/third_party/mbedtls/library/ |
H A D | hkdf.c | 56 size_t hash_len; in mbedtls_hkdf_extract() local 62 hash_len = mbedtls_md_get_size(md); in mbedtls_hkdf_extract() 64 if (hash_len == 0) { in mbedtls_hkdf_extract() 69 salt_len = hash_len; in mbedtls_hkdf_extract() 79 size_t hash_len; in mbedtls_hkdf_expand() local 92 hash_len = mbedtls_md_get_size(md); in mbedtls_hkdf_expand() 94 if (prk_len < hash_len || hash_len == 0) { in mbedtls_hkdf_expand() 103 n = okm_len / hash_len; in mbedtls_hkdf_expand() 105 if (okm_len % hash_len ! in mbedtls_hkdf_expand() [all...] |
H A D | ssl_tls13_keys.c | 430 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_derive_early_secrets() local 455 early_secret, hash_len, in mbedtls_ssl_tls13_derive_early_secrets() 460 hash_len); in mbedtls_ssl_tls13_derive_early_secrets() 468 early_secret, hash_len, in mbedtls_ssl_tls13_derive_early_secrets() 473 hash_len); in mbedtls_ssl_tls13_derive_early_secrets() 488 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_derive_handshake_secrets() local 517 handshake_secret, hash_len, in mbedtls_ssl_tls13_derive_handshake_secrets() 522 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets() 534 handshake_secret, hash_len, in mbedtls_ssl_tls13_derive_handshake_secrets() 539 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets() 554 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); mbedtls_ssl_tls13_derive_application_secrets() local 630 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); mbedtls_ssl_tls13_derive_resumption_master_secret() local 708 size_t hash_len = PSA_HASH_LENGTH(hash_alg); ssl_tls13_calc_finished_core() local 792 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); mbedtls_ssl_tls13_calculate_verify_data() local 844 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); mbedtls_ssl_tls13_create_psk_binder() local 1140 size_t hash_len; ssl_tls13_generate_early_key() local 1341 size_t hash_len; ssl_tls13_generate_handshake_keys() local 1592 size_t hash_len; ssl_tls13_generate_application_keys() local [all...] |
H A D | pk_wrap.c | 66 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() 81 if (md_alg == MBEDTLS_MD_NONE && (int)UINT_MAX < (int)hash_len) { in rsa_verify_wrap() 113 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap() 131 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() 139 if (md_alg == MBEDTLS_MD_NONE && (int)UINT_MAX < (int)hash_len) { in rsa_verify_wrap() 149 (unsigned int) hash_len, in rsa_verify_wrap() 170 const unsigned char *hash, size_t hash_len, in mbedtls_pk_psa_rsa_sign_ext() 210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 231 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() 250 return mbedtls_pk_psa_rsa_sign_ext(psa_alg, pk->pk_ctx, hash, hash_len, in rsa_sign_wrap() 65 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 130 rsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) rsa_verify_wrap() argument 168 mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, mbedtls_rsa_context *rsa_ctx, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) mbedtls_pk_psa_rsa_sign_ext() argument 230 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 254 rsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_sign_wrap() argument 538 ecdsa_verify_psa(unsigned char *key, size_t key_len, psa_ecc_family_t curve, size_t curve_bits, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_psa() argument 602 ecdsa_opaque_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_opaque_verify_wrap() argument 633 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 646 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 671 ecdsa_verify_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) ecdsa_verify_wrap() argument 696 ecdsa_sign_psa(mbedtls_svc_key_id_t key_id, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len) ecdsa_sign_psa() argument 734 ecdsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_opaque_sign_wrap() argument 754 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 809 ecdsa_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) ecdsa_sign_wrap() argument 876 eckey_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) eckey_verify_rs_wrap() argument 902 eckey_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) eckey_sign_rs_wrap() argument 1187 ecdsa_verify_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, void *rs_ctx) ecdsa_verify_rs_wrap() argument 1207 ecdsa_sign_rs_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, void *rs_ctx) ecdsa_sign_rs_wrap() argument 1291 rsa_alt_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_alt_sign_wrap() argument 1503 rsa_opaque_sign_wrap(mbedtls_pk_context *pk, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) rsa_opaque_sign_wrap() argument [all...] |
