/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 30 uint8_t prk[EVP_MAX_MD_SIZE]; local 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { 60 const uint8_t *prk, size_t prk_len, const uint8_t *info, 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
|
hkdf_test.cc | 32 const uint8_t prk[EVP_MAX_MD_SIZE]; member in struct:HKDFTestVector 252 uint8_t prk[EVP_MAX_MD_SIZE]; local 254 ASSERT_TRUE(HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, 256 EXPECT_EQ(Bytes(test->prk, test->prk_len), Bytes(prk, prk_len)); 259 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1917 u8 prk[SHA256_MAC_LEN]; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 2161 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 4246 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local [all...] |
/external/wpa_supplicant_8/src/common/ |
dpp.c | 1228 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 1236 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) 1238 wpa_hexdump_key(MSG_DEBUG, "DPP: PRK = HKDF-Extract(<>, IKM=M.x)", 1239 prk, hash_len); 1241 /* HKDF-Expand(PRK, info, L) */ 1242 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); 1243 os_memset(prk, 0, hash_len); 1247 wpa_hexdump_key(MSG_DEBUG, "DPP: k1 = HKDF-Expand(PRK, info, L)", 1256 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 1264 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); 1288 u8 prk[DPP_MAX_HASH_LEN]; local 4553 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 5350 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local [all...] |