/external/wpa_supplicant_8/src/crypto/ |
fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 56 if (seed_len < sizeof(xkey)) 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 59 seed_len = sizeof(xkey); 63 os_memcpy(xkey, seed, seed_len);
|
sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len;
|
sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len;
|
sha256-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len;
|
sha384-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len;
|
sha512-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len;
|
sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 51 MD5_len[2] = seed_len; 58 SHA1_len[2] = seed_len;
|
sha384.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
sha512.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
crypto.h | 59 * @seed_len: Seed length in bytes 68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len;
|
eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, 140 data_len = 2 + psk_len + 6 + seed_len; 153 os_memcpy(pos, seed, seed_len); /* inputString */ 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 190 const u8 *seed, size_t seed_len, 218 psk, psk_len, seed, seed_len, 226 const u8 *seed, size_t seed_len, 252 psk, psk_len, seed, seed_len, 346 size_t seed_len, u8 method_type) 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; [all...] |
/external/boringssl/src/decrepit/dsa/ |
dsa_decrepit.c | 70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len, 73 if (bits < 0 || seed_len < 0) { 95 if (!DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, counter_ret,
|
/external/boringssl/src/crypto/dsa/ |
dsa.c | 198 size_t seed_len, int *out_counter, 226 if (seed_len < (size_t)qsize) { 229 if (seed_len > (size_t)qsize) { 231 seed_len = qsize; 233 OPENSSL_memcpy(seed, seed_in, seed_len);
|
/external/boringssl/src/ssl/ |
t1_enc.cc | 399 size_t seed_len = 2 * SSL3_RANDOM_SIZE; local 405 seed_len += 2 + context_len; 408 if (!seed.Init(seed_len)) {
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
tlsv1_common.h | 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
/external/webrtc/webrtc/base/ |
helpers.cc | 81 virtual bool Init(const void* seed, size_t seed_len) {
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
padding.c | 271 size_t seed_len, const EVP_MD *md) { 285 !EVP_DigestUpdate(&ctx, seed, seed_len) ||
|
/external/boringssl/src/include/openssl/ |
dsa.h | 141 size_t seed_len, int *out_counter, 386 int seed_len, int *counter_ret,
|
/external/libmtp/src/ |
mtpz.c | 254 void mtpz_encryption_encrypt_mac(unsigned char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *out); 921 void mtpz_encryption_encrypt_mac(unsigned char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *out) 963 if (seed_len == 16) 973 for (i = 0; i < seed_len; i++) 976 actual_seed[seed_len] = (unsigned char)128; [all...] |