H A D | pk_wrap.h | 37 const unsigned char *hash, size_t hash_len, 42 const unsigned char *hash, size_t hash_len, 50 const unsigned char *hash, size_t hash_len, 56 const unsigned char *hash, size_t hash_len, 131 const unsigned char *hash, size_t hash_len,
|
H A D | pk.c | 997 static inline int pk_hashlen_helper(mbedtls_md_type_t md_alg, size_t *hash_len) in pk_hashlen_helper() argument 999 if (*hash_len != 0) { in pk_hashlen_helper() 1003 *hash_len = mbedtls_md_get_size_from_type(md_alg); in pk_hashlen_helper() 1005 if (*hash_len == 0) { in pk_hashlen_helper() 1044 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() 1048 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_restartable() 1053 pk_hashlen_helper(md_alg, &hash_len) != 0) { in mbedtls_pk_verify_restartable() 1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1085 return ctx->pk_info->verify_func(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify_restartable() 1093 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() 1042 mbedtls_pk_verify_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_verify_restartable() argument 1092 mbedtls_pk_verify(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify() argument 1103 mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len) mbedtls_pk_verify_ext() argument 1233 mbedtls_pk_sign_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_pk_restart_ctx *rs_ctx) mbedtls_pk_sign_restartable() argument 1287 mbedtls_pk_sign(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign() argument 1300 mbedtls_pk_sign_ext(mbedtls_pk_type_t pk_type, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_sign_ext() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 103 if (curve->hash_len == 32) in dpp_hash_vector() 105 if (curve->hash_len == 48) in dpp_hash_vector() 107 if (curve->hash_len == 64) in dpp_hash_vector() 113 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument 116 if (hash_len == 32) in dpp_hkdf_expand() 120 if (hash_len == 48) in dpp_hkdf_expand() 124 if (hash_len == 64) in dpp_hkdf_expand() 132 int dpp_hmac_vector(size_t hash_len, const u8 *key, size_t key_len, in dpp_hmac_vector() argument 136 if (hash_len == 32) in dpp_hmac_vector() 139 if (hash_len in dpp_hmac_vector() 149 dpp_hmac(size_t hash_len, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) dpp_hmac() argument 164 dpp_pbkdf2_f(size_t hash_len, const u8 *password, size_t password_len, const u8 *salt, size_t salt_len, unsigned int iterations, unsigned int count, u8 *digest) dpp_pbkdf2_f() argument 206 dpp_pbkdf2(size_t hash_len, const u8 *password, size_t password_len, const u8 *salt, size_t salt_len, unsigned int iterations, u8 *buf, size_t buflen) dpp_pbkdf2() argument 368 dpp_derive_k1(const u8 *Mx, size_t Mx_len, u8 *k1, unsigned int hash_len) dpp_derive_k1() argument 395 dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len) dpp_derive_k2() argument 425 unsigned int hash_len = auth->curve->hash_len; dpp_derive_bk_ke() local 1118 dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len) dpp_derive_pmk() argument 1586 dpp_pkex_derive_z(const u8 *mac_init, const u8 *mac_resp, u8 ver_init, u8 ver_resp, const u8 *Mx, size_t Mx_len, const u8 *Nx, size_t Nx_len, const char *code, const u8 *Kx, size_t Kx_len, u8 *z, unsigned int hash_len) dpp_pkex_derive_z() argument 2058 unsigned int hash_len = auth->curve->hash_len; dpp_build_csr() local 2133 unsigned int hash_len = auth->curve->hash_len; dpp_validate_csr() local [all...] |
