/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 24 len[1] = secret_len;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
sha256-kdf.c | 18 * @secret_len: Length of the key in bytes 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
sha384-kdf.c | 18 * @secret_len: Length of the key in bytes 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0)
|
sha512-kdf.c | 18 * @secret_len: Length of the key in bytes 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0)
|
sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
sha384.h | 23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
sha512.h | 23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
|
/system/keymaster/km_openssl/ |
kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, 40 if (!secret || secret_len == 0) 43 secret_key_len_ = secret_len; 44 secret_key_.reset(dup_buffer(secret, secret_len));
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
kdf.c | 68 const uint8_t *secret, size_t secret_len, 82 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || 138 const uint8_t *secret, size_t secret_len, 150 size_t secret_half = secret_len - (secret_len / 2); 156 // Note that, if |secret_len| is odd, the two halves share a byte. 157 secret += secret_len - secret_half; 158 secret_len = secret_half; 162 return tls1_P_hash(out, out_len, digest, secret, secret_len, label, label_len,
|
internal.h | 29 const uint8_t *secret, size_t secret_len,
|
/system/keymaster/include/keymaster/km_openssl/ |
hkdf.h | 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
|
iso18033kdf.h | 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { 38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */);
|
kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/external/ppp/pppd/ |
chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, (u_char *)secret, secret_len);
|
chap_ms.c | 194 unsigned char *secret, int secret_len, 216 ChapMS(challenge, (char *)secret, secret_len, md); 242 unsigned char *secret, int secret_len, 257 (char *)secret, secret_len, md, 319 unsigned char *challenge, char *secret, int secret_len, 324 ChapMS(challenge, secret, secret_len, response); 385 unsigned char *challenge, char *secret, int secret_len, 404 our_name, secret, secret_len, response, auth_response, 579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) 583 int mdlen = secret_len; [all...] |
chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
/external/wpa_supplicant_8/src/radius/ |
radius.h | 231 size_t secret_len); 233 size_t secret_len, const u8 *req_authenticator); 235 size_t secret_len, 238 size_t secret_len); 240 size_t secret_len, 243 size_t secret_len); 245 size_t secret_len, 254 size_t secret_len, struct radius_msg *sent_msg, 257 size_t secret_len, const u8 *req_auth); 263 const u8 *secret, size_t secret_len); [all...] |
radius.c | 366 size_t secret_len) 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 397 size_t secret_len, const u8 *req_authenticator) 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 425 len[3] = secret_len; 438 size_t secret_len, 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 463 len[1] = secret_len; 477 size_t secret_len) 487 len[1] = secret_len; [all...] |
/external/boringssl/src/include/openssl/ |
hkdf.h | 36 const uint8_t *secret, size_t secret_len, 46 size_t secret_len, const uint8_t *salt,
|
/external/syslinux/core/lwip/src/netif/ppp/ |
chpms.c | 134 int secret_len, 308 int secret_len, 321 for (i = 0; i < secret_len; i++) { 325 MDupdate(&md4Context, unicodePassword, secret_len * 2 * 8); /* Unicode is 2 bytes/char, *8 for bit count */ 347 int secret_len, 356 for (i = 0; i < secret_len; i++) { 366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) 374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); 379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response); 382 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response) [all...] |
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 27 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, 43 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) {
|