HomeSort by relevance Sort by last modified time
    Searched full:seed_len (Results 1 - 25 of 25) sorted by null

  /external/wpa_supplicant_8/src/crypto/
fips_prf_internal.c 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
25 if (seed_len < sizeof(xkey))
26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len);
28 seed_len = sizeof(xkey);
32 os_memcpy(xkey, seed, seed_len);
fips_prf_openssl.c 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
56 if (seed_len < sizeof(xkey))
57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len);
59 seed_len = sizeof(xkey);
63 os_memcpy(xkey, seed, seed_len);
sha1.h 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
24 size_t seed_len, u8 *out, size_t outlen);
sha256.h 24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
sha1-tprf.c 21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len)
45 len[2] = seed_len;
sha256-tlsprf.c 21 * @seed_len: Length of the seed
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
44 len[2] = seed_len;
sha256-kdf.c 22 * @seed_len: Length of the seed
33 const char *label, const u8 *seed, size_t seed_len,
52 len[2] = seed_len;
sha384-kdf.c 22 * @seed_len: Length of the seed
33 const char *label, const u8 *seed, size_t seed_len,
52 len[2] = seed_len;
sha512-kdf.c 22 * @seed_len: Length of the seed
33 const char *label, const u8 *seed, size_t seed_len,
52 len[2] = seed_len;
sha1-tlsprf.c 22 * @seed_len: Length of the seed
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
51 MD5_len[2] = seed_len;
58 SHA1_len[2] = seed_len;
sha384.h 24 const char *label, const u8 *seed, size_t seed_len,
sha512.h 24 const char *label, const u8 *seed, size_t seed_len,
crypto.h 59 * @seed_len: Seed length in bytes
68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.h 13 const char *label, const u8 *seed, size_t seed_len,
eap_peap_common.c 16 const char *label, const u8 *seed, size_t seed_len,
32 len[2] = seed_len;
eap_gpsk_common.c 111 const u8 *seed, size_t seed_len,
140 data_len = 2 + psk_len + 6 + seed_len;
153 os_memcpy(pos, seed, seed_len); /* inputString */
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
190 const u8 *seed, size_t seed_len,
218 psk, psk_len, seed, seed_len,
226 const u8 *seed, size_t seed_len,
252 psk, psk_len, seed, seed_len,
346 size_t seed_len, u8 method_type)
371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len;
    [all...]
  /external/boringssl/src/decrepit/dsa/
dsa_decrepit.c 70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len,
73 if (bits < 0 || seed_len < 0) {
95 if (!DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, counter_ret,
  /external/boringssl/src/crypto/dsa/
dsa.c 198 size_t seed_len, int *out_counter,
226 if (seed_len < (size_t)qsize) {
229 if (seed_len > (size_t)qsize) {
231 seed_len = qsize;
233 OPENSSL_memcpy(seed, seed_in, seed_len);
  /external/boringssl/src/ssl/
t1_enc.cc 399 size_t seed_len = 2 * SSL3_RANDOM_SIZE; local
405 seed_len += 2 + context_len;
408 if (!seed.Init(seed_len)) {
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
tlsv1_common.h 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
  /external/webrtc/webrtc/base/
helpers.cc 81 virtual bool Init(const void* seed, size_t seed_len) {
  /external/boringssl/src/crypto/fipsmodule/rsa/
padding.c 271 size_t seed_len, const EVP_MD *md) {
285 !EVP_DigestUpdate(&ctx, seed, seed_len) ||
  /external/boringssl/src/include/openssl/
dsa.h 141 size_t seed_len, int *out_counter,
386 int seed_len, int *counter_ret,
  /external/libmtp/src/
mtpz.c 254 void mtpz_encryption_encrypt_mac(unsigned char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *out);
921 void mtpz_encryption_encrypt_mac(unsigned char *hash, unsigned int hash_length, unsigned char *seed, unsigned int seed_len, unsigned char *out)
963 if (seed_len == 16)
973 for (i = 0; i < seed_len; i++)
976 actual_seed[seed_len] = (unsigned char)128;
    [all...]

Completed in 6331 milliseconds