H A D | sae.c | 535 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument 539 if (hash_len == 32) in hkdf_extract() 543 if (hash_len == 48) in hkdf_extract() 548 if (hash_len == 64) in hkdf_extract() 556 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument 561 if (hash_len == 32) in hkdf_expand() 566 if (hash_len == 48) in hkdf_expand() 572 if (hash_len == 64) in hkdf_expand() 824 static int sae_pwd_seed(size_t hash_len, const u8 *ssid, size_t ssid_len, in sae_pwd_seed() argument 846 if (hkdf_extract(hash_len, ssi in sae_pwd_seed() 872 size_t pwd_value_len, hash_len, prime_len; sae_derive_pt_ecc() local 970 size_t hash_len, prime_len, pwd_value_len; sae_derive_pt_ffc() local 1147 size_t hash_len; sae_derive_pwe_from_pt_ecc() local 1211 size_t hash_len; sae_derive_pwe_from_pt_ffc() local 1498 sae_kdf_hash(size_t hash_len, const u8 *k, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) sae_kdf_hash() argument 1528 size_t hash_len, salt_len, prime_len = sae->tmp->prime_len; sae_derive_keys() local 2343 size_t hash_len; sae_write_confirm() local 2388 size_t hash_len; sae_check_confirm() local [all...] |
H A D | dpp_backup.c | 215 size_t hash_len) in dpp_build_pbkdf2_alg_id() 234 if (hash_len == 32) in dpp_build_pbkdf2_alg_id() 236 else if (hash_len == 48) in dpp_build_pbkdf2_alg_id() 238 else if (hash_len == 64) in dpp_build_pbkdf2_alg_id() 250 asn1_put_integer(params, hash_len); /* keyLength */ in dpp_build_pbkdf2_alg_id() 264 dpp_build_pw_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_pw_recipient_info() argument 279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info() 287 if (dpp_pbkdf2(hash_len, key, key_len, wpabuf_head(salt), 64, 1000, in dpp_build_pw_recipient_info() 288 kek, hash_len)) { in dpp_build_pw_recipient_info() 293 kek, hash_len); in dpp_build_pw_recipient_info() 214 dpp_build_pbkdf2_alg_id(const struct wpabuf *salt, size_t hash_len) dpp_build_pbkdf2_alg_id() argument 348 dpp_build_recipient_info(struct dpp_authentication *auth, size_t hash_len, const struct wpabuf *cont_enc_key) dpp_build_recipient_info() argument 370 dpp_build_enc_cont_info(struct dpp_authentication *auth, size_t hash_len, const struct wpabuf *cont_enc_key) dpp_build_enc_cont_info() argument 455 size_t hash_len; dpp_build_enveloped_data() local [all...] |
H A D | sae_pk.c | 529 int sae_hash(size_t hash_len, const u8 *data, size_t len, u8 *hash) in sae_hash() argument 531 if (hash_len == 32) in sae_hash() 534 if (hash_len == 48) in sae_hash() 538 if (hash_len == 64) in sae_hash() 545 static int sae_pk_hash_sig_data(struct sae_data *sae, size_t hash_len, in sae_pk_hash_sig_data() argument 587 if (sae_hash(hash_len, wpabuf_head(sig_data), wpabuf_len(sig_data), in sae_pk_hash_sig_data() 591 hash, hash_len); in sae_pk_hash_sig_data() 609 size_t hash_len; in sae_write_confirm_pk() local 643 hash_len = sae_group_2_hash_len(pk->group); in sae_write_confirm_pk() 644 if (sae_pk_hash_sig_data(sae, hash_len, tru in sae_write_confirm_pk() 709 size_t hash_len, hash_data_len; sae_pk_valid_fingerprint() local 780 size_t hash_len; sae_check_confirm_pk() local [all...] |
H A D | dpp_pkex.c | 552 Kx, Kx_len, pkex->z, curve->hash_len); in dpp_pkex_rx_exchange_req() 591 clear_len = 4 + 2 * curve->prime_len + 4 + curve->hash_len; in dpp_pkex_build_commit_reveal_req() 631 wpabuf_put_le16(clear, curve->hash_len); in dpp_pkex_build_commit_reveal_req() 632 wpabuf_put_data(clear, u, curve->hash_len - 1); in dpp_pkex_build_commit_reveal_req() 633 wpabuf_put_u8(clear, u[curve->hash_len - 1] ^ 0x01); in dpp_pkex_build_commit_reveal_req() 640 wpabuf_put_le16(clear, curve->hash_len); in dpp_pkex_build_commit_reveal_req() 641 wpabuf_put_data(clear, u, curve->hash_len); in dpp_pkex_build_commit_reveal_req() 664 if (aes_siv_encrypt(pkex->z, curve->hash_len, in dpp_pkex_build_commit_reveal_req() 851 if (dpp_hmac_vector(curve->hash_len, Jx, Jx_len, num_elem, addr, len, u) in dpp_pkex_rx_exchange_resp() 854 wpa_hexdump(MSG_DEBUG, "DPP: u", u, curve->hash_len); in dpp_pkex_rx_exchange_resp() [all...] |
H A D | dpp_i.h | 82 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, 84 int dpp_hmac_vector(size_t hash_len, const u8 *key, size_t key_len, 90 int dpp_pbkdf2(size_t hash_len, const u8 *password, size_t password_len, 101 int dpp_derive_k1(const u8 *Mx, size_t Mx_len, u8 *k1, unsigned int hash_len); 102 int dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len); 108 int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len); 126 u8 *z, unsigned int hash_len);
