Home
last modified time | relevance | path

Searched refs:seed_len (Results 1 – 22 of 22) sorted by relevance

/external/wpa_supplicant_8/src/crypto/
Dfips_prf_internal.c17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
25 if (seed_len < sizeof(xkey)) in fips186_2_prf()
26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
28 seed_len = sizeof(xkey); in fips186_2_prf()
32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
Dfips_prf_openssl.c48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
56 if (seed_len < sizeof(xkey)) in fips186_2_prf()
57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
59 seed_len = sizeof(xkey); in fips186_2_prf()
63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
Dsha1-tlsprf.c31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument
51 MD5_len[2] = seed_len; in tls_prf_sha1_md5()
58 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
Dsha256-tlsprf.c30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument
44 len[2] = seed_len; in tls_prf_sha256()
Dsha1-tprf.c30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument
45 len[2] = seed_len; in sha1_t_prf()
Dsha1.h21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
24 size_t seed_len, u8 *out, size_t outlen);
Dsha256.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
Dsha256-kdf.c30 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument
44 len[2] = seed_len; in hmac_sha256_kdf()
Dcrypto.h68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
/external/wpa_supplicant_8/src/eap_common/
Deap_gpsk_common.c111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument
140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper()
153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper()
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper()
190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument
252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256()
346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() argument
371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper()
[all …]
Deap_peap_common.c16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument
32 len[2] = seed_len; in peap_prfplus()
Deap_peap_common.h13 const char *label, const u8 *seed, size_t seed_len,
/external/boringssl/src/decrepit/dsa/
Ddsa_decrepit.c70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len, in DSA_generate_parameters() argument
73 if (bits < 0 || seed_len < 0) { in DSA_generate_parameters()
95 if (!DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, counter_ret, in DSA_generate_parameters()
/external/boringssl/src/ssl/
Dt1_enc.cc528 size_t seed_len = 2 * SSL3_RANDOM_SIZE; in SSL_export_keying_material() local
534 seed_len += 2 + context_len; in SSL_export_keying_material()
536 uint8_t *seed = (uint8_t *)OPENSSL_malloc(seed_len); in SSL_export_keying_material()
559 seed, seed_len, NULL, 0); in SSL_export_keying_material()
/external/boringssl/src/include/openssl/
Ddsa.h126 size_t seed_len, int *out_counter,
384 int seed_len, int *counter_ret,
/external/boringssl/src/crypto/dsa/
Ddsa.c157 size_t seed_len, int *out_counter, in DSA_generate_parameters_ex() argument
185 if (seed_len < (size_t)qsize) { in DSA_generate_parameters_ex()
188 if (seed_len > (size_t)qsize) { in DSA_generate_parameters_ex()
190 seed_len = qsize; in DSA_generate_parameters_ex()
192 OPENSSL_memcpy(seed, seed_in, seed_len); in DSA_generate_parameters_ex()
/external/wpa_supplicant_8/src/tls/
Dtlsv1_common.c322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
Dtlsv1_common.h261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
/external/libmtp/src/
Dmtpz.c254 …char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *o…
921 …char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *o… in mtpz_encryption_encrypt_mac() argument
963 if (seed_len == 16) in mtpz_encryption_encrypt_mac()
973 for (i = 0; i < seed_len; i++) in mtpz_encryption_encrypt_mac()
976 actual_seed[seed_len] = (unsigned char)128; in mtpz_encryption_encrypt_mac()
/external/boringssl/src/crypto/fipsmodule/rsa/
Dpadding.c271 size_t seed_len, const EVP_MD *md) { in PKCS1_MGF1() argument
285 !EVP_DigestUpdate(&ctx, seed, seed_len) || in PKCS1_MGF1()
/external/webrtc/webrtc/base/
Dhelpers.cc81 virtual bool Init(const void* seed, size_t seed_len) { in Init() argument
/external/openssh/
Dpkcs11.h993 unsigned long seed_len));