(group->seed, group->seed_len); in EC_GROUP_clear_free() 230 dest->seed = OPENSSL_malloc(src->seed_len); in EC_GROUP_copy() 233 if (!memcpy(dest->seed, src->seed, src->seed_len)) in EC_GROUP_copy() 235 dest->seed_len = src->seed_len; in EC_GROUP_copy() 242 dest->seed_len = 0; in EC_GROUP_copy() 380 group->seed_len = 0; in EC_GROUP_set_seed() 389 group->seed_len = len; in EC_GROUP_set_seed() 403 return group->seed_len; in EC_GROUP_get_seed_len()
|
/external/openssh/openbsd-compat/ |
D | openssl-compat.c | 108 int seed_len, int *counter_ret, unsigned long *h_ret, void *cb) in DSA_generate_parameters_ex() argument 114 new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len, in DSA_generate_parameters_ex()
|
/external/openssl/include/openssl/ |
D | dsa.h | 149 const unsigned char *seed, int seed_len, 231 unsigned char *seed,int seed_len, 238 const unsigned char *seed,int seed_len,
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 310 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|