|
H A D | dpp_auth.c | 205 if (aes_siv_encrypt(auth->k1, auth->curve->hash_len, clear, siv_len, in dpp_auth_build_req() 391 if (aes_siv_encrypt(siv_key, auth->curve->hash_len, clear, siv_len, in dpp_auth_build_resp() 492 auth->curve->hash_len) < 0) in dpp_auth_build_resp_ok() 506 WPA_PUT_LE16(&r_auth[2], auth->curve->hash_len); in dpp_auth_build_resp_ok() 512 r_auth[4 + auth->curve->hash_len / 2] ^= 0x01; in dpp_auth_build_resp_ok() 515 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_resp_ok() 516 r_auth, 4 + auth->curve->hash_len, in dpp_auth_build_resp_ok() 519 wrapped_r_auth_len = 4 + auth->curve->hash_len + AES_BLOCK_SIZE; in dpp_auth_build_resp_ok() 791 auth->curve->hash_len) < 0) in dpp_auth_req_rx() 806 if (aes_siv_decrypt(auth->k1, auth->curve->hash_len, in dpp_auth_req_rx() [all...] |
/third_party/rust/crates/aho-corasick/src/packed/ |
H A D | rabinkarp.rs | 48 hash_len: usize, 71 let hash_len = patterns.minimum_len(); in new() 72 assert!(hash_len >= 1); in new() 75 for _ in 1..hash_len { in new() 81 hash_len, in new() 86 let hash = rk.hash(&pat.bytes()[..rk.hash_len]); in new() 108 if at + self.hash_len > haystack.len() { in find_at() 111 let mut hash = self.hash(&haystack[at..at + self.hash_len]); in find_at() 121 if at + self.hash_len >= haystack.len() { in find_at() 127 haystack[at + self.hash_len], in find_at() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | sae_pk_gen.c | 33 size_t hash_len; in main() local 81 hash_len = 32; in main() 84 hash_len = 48; in main() 87 hash_len = 64; in main() 110 if (sae_hash(hash_len, data, data_len, hash) < 0) { in main() 129 wpa_snprintf_hex(hash_hex, sizeof(hash_hex), hash, hash_len) < 0) in main() 149 for (j = 0; j < 8 * (int) hash_len / 20; j++) { in main() 152 sae_pk_buf_shift_left_19(hash + sec, hash_len - sec); in main() 166 pw_base_bin, hash_len - sec) >= 0) in main() 177 for (j = 4; j <= ((int) hash_len * in main() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 118 size_t hash_len; in ikev2_prf_plus() local 128 hash_len = prf->hash_len; in ikev2_prf_plus() 131 len[0] = hash_len; in ikev2_prf_plus() 150 clen = hash_len; in ikev2_prf_plus() 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, in ikev2_derive_auth_data() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 470 integ = end - integ_alg->hash_len; in ikev2_decrypt_payload() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 118 size_t hash_len; in ikev2_prf_plus() local 128 hash_len = prf->hash_len; in ikev2_prf_plus() 131 len[0] = hash_len; in ikev2_prf_plus() 150 clen = hash_len; in ikev2_prf_plus() 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, in ikev2_derive_auth_data() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 470 integ = end - integ_alg->hash_len; in ikev2_decrypt_payload() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 124 unsigned int hash_len; in tls_process_ocsp_single_response() local 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 183 if (hash_len == 0 || name_hash_len != hash_len || in tls_process_ocsp_single_response() 184 os_memcmp(name_hash, hash, hash_len) != 0) { in tls_process_ocsp_single_response() 187 hash, hash_len); in tls_process_ocsp_single_response() 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 207 if (hash_len == 0 || key_hash_len != hash_len || in tls_process_ocsp_single_response() 208 os_memcmp(key_hash, hash, hash_len) ! in tls_process_ocsp_single_response() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 124 unsigned int hash_len; in tls_process_ocsp_single_response() local 175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 177 if (hash_len == 0 || name_hash_len != hash_len || in tls_process_ocsp_single_response() 178 os_memcmp(name_hash, hash, hash_len) != 0) { in tls_process_ocsp_single_response() 181 hash, hash_len); in tls_process_ocsp_single_response() 197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 199 if (hash_len == 0 || key_hash_len != hash_len || in