/hostap-3.6.0/src/crypto/ |
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 25 if (seed_len < sizeof(xkey)) in fips186_2_prf() 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 28 seed_len = sizeof(xkey); in fips186_2_prf() 32 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 44 if (seed_len < sizeof(xkey)) in fips186_2_prf() 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 47 seed_len = sizeof(xkey); in fips186_2_prf() 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 56 if (seed_len < sizeof(xkey)) in fips186_2_prf() 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); in fips186_2_prf() 59 seed_len = sizeof(xkey); in fips186_2_prf() 63 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 48 MD5_len[2] = seed_len; in tls_prf_sha1_md5() 55 SHA1_len[2] = seed_len; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 44 len[2] = seed_len; in tls_prf_sha256()
|
D | sha384-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 44 len[2] = seed_len; in tls_prf_sha384()
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 45 len[2] = seed_len; in sha1_t_prf()
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha384.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha256-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument 52 len[2] = seed_len; in hmac_sha256_kdf()
|
D | sha384-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha384_kdf() argument 52 len[2] = seed_len; in hmac_sha384_kdf()
|
D | sha512-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha512_kdf() argument 52 len[2] = seed_len; in hmac_sha512_kdf()
|
D | sha512.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
D | crypto.h | 68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
|
/hostap-3.6.0/src/eap_common/ |
D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 346 size_t seed_len, u8 method_type) in eap_gpsk_derive_mid_helper() argument 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() [all …]
|
D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 32 len[2] = seed_len; in peap_prfplus()
|
D | eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
D | eap_teap_common.c | 74 const char *label, const u8 *seed, size_t seed_len, in eap_teap_tls_prf() argument 79 return tls_prf_sha384(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf() 81 return tls_prf_sha256(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf()
|
/hostap-3.6.0/src/tls/ |
D | tlsv1_server.c | 478 size_t seed_len = 2 * TLS_RANDOM_LEN; in tlsv1_server_prf() local 488 seed_len += 2 + context_len; in tlsv1_server_prf() 490 seed = os_malloc(seed_len); in tlsv1_server_prf() 513 label, seed, seed_len, out, out_len); in tlsv1_server_prf()
|
D | tlsv1_client.c | 554 size_t seed_len = 2 * TLS_RANDOM_LEN; in tlsv1_client_prf() local 564 seed_len += 2 + context_len; in tlsv1_client_prf() 566 seed = os_malloc(seed_len); in tlsv1_client_prf() 589 label, seed, seed_len, out, out_len); in tlsv1_client_prf()
|
D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
D | tlsv1_common.h | 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|