/external/boringssl/src/ssl/test/runner/ |
hkdf.go | 43 okm := make([]byte, length) 53 copy(okm[(int(counter)-1)*hashSize:], block) 56 return okm
|
hkdf_test.go | 27 ikm, salt, info, prk, okm []byte 96 okm := hkdfExpand(tt.hash.New, tt.prk, tt.info, len(tt.okm)) 97 if !bytes.Equal(okm, tt.okm) { 98 t.Errorf("%d. got hkdfExpand(%x, %x, %d) = %x; wanted %x", i+1, tt.prk, tt.info, len(tt.okm), okm, tt.okm)
|
/system/iot/attestation/atap/ops/ |
openssl_ops.h | 72 uint8_t* okm,
|
atap_ops_delegate.h | 100 uint8_t* okm,
|
atap_ops_provider.cpp | 152 uint8_t* okm, 155 salt, salt_len, ikm, ikm_len, info, info_len, okm, okm_len);
|
openssl_ops.cpp | 240 uint8_t* okm, 242 if (!HKDF(okm,
|
/system/iot/attestation/atap/libatap/ |
atap_ops.h | 160 * and outputs |okm_len| bytes to |okm|. 169 uint8_t* okm,
|
atap_util.h | 193 /* Derives the session key to |okm| using HKDF-SHA256 as the KDF. The input 205 uint8_t* okm,
|
atap_util.c | 336 uint8_t* okm, 350 okm,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1918 u8 okm[82]; local [all...] |