/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() 48 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5() 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
|
H A D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() 44 len[2] = seed_len; in tls_prf_sha256() 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha256() argument
|
H A D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() 45 len[2] = seed_len; in sha1_t_prf() 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) sha1_t_prf() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() 48 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5() 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
|
H A D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() 44 len[2] = seed_len; in tls_prf_sha256() 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha256() argument
|
H A D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
H A D | sha384-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() 44 len[2] = seed_len; in tls_prf_sha384() 29 tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha384() argument
|
H A D | sha384.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
H A D | dsa_gen.c | 48 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex() 53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 56 && !ossl_ffc_params_set_validate_params(&dsa->params, seed_in, seed_len, in DSA_generate_parameters_ex() 61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex() 47 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) DSA_generate_parameters_ex() argument
|
H A D | dsa_depr.c | 32 unsigned char *seed_in, int seed_len, in DSA_generate_parameters() 48 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters() 31 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback) (int, int, void *), void *cb_arg) DSA_generate_parameters() argument
|
/third_party/openssl/crypto/dsa/ |
H A D | dsa_gen.c | 48 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex() 53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 56 && !ossl_ffc_params_set_validate_params(&dsa->params, seed_in, seed_len, in DSA_generate_parameters_ex() 61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex() 47 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) DSA_generate_parameters_ex() argument
|
H A D | dsa_depr.c | 32 unsigned char *seed_in, int seed_len, in DSA_generate_parameters() 48 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters() 31 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback) (int, int, void *), void *cb_arg) DSA_generate_parameters() argument
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 76 const unsigned char *seed, size_t seed_len, 289 const unsigned char *seed, size_t seed_len, in tls1_prf_P_hash() 307 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash() 329 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash() 375 const unsigned char *seed, size_t seed_len, in tls1_prf_alg() 387 seed, seed_len, out, olen)) in tls1_prf_alg() 396 seed, seed_len, tmp, olen)) { in tls1_prf_alg() 407 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg() 287 tls1_prf_P_hash(EVP_MAC_CTX *ctx_init, const unsigned char *sec, size_t sec_len, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_P_hash() argument 373 tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx, const unsigned char *sec, size_t slen, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_alg() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 76 const unsigned char *seed, size_t seed_len, 289 const unsigned char *seed, size_t seed_len, in tls1_prf_P_hash() 307 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash() 329 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash() 375 const unsigned char *seed, size_t seed_len, in tls1_prf_alg() 387 seed, seed_len, out, olen)) in tls1_prf_alg() 396 seed, seed_len, tmp, olen)) { in tls1_prf_alg() 407 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg() 287 tls1_prf_P_hash(EVP_MAC_CTX *ctx_init, const unsigned char *sec, size_t sec_len, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_P_hash() argument 373 tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx, const unsigned char *sec, size_t slen, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_alg() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) eap_gpsk_derive_mid_helper() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) eap_gpsk_derive_mid_helper() argument [all...] |