Home
last modified time | relevance | path

Searched refs:seed_len (Results 1 - 25 of 78) sorted by relevance

1234

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dfips_prf_internal.c17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
25 if (seed_len < sizeof(xkey)) in fips186_2_prf()
26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
28 seed_len = sizeof(xkey); in fips186_2_prf()
32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dfips_prf_wolfssl.c36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
44 if (seed_len < sizeof(xkey)) in fips186_2_prf()
45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
47 seed_len = sizeof(xkey); in fips186_2_prf()
51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dfips_prf_openssl.c48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
56 if (seed_len < sizeof(xkey)) in fips186_2_prf()
57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
59 seed_len = sizeof(xkey); in fips186_2_prf()
63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dsha1-tlsprf.c22 * @seed_len: Length of the seed
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5()
48 MD5_len[2] = seed_len; in tls_prf_sha1_md5()
55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
H A Dsha1.h21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
24 size_t seed_len, u8 *out, size_t outlen);
H A Dsha256-tlsprf.c21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256()
44 len[2] = seed_len; in tls_prf_sha256()
29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha256() argument
H A Dsha256.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
H A Dsha1-tprf.c21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf()
45 len[2] = seed_len; in sha1_t_prf()
29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) sha1_t_prf() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dfips_prf_internal.c17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
25 if (seed_len < sizeof(xkey)) in fips186_2_prf()
26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
28 seed_len = sizeof(xkey); in fips186_2_prf()
32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dfips_prf_wolfssl.c36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
44 if (seed_len < sizeof(xkey)) in fips186_2_prf()
45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
47 seed_len = sizeof(xkey); in fips186_2_prf()
51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dfips_prf_openssl.c48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
56 if (seed_len < sizeof(xkey)) in fips186_2_prf()
57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf()
59 seed_len = sizeof(xkey); in fips186_2_prf()
63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
H A Dsha1-tlsprf.c22 * @seed_len: Length of the seed
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5()
48 MD5_len[2] = seed_len; in tls_prf_sha1_md5()
55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
H A Dsha1.h21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
24 size_t seed_len, u8 *out, size_t outlen);
H A Dsha256-tlsprf.c21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256()
44 len[2] = seed_len; in tls_prf_sha256()
29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha256() argument
H A Dsha256.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
H A Dsha384-tlsprf.c21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384()
44 len[2] = seed_len; in tls_prf_sha384()
29 tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha384() argument
H A Dsha384.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
/third_party/node/deps/openssl/openssl/crypto/dsa/
H A Ddsa_gen.c48 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex()
53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex()
56 && !ossl_ffc_params_set_validate_params(&dsa->params, seed_in, seed_len, in DSA_generate_parameters_ex()
61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex()
47 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) DSA_generate_parameters_ex() argument
H A Ddsa_depr.c32 unsigned char *seed_in, int seed_len, in DSA_generate_parameters()
48 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters()
31 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback) (int, int, void *), void *cb_arg) DSA_generate_parameters() argument
/third_party/openssl/crypto/dsa/
H A Ddsa_gen.c48 const unsigned char *seed_in, int seed_len, in DSA_generate_parameters_ex()
53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex()
56 && !ossl_ffc_params_set_validate_params(&dsa->params, seed_in, seed_len, in DSA_generate_parameters_ex()
61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex()
47 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) DSA_generate_parameters_ex() argument
H A Ddsa_depr.c32 unsigned char *seed_in, int seed_len, in DSA_generate_parameters()
48 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters()
31 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback) (int, int, void *), void *cb_arg) DSA_generate_parameters() argument
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dtls1_prf.c76 const unsigned char *seed, size_t seed_len,
289 const unsigned char *seed, size_t seed_len, in tls1_prf_P_hash()
307 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash()
329 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash()
375 const unsigned char *seed, size_t seed_len, in tls1_prf_alg()
387 seed, seed_len, out, olen)) in tls1_prf_alg()
396 seed, seed_len, tmp, olen)) { in tls1_prf_alg()
407 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg()
287 tls1_prf_P_hash(EVP_MAC_CTX *ctx_init, const unsigned char *sec, size_t sec_len, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_P_hash() argument
373 tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx, const unsigned char *sec, size_t slen, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_alg() argument
/third_party/openssl/providers/implementations/kdfs/
H A Dtls1_prf.c76 const unsigned char *seed, size_t seed_len,
289 const unsigned char *seed, size_t seed_len, in tls1_prf_P_hash()
307 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash()
329 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash()
375 const unsigned char *seed, size_t seed_len, in tls1_prf_alg()
387 seed, seed_len, out, olen)) in tls1_prf_alg()
396 seed, seed_len, tmp, olen)) { in tls1_prf_alg()
407 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg()
287 tls1_prf_P_hash(EVP_MAC_CTX *ctx_init, const unsigned char *sec, size_t sec_len, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_P_hash() argument
373 tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx, const unsigned char *sec, size_t slen, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) tls1_prf_alg() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_gpsk_common.c111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper()
140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper()
153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper()
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper()
190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes()
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256()
252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256()
346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper()
371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper()
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument
343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) eap_gpsk_derive_mid_helper() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_gpsk_common.c111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper()
140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper()
153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper()
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper()
190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes()
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256()
252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256()
346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper()
371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper()
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument
343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) eap_gpsk_derive_mid_helper() argument
[all...]

Completed in 7 milliseconds

1234