tls_process_ocsp_single_response() 200 os_memcmp(key_hash, hash, hash_len) ! in tls_process_ocsp_single_response() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.c | 395 if (curve->hash_len == 32) in dpp_hash_vector() 397 if (curve->hash_len == 48) in dpp_hash_vector() 399 if (curve->hash_len == 64) in dpp_hash_vector() 405 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument 408 if (hash_len == 32) in dpp_hkdf_expand() 412 if (hash_len == 48) in dpp_hkdf_expand() 416 if (hash_len == 64) in dpp_hkdf_expand() 424 static int dpp_hmac_vector(size_t hash_len, const u8 *key, size_t key_len, in dpp_hmac_vector() argument 428 if (hash_len == 32) in dpp_hmac_vector() 431 if (hash_len in dpp_hmac_vector() 441 dpp_hmac(size_t hash_len, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) dpp_hmac() argument 1519 dpp_derive_k1(const u8 *Mx, size_t Mx_len, u8 *k1, unsigned int hash_len) dpp_derive_k1() argument 1547 dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len) dpp_derive_k2() argument 1576 dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, unsigned int hash_len) dpp_derive_ke() argument 6376 dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len) dpp_derive_pmk() argument 7167 dpp_pkex_derive_z(const u8 *mac_init, const u8 *mac_resp, const u8 *Mx, size_t Mx_len, const u8 *Nx, size_t Nx_len, const char *code, const u8 *Kx, size_t Kx_len, u8 *z, unsigned int hash_len) dpp_pkex_derive_z() argument [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | pk.h | 727 * \param hash_len Hash length 744 const unsigned char *hash, size_t hash_len, 758 * \param hash_len Hash length or 0 (see notes) 769 const unsigned char *hash, size_t hash_len, 782 * \param hash_len Hash length or 0 (see notes) 793 * \note If hash_len is 0, then the length associated with md_alg 796 * \note md_alg may be MBEDTLS_MD_NONE, only if hash_len != 0 806 const unsigned char *hash, size_t hash_len, 816 * \param hash_len Hash length 838 * \note For RSA, md_alg may be MBEDTLS_MD_NONE if hash_len ! [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 703 size_t hash_len; in erp_send_finish_reauth() local 709 hash_len = 32; in erp_send_finish_reauth() 712 hash_len = 16; in erp_send_finish_reauth() 718 hash_len = 0; in erp_send_finish_reauth() 721 if (hash_len) in erp_send_finish_reauth() 722 plen += 1 + hash_len; in erp_send_finish_reauth() 741 wpabuf_put_data(msg, hash, hash_len); in erp_send_finish_reauth() 800 size_t hash_len; in SM_STATE() local 904 hash_len = 32; in SM_STATE() 912 hash_len in SM_STATE() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server.c | 710 size_t hash_len; in erp_send_finish_reauth() local 716 hash_len = 32; in erp_send_finish_reauth() 719 hash_len = 16; in erp_send_finish_reauth() 725 hash_len = 0; in erp_send_finish_reauth() 728 if (hash_len) in erp_send_finish_reauth() 729 plen += 1 + hash_len; in erp_send_finish_reauth() 749 wpabuf_put_data(msg, hash, hash_len); in erp_send_finish_reauth() 808 size_t hash_len; in SM_STATE() local 913 hash_len = 32; in SM_STATE() 921 hash_len in SM_STATE() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 205 unsigned char **hash, size_t *hash_len) in ct_public_key_hash() 217 if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) { in ct_public_key_hash() 236 *hash_len = SHA256_DIGEST_LENGTH; in ct_public_key_hash() 204 ct_public_key_hash(SCT_CTX *sctx, X509_PUBKEY *pkey, unsigned char **hash, size_t *hash_len) ct_public_key_hash() argument
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 205 unsigned char **hash, size_t *hash_len) in ct_public_key_hash() 217 if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) { in ct_public_key_hash() 236 *hash_len = SHA256_DIGEST_LENGTH; in ct_public_key_hash() 204 ct_public_key_hash(SCT_CTX *sctx, X509_PUBKEY *pkey, unsigned char **hash, size_t *hash_len) ct_public_key_hash() argument
|
/third_party/node/deps/openssl/openssl/crypto/ess/ |
H A D | ess_lib.c | 143 unsigned int hash_len = sizeof(hash); in ESS_CERT_ID_V2_new_init() local 164 if (!X509_digest(cert, hash_alg, hash, &hash_len)) in ESS_CERT_ID_V2_new_init() 167 if (!ASN1_OCTET_STRING_set(cid->hash, hash, hash_len)) in ESS_CERT_ID_V2_new_init()
|