/external/wpa_supplicant_8/src/crypto/ |
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 51 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 58 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 44 len[2] = seed_len; in tls_prf_sha256()
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 45 len[2] = seed_len; in sha1_t_prf()
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha256-kdf.c | 30 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument 44 len[2] = seed_len; in hmac_sha256_kdf()
|
D | crypto.h | 68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() argument 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() [all …]
|
D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 32 len[2] = seed_len; in peap_prfplus()
|
D | eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
/external/boringssl/src/decrepit/dsa/ |
D | dsa_decrepit.c | 70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len, in DSA_generate_parameters() argument 73 if (bits < 0 || seed_len < 0) { in DSA_generate_parameters() 95 if (!DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, counter_ret, in DSA_generate_parameters()
|
/external/boringssl/src/ssl/ |
D | t1_enc.cc | 528 size_t seed_len = 2 * SSL3_RANDOM_SIZE; in SSL_export_keying_material() local 534 seed_len += 2 + context_len; in SSL_export_keying_material() 536 uint8_t *seed = (uint8_t *)OPENSSL_malloc(seed_len); in SSL_export_keying_material() 559 seed, seed_len, NULL, 0); in SSL_export_keying_material()
|
/external/boringssl/src/include/openssl/ |
D | dsa.h | 126 size_t seed_len, int *out_counter, 384 int seed_len, int *counter_ret,
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 157 size_t seed_len, int *out_counter, in DSA_generate_parameters_ex() argument 185 if (seed_len < (size_t)qsize) { in DSA_generate_parameters_ex() 188 if (seed_len > (size_t)qsize) { in DSA_generate_parameters_ex() 190 seed_len = qsize; in DSA_generate_parameters_ex() 192 OPENSSL_memcpy(seed, seed_in, seed_len); in DSA_generate_parameters_ex()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
D | tlsv1_common.h | 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
/external/libmtp/src/ |
D | mtpz.c | 254 …char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *o… 921 …char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *o… in mtpz_encryption_encrypt_mac() argument 963 if (seed_len == 16) in mtpz_encryption_encrypt_mac() 973 for (i = 0; i < seed_len; i++) in mtpz_encryption_encrypt_mac() 976 actual_seed[seed_len] = (unsigned char)128; in mtpz_encryption_encrypt_mac()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | padding.c | 271 size_t seed_len, const EVP_MD *md) { in PKCS1_MGF1() argument 285 !EVP_DigestUpdate(&ctx, seed, seed_len) || in PKCS1_MGF1()
|
/external/webrtc/webrtc/base/ |
D | helpers.cc | 81 virtual bool Init(const void* seed, size_t seed_len) { in Init() argument
|
/external/openssh/ |
D | pkcs11.h | 993 unsigned long seed_len));
|