HomeSort by relevance Sort by last modified time
    Searched refs:secret_len (Results 1 - 25 of 33) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
24 len[1] = secret_len;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
sha1-tlsprf.c 19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label,
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
sha256-kdf.c 18 * @secret_len: Length of the key in bytes
29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
sha256.h 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
sha1.h 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
  /system/keymaster/
kdf.cpp 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
40 if (!secret || secret_len == 0)
43 secret_key_len_ = secret_len;
44 secret_key_.reset(dup_buffer(secret, secret_len));
hkdf.h 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) {
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
iso18033kdf.h 38 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) {
39 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */);
kdf.h 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
  /external/boringssl/src/include/openssl/
hkdf.h 33 const uint8_t *secret, size_t secret_len,
  /external/ppp/pppd/
chap-md5.c 58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, (u_char *)secret, secret_len);
chap_ms.c 194 unsigned char *secret, int secret_len,
216 ChapMS(challenge, (char *)secret, secret_len, md);
242 unsigned char *secret, int secret_len,
257 (char *)secret, secret_len, md,
319 unsigned char *challenge, char *secret, int secret_len,
324 ChapMS(challenge, secret, secret_len, response);
385 unsigned char *challenge, char *secret, int secret_len,
404 our_name, secret, secret_len, response, auth_response,
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE])
583 int mdlen = secret_len;
    [all...]
chap-new.h 102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
chap-new.c 419 int secret_len; local
422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
427 ok = digest->verify_response(id, name, secret, secret_len, challenge,
442 int secret_len; local
463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) {
464 secret_len = 0; /* assume null secret if can't find one */
473 secret, secret_len, cs->priv);
474 memset(secret, 0, secret_len);
  /external/wpa_supplicant_8/src/radius/
radius.h 231 size_t secret_len);
233 size_t secret_len, const u8 *req_authenticator);
235 size_t secret_len,
238 size_t secret_len);
240 size_t secret_len,
243 size_t secret_len);
245 size_t secret_len);
253 size_t secret_len, struct radius_msg *sent_msg,
256 size_t secret_len, const u8 *req_auth);
262 const u8 *secret, size_t secret_len);
    [all...]
radius.c 366 size_t secret_len)
382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
397 size_t secret_len, const u8 *req_authenticator)
414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
425 len[3] = secret_len;
438 size_t secret_len,
456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
463 len[1] = secret_len;
477 size_t secret_len)
487 len[1] = secret_len;
    [all...]
  /external/boringssl/src/ssl/
ssl_ecdh.c 138 size_t secret_len = (EC_GROUP_get_degree(group) + 7) / 8; local
139 secret = OPENSSL_malloc(secret_len);
140 if (secret == NULL || !BN_bn2bin_padded(secret, secret_len, x)) {
145 *out_secret_len = secret_len;
236 int secret_len = 0; local
247 secret_len = DH_compute_key(secret, peer_point, dh);
248 if (secret_len <= 0) {
253 *out_secret_len = (size_t)secret_len;
258 if (secret_len > 0) {
259 OPENSSL_cleanse(secret, (size_t)secret_len);
    [all...]
t1_enc.c 158 const uint8_t *secret, size_t secret_len,
172 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) ||
228 size_t secret_len, const char *label, size_t label_len,
242 size_t secret_half = secret_len - (secret_len / 2);
249 /* Note that, if |secret_len| is odd, the two halves share a byte. */
250 secret = secret + (secret_len - secret_half);
251 secret_len = secret_half;
255 secret, secret_len, (const uint8_t *)label, label_len,
s3_enc.c 169 size_t secret_len, const char *label, size_t label_len,
198 EVP_DigestUpdate(&sha1, secret, secret_len);
212 EVP_DigestUpdate(&md5, secret, secret_len);
  /external/boringssl/src/crypto/hkdf/
hkdf.c 26 const uint8_t *secret, size_t secret_len,
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 50 size_t IDr_len, size_t *secret_len);
  /external/dhcpcd-6.8.2/
dhcpcd.h 42 #define SECRET_LEN 64
137 unsigned char secret[SECRET_LEN];
138 size_t secret_len; member in struct:dhcpcd_ctx
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,

Completed in 3942 milliseconds

1 2