HomeSort by relevance Sort by last modified time
    Searched refs:secret_len (Results 1 - 25 of 45) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
24 len[1] = secret_len;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
sha1-tlsprf.c 19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label,
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
sha256-kdf.c 18 * @secret_len: Length of the key in bytes
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
sha384-kdf.c 18 * @secret_len: Length of the key in bytes
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0)
sha512-kdf.c 18 * @secret_len: Length of the key in bytes
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0)
sha256.h 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
sha1.h 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
sha384.h 23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
sha512.h 23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
  /system/keymaster/km_openssl/
kdf.cpp 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
40 if (!secret || secret_len == 0)
43 secret_key_len_ = secret_len;
44 secret_key_.reset(dup_buffer(secret, secret_len));
  /external/boringssl/src/crypto/fipsmodule/tls/
kdf.c 68 const uint8_t *secret, size_t secret_len,
82 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) ||
138 const uint8_t *secret, size_t secret_len,
150 size_t secret_half = secret_len - (secret_len / 2);
156 // Note that, if |secret_len| is odd, the two halves share a byte.
157 secret += secret_len - secret_half;
158 secret_len = secret_half;
162 return tls1_P_hash(out, out_len, digest, secret, secret_len, label, label_len,
internal.h 29 const uint8_t *secret, size_t secret_len,
  /system/keymaster/include/keymaster/km_openssl/
hkdf.h 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) {
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
iso18033kdf.h 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) {
38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */);
kdf.h 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
  /external/ppp/pppd/
chap-md5.c 58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, (u_char *)secret, secret_len);
chap_ms.c 194 unsigned char *secret, int secret_len,
216 ChapMS(challenge, (char *)secret, secret_len, md);
242 unsigned char *secret, int secret_len,
257 (char *)secret, secret_len, md,
319 unsigned char *challenge, char *secret, int secret_len,
324 ChapMS(challenge, secret, secret_len, response);
385 unsigned char *challenge, char *secret, int secret_len,
404 our_name, secret, secret_len, response, auth_response,
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE])
583 int mdlen = secret_len;
    [all...]
chap-new.h 102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
  /external/wpa_supplicant_8/src/radius/
radius.h 231 size_t secret_len);
233 size_t secret_len, const u8 *req_authenticator);
235 size_t secret_len,
238 size_t secret_len);
240 size_t secret_len,
243 size_t secret_len);
245 size_t secret_len,
254 size_t secret_len, struct radius_msg *sent_msg,
257 size_t secret_len, const u8 *req_auth);
263 const u8 *secret, size_t secret_len);
    [all...]
radius.c 366 size_t secret_len)
382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
397 size_t secret_len, const u8 *req_authenticator)
414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
425 len[3] = secret_len;
438 size_t secret_len,
456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
463 len[1] = secret_len;
477 size_t secret_len)
487 len[1] = secret_len;
    [all...]
  /external/boringssl/src/include/openssl/
hkdf.h 36 const uint8_t *secret, size_t secret_len,
46 size_t secret_len, const uint8_t *salt,
  /external/syslinux/core/lwip/src/netif/ppp/
chpms.c 134 int secret_len,
308 int secret_len,
321 for (i = 0; i < secret_len; i++) {
325 MDupdate(&md4Context, unicodePassword, secret_len * 2 * 8); /* Unicode is 2 bytes/char, *8 for bit count */
347 int secret_len,
356 for (i = 0; i < secret_len; i++) {
366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len)
374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret));
379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response);
382 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response)
    [all...]
  /external/boringssl/src/crypto/hkdf/
hkdf.c 27 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt,
43 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) {

Completed in 385 milliseconds

1 2