/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 18 unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN]; in pbkdf2_sha1_f() 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 47 SHA1_MAC_LEN, tmp2)) in pbkdf2_sha1_f() 49 os_memcpy(tmp, tmp2, SHA1_MAC_LEN); in pbkdf2_sha1_f() 50 for (j = 0; j < SHA1_MAC_LEN; j++) in pbkdf2_sha1_f() 78 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1()
|
D | sha1-tlsprf.c | 35 u8 A_MD5[MD5_MAC_LEN], A_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 36 u8 P_MD5[MD5_MAC_LEN], P_SHA1[SHA1_MAC_LEN]; in tls_prf_sha1_md5() 54 SHA1_len[0] = SHA1_MAC_LEN; in tls_prf_sha1_md5() 78 SHA1_pos = SHA1_MAC_LEN; in tls_prf_sha1_md5() 85 if (SHA1_pos == SHA1_MAC_LEN) { in tls_prf_sha1_md5() 89 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); in tls_prf_sha1_md5()
|
D | sha1-tprf.c | 34 u8 hash[SHA1_MAC_LEN]; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in sha1_t_prf() 61 pos += SHA1_MAC_LEN; in sha1_t_prf() 66 len[0] = SHA1_MAC_LEN; in sha1_t_prf()
|
D | sha1-prf.c | 35 u8 hash[SHA1_MAC_LEN]; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 54 pos += SHA1_MAC_LEN; in sha1_prf()
|
D | ms_funcs.c | 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 249 const size_t len2[3] = { SHA1_MAC_LEN, 8, sizeof(magic2) }; in generate_authenticator_response_pwhash() 335 u8 hash[SHA1_MAC_LEN]; in get_master_key() 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() 412 if (session_key_len > SHA1_MAC_LEN) in get_asymetric_start_key() 413 session_key_len = SHA1_MAC_LEN; in get_asymetric_start_key()
|
D | sha1.h | 12 #define SHA1_MAC_LEN 20 macro
|
D | fips_prf_internal.c | 63 xpos += SHA1_MAC_LEN; in fips186_2_prf()
|
D | sha1.c | 86 _len[1] = SHA1_MAC_LEN; in hmac_sha1_vector()
|
D | random.c | 102 u8 hash[SHA1_MAC_LEN]; in random_extract()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); in peap_prfplus() 76 pos += SHA1_MAC_LEN; in peap_prfplus() 81 len[0] = SHA1_MAC_LEN; in peap_prfplus()
|
D | eap_eke_common.c | 98 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len() 113 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len() 152 return SHA1_MAC_LEN; in eap_eke_auth_len() 239 u8 hash[SHA1_MAC_LEN]; in eap_eke_prf_hmac_sha1() 247 vlen[0] = SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 263 if (len > SHA1_MAC_LEN) { in eap_eke_prf_hmac_sha1() 264 os_memcpy(res, hash, SHA1_MAC_LEN); in eap_eke_prf_hmac_sha1() 265 res += SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 266 len -= SHA1_MAC_LEN; in eap_eke_prf_hmac_sha1() 606 return hmac_sha1(key, SHA1_MAC_LEN, data, data_len, res); in eap_eke_mac() [all …]
|
D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() 92 u8 hash[SHA1_MAC_LEN]; in eap_pax_mac()
|
D | eap_sake_common.c | 215 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf() 232 if (plen >= SHA1_MAC_LEN) { in eap_sake_kdf() 235 pos += SHA1_MAC_LEN; in eap_sake_kdf()
|
D | eap_sim_common.c | 112 u8 xkey[SHA1_MAC_LEN]; in eap_sim_derive_keys_reauth() 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); in eap_sim_derive_keys_reauth() 168 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_verify_mac() 208 unsigned char hmac[SHA1_MAC_LEN]; in eap_sim_add_mac()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_write.c | 525 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 646 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_write_client_finished() 678 hlen = SHA1_MAC_LEN; in tls_write_client_finished() 688 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_write_client_finished()
|
D | tlsv1_server_read.c | 773 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos, *buf; in tls_process_certificate_verify() 901 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1068 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_process_client_finished() 1149 hlen = SHA1_MAC_LEN; in tls_process_client_finished() 1159 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_process_client_finished()
|
D | tlsv1_server_write.c | 577 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_write_server_finished() 611 hlen = SHA1_MAC_LEN; in tls_write_server_finished() 621 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_write_server_finished()
|
D | tlsv1_client_read.c | 765 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN]; in tls_process_server_finished() 846 hlen = SHA1_MAC_LEN; in tls_process_server_finished() 856 hlen = MD5_MAC_LEN + SHA1_MAC_LEN; in tls_process_server_finished()
|
D | tlsv1_record.c | 49 rl->hash_size = SHA1_MAC_LEN; in tlsv1_record_set_cipher_suite()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_peap.c | 335 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); in eap_tlv_add_cryptobinding() 389 u8 buf[61], mac[SHA1_MAC_LEN]; in eap_tlv_validate_cryptobinding() 429 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { in eap_tlv_validate_cryptobinding() 433 pos, SHA1_MAC_LEN); in eap_tlv_validate_cryptobinding() 435 mac, SHA1_MAC_LEN); in eap_tlv_validate_cryptobinding()
|
D | eap_fast.c | 743 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; in eap_fast_process_crypto_binding()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 447 mac, SHA1_MAC_LEN); in eap_peap_build_phase2_tlv() 597 u8 buf[61], mac[SHA1_MAC_LEN]; in eap_tlv_validate_cryptobinding() 629 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { in eap_tlv_validate_cryptobinding()
|
D | eap_server_fast.c | 1174 u8 cmac[SHA1_MAC_LEN]; in eap_fast_validate_crypto_binding()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_common.c | 498 u8 hash[SHA1_MAC_LEN]; in uuid_gen_mac_addr()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 43 u8 hash[SHA1_MAC_LEN]; in wpa_eapol_key_mic()
|