/external/wpa_supplicant_8/src/crypto/ |
fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
fips_prf_openssl.c | 26 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 34 if (seed_len < sizeof(xkey)) 35 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 37 seed_len = sizeof(xkey); 41 os_memcpy(xkey, seed, seed_len);
|
sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len;
|
sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len;
|
sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len;
|
sha256.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len;
|
eap_gpsk_common.c | 110 const u8 *seed, size_t seed_len, 139 data_len = 2 + psk_len + 6 + seed_len; 152 os_memcpy(pos, seed, seed_len); /* inputString */ 163 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 189 const u8 *seed, size_t seed_len, 217 psk, psk_len, seed, seed_len, 225 const u8 *seed, size_t seed_len, 251 psk, psk_len, seed, seed_len, 345 size_t seed_len, u8 method_type) 370 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_gen.c | 89 const unsigned char *seed_in, int seed_len, 101 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 107 seed_in, seed_len, 128 seed_in, seed_len, NULL, counter_ret, h_ret, cb); 133 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, 164 /* NB: seed_len == 0 is special case: copy generated seed to 167 if (seed_len && (seed_len < (size_t)qsize)) 169 if (seed_len > (size_t)qsize) 170 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED [all...] |
dsa_depr.c | 87 unsigned char *seed_in, int seed_len, 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len,
|
dsa.h | 149 const unsigned char *seed, int seed_len, 231 unsigned char *seed,int seed_len, 238 const unsigned char *seed,int seed_len,
|
dsa_locl.h | 58 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len,
|
/external/openssl/crypto/dsa/ |
dsa_gen.c | 89 const unsigned char *seed_in, int seed_len, 101 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 107 seed_in, seed_len, 128 seed_in, seed_len, NULL, counter_ret, h_ret, cb); 133 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, 164 /* NB: seed_len == 0 is special case: copy generated seed to 167 if (seed_len && (seed_len < (size_t)qsize)) 169 if (seed_len > (size_t)qsize) 170 seed_len = qsize; /* App. 2.2 of FIPS PUB 186 allows larger SEED [all...] |
dsa_depr.c | 87 unsigned char *seed_in, int seed_len, 99 if(DSA_generate_parameters_ex(ret, bits, seed_in, seed_len,
|
dsa.h | 154 const unsigned char *seed, int seed_len, 236 unsigned char *seed,int seed_len, 243 const unsigned char *seed,int seed_len,
|
dsa_locl.h | 58 const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len,
|
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
ec_lib.c | 111 ret->seed_len = 0; 162 OPENSSL_cleanse(group->seed, group->seed_len); 230 dest->seed = OPENSSL_malloc(src->seed_len); 233 if (!memcpy(dest->seed, src->seed, src->seed_len)) 235 dest->seed_len = src->seed_len; 242 dest->seed_len = 0; 380 group->seed_len = 0; 389 group->seed_len = len; 403 return group->seed_len; [all...] |
eck_prn.c | 157 size_t seed_len=0; local 263 seed_len = EC_GROUP_get_seed_len(x); 330 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off))
|
/external/openssl/crypto/ec/ |
ec_lib.c | 111 ret->seed_len = 0; 162 OPENSSL_cleanse(group->seed, group->seed_len); 230 dest->seed = OPENSSL_malloc(src->seed_len); 233 if (!memcpy(dest->seed, src->seed, src->seed_len)) 235 dest->seed_len = src->seed_len; 242 dest->seed_len = 0; 380 group->seed_len = 0; 389 group->seed_len = len; 403 return group->seed_len; [all...] |
eck_prn.c | 157 size_t seed_len=0; local 263 seed_len = EC_GROUP_get_seed_len(x); 330 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off))
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
dsa.h | 149 const unsigned char *seed, int seed_len, 231 unsigned char *seed,int seed_len, 238 const unsigned char *seed,int seed_len,
|
/external/openssl/include/openssl/ |
dsa.h | 154 const unsigned char *seed, int seed_len, 236 unsigned char *seed,int seed_len, 243 const unsigned char *seed,int seed_len,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|