/external/wpa_supplicant_8/src/crypto/ |
fips_prf_cryptoapi.c | 21 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
|
fips_prf_gnutls.c | 22 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
|
fips_prf_nss.c | 22 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
|
fips_prf_internal.c | 23 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 31 if (seed_len > sizeof(xkey)) 32 seed_len = sizeof(xkey); 36 os_memcpy(xkey, seed, seed_len); 37 os_memset(xkey + seed_len, 0, 64 - seed_len);
|
fips_prf_openssl.c | 32 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 40 if (seed_len > sizeof(xkey)) 41 seed_len = sizeof(xkey); 45 os_memcpy(xkey, seed, seed_len); 46 os_memset(xkey + seed_len, 0, 64 - seed_len);
|
sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const char *label, const u8 *seed, size_t seed_len,
|
sha1-tlsprf.c | 29 * @seed_len: Length of the seed 38 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 58 MD5_len[2] = seed_len; 65 SHA1_len[2] = seed_len;
|
sha1-tprf.c | 27 * @seed_len: Length of the seed 36 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 len[2] = seed_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.h | 19 const char *label, const u8 *seed, size_t seed_len,
|
eap_gpsk_common.c | 119 const u8 *seed, size_t seed_len, 148 data_len = 2 + psk_len + 6 + seed_len; 161 os_memcpy(pos, seed, seed_len); /* inputString */ 172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 198 const u8 *seed, size_t seed_len, 226 psk, psk_len, seed, seed_len, 234 const u8 *seed, size_t seed_len, 260 psk, psk_len, seed, seed_len, 296 size_t seed_len; local 308 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len [all...] |
eap_peap_common.c | 22 const char *label, const u8 *seed, size_t seed_len, 38 len[2] = seed_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 19 const char *label, const u8 *seed, size_t seed_len,
|
eap_gpsk_common.c | 116 const u8 *seed, size_t seed_len, 145 data_len = 2 + psk_len + 6 + seed_len; 158 os_memcpy(pos, seed, seed_len); /* inputString */ 169 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 195 const u8 *seed, size_t seed_len, 223 psk, psk_len, seed, seed_len, 231 const u8 *seed, size_t seed_len, 257 psk, psk_len, seed, seed_len, 293 size_t seed_len; local 305 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len [all...] |
eap_peap_common.c | 22 const char *label, const u8 *seed, size_t seed_len, 38 len[2] = seed_len;
|
/external/openssl/crypto/dsa/ |
dsa_locl.h | 58 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len,
|
dsa_depr.c | 87 unsigned char *seed_in, int seed_len, 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len,
|
dsa_gen.c | 85 const unsigned char *seed_in, int seed_len, 89 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 108 seed_in, seed_len, counter_ret, h_ret, cb); 113 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, 143 /* NB: seed_len == 0 is special case: copy generated seed to 146 if (seed_len && (seed_len < (size_t)qsize)) 148 if (seed_len > (size_t)qsize) 149 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED, 152 memcpy(seed, seed_in, seed_len); [all...] |
dsa.h | 134 const unsigned char *seed, int seed_len, 216 unsigned char *seed,int seed_len, 223 const unsigned char *seed,int seed_len,
|
/external/wpa_supplicant/ |
eap_gpsk_common.c | 118 const u8 *seed, size_t seed_len, 147 data_len = 2 + psk_len + 6 + seed_len; 160 os_memcpy(pos, seed, seed_len); /* inputString */ 171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 197 const u8 *seed, size_t seed_len, 225 psk, psk_len, seed, seed_len, 233 const u8 *seed, size_t seed_len, 259 psk, psk_len, seed, seed_len, 295 size_t seed_len; local 307 seed_len = 2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len [all...] |
sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
crypto.c | 103 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 111 if (seed_len > sizeof(xkey)) 112 seed_len = sizeof(xkey); 116 os_memcpy(xkey, seed, seed_len); 117 os_memset(xkey + seed_len, 0, 64 - seed_len);
|
sha1.c | 166 * @seed_len: Length of the seed 175 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 190 len[2] = seed_len; 221 * @seed_len: Length of the seed 230 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 250 MD5_len[2] = seed_len; 257 SHA1_len[2] = seed_len; 411 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 419 if (seed_len > sizeof(xkey)) 420 seed_len = sizeof(xkey) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.h | 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 29 const char *label, const u8 *seed, size_t seed_len,
|
crypto_openssl.c | 105 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 113 if (seed_len > sizeof(xkey)) 114 seed_len = sizeof(xkey); 118 os_memcpy(xkey, seed, seed_len); 119 os_memset(xkey + seed_len, 0, 64 - seed_len);
|
/external/openssl/include/openssl/ |
dsa.h | 134 const unsigned char *seed, int seed_len, 216 unsigned char *seed,int seed_len, 223 const unsigned char *seed,int seed_len,
|