| /hostap-latest/src/tls/ |
| D | pkcs1.c | 20 u8 *out, size_t *outlen) in pkcs1_generate_encryption_block() argument 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 39 (unsigned long) *outlen, in pkcs1_generate_encryption_block() 83 u8 *out, size_t *outlen) in pkcs1_encrypt() argument 90 out, outlen) < 0) in pkcs1_encrypt() 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt() 99 u8 *out, size_t *outlen) in pkcs1_v15_private_key_decrypt() argument 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); in pkcs1_v15_private_key_decrypt() 108 if (*outlen < 2 || out[0] != 0 || out[1] != 2) in pkcs1_v15_private_key_decrypt() 113 end = out + *outlen; in pkcs1_v15_private_key_decrypt() [all …]
|
| D | tlsv1_server_read.c | 602 size_t outlen, outbuflen; in tls_process_client_key_exchange_rsa() local 623 outbuflen = outlen = end - pos; in tls_process_client_key_exchange_rsa() 624 out = os_malloc(outlen >= TLS_PRE_MASTER_SECRET_LEN ? in tls_process_client_key_exchange_rsa() 625 outlen : TLS_PRE_MASTER_SECRET_LEN); in tls_process_client_key_exchange_rsa() 652 out, &outlen) < 0) { in tls_process_client_key_exchange_rsa() 655 encr_len, (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 659 if (!use_random && outlen != TLS_PRE_MASTER_SECRET_LEN) { in tls_process_client_key_exchange_rsa() 661 (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 673 outlen = TLS_PRE_MASTER_SECRET_LEN; in tls_process_client_key_exchange_rsa() 674 if (os_get_random(out, outlen)) { in tls_process_client_key_exchange_rsa() [all …]
|
| D | pkcs1.h | 17 u8 *out, size_t *outlen); 20 u8 *out, size_t *outlen);
|
| D | rsa.c | 256 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, in crypto_rsa_exptmod() argument 321 if (modlen > *outlen) { in crypto_rsa_exptmod() 322 *outlen = modlen; in crypto_rsa_exptmod() 329 *outlen = modlen; in crypto_rsa_exptmod()
|
| D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 327 out, outlen); in tls_prf() 333 outlen); in tls_prf()
|
| D | rsa.h | 22 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen,
|
| D | tlsv1_common.h | 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
|
| /hostap-latest/src/crypto/ |
| D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) in crypto_public_key_encrypt_pkcs1_v15() argument 77 0, in, inlen, out, outlen); in crypto_public_key_encrypt_pkcs1_v15() 83 u8 *out, size_t *outlen) in crypto_private_key_decrypt_pkcs1_v15() argument 86 in, inlen, out, outlen); in crypto_private_key_decrypt_pkcs1_v15() 92 u8 *out, size_t *outlen) in crypto_private_key_sign_pkcs1() argument 95 1, in, inlen, out, outlen); in crypto_private_key_sign_pkcs1()
|
| D | sha256-kdf.c | 34 u8 *out, size_t outlen) in hmac_sha256_kdf() argument 61 clen = outlen - pos; in hmac_sha256_kdf() 67 if (pos == outlen) in hmac_sha256_kdf() 71 os_memset(out, 0, outlen); in hmac_sha256_kdf() 79 os_memset(out, 0, outlen); in hmac_sha256_kdf()
|
| D | sha384-kdf.c | 34 u8 *out, size_t outlen) in hmac_sha384_kdf() argument 61 clen = outlen - pos; in hmac_sha384_kdf() 67 if (pos == outlen) in hmac_sha384_kdf() 71 os_memset(out, 0, outlen); in hmac_sha384_kdf() 79 os_memset(out, 0, outlen); in hmac_sha384_kdf()
|
| D | sha512-kdf.c | 34 u8 *out, size_t outlen) in hmac_sha512_kdf() argument 61 clen = outlen - pos; in hmac_sha512_kdf() 67 if (pos == outlen) in hmac_sha512_kdf() 71 os_memset(out, 0, outlen); in hmac_sha512_kdf() 79 os_memset(out, 0, outlen); in hmac_sha512_kdf()
|
| D | crypto_libtomcrypt.c | 492 u8 *out, size_t *outlen) in pkcs1_generate_encryption_block() argument 507 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 511 (unsigned long) *outlen, in pkcs1_generate_encryption_block() 555 u8 *out, size_t *outlen) in crypto_rsa_encrypt_pkcs1() argument 563 out, outlen) < 0) in crypto_rsa_encrypt_pkcs1() 566 len = *outlen; in crypto_rsa_encrypt_pkcs1() 573 *outlen = len; in crypto_rsa_encrypt_pkcs1() 581 u8 *out, size_t *outlen) in crypto_public_key_encrypt_pkcs1_v15() argument 584 out, outlen); in crypto_public_key_encrypt_pkcs1_v15() 590 u8 *out, size_t *outlen) in crypto_private_key_sign_pkcs1() argument [all …]
|
| D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 57 while (pos < outlen) { in tls_prf_sha256() 63 clen = outlen - pos; in tls_prf_sha256()
|
| D | sha384-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 57 while (pos < outlen) { in tls_prf_sha384() 63 clen = outlen - pos; in tls_prf_sha384()
|
| D | sha256.h | 25 u8 *out, size_t outlen); 28 u8 *out, size_t outlen);
|
| D | sha384.h | 25 u8 *out, size_t outlen); 28 u8 *out, size_t outlen);
|
| D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 76 for (i = 0; i < outlen; i++) { in tls_prf_sha1_md5()
|
| D | sha512.h | 25 u8 *out, size_t outlen);
|
| D | crypto.h | 353 u8 *out, size_t *outlen); 370 u8 *out, size_t *outlen); 387 u8 *out, size_t *outlen);
|
| D | sha1.h | 24 size_t seed_len, u8 *out, size_t outlen);
|
| D | crypto_openssl.c | 1804 size_t outlen, i; in omac1_aes_vector() local 1832 if (EVP_MAC_final(ctx, mac, &outlen, 16) != 1 || outlen != 16) in omac1_aes_vector() 1843 size_t outlen, i; in omac1_aes_vector() 1868 if (!CMAC_Final(ctx, mac, &outlen) || outlen != 16) in omac1_aes_vector() 4515 size_t outlen; in crypto_rsa_oaep_sha256_encrypt() local 4524 EVP_PKEY_encrypt(pkctx, NULL, &outlen, wpabuf_head(in), in crypto_rsa_oaep_sha256_encrypt() 4526 !(res = wpabuf_alloc(outlen)) || in crypto_rsa_oaep_sha256_encrypt() 4527 EVP_PKEY_encrypt(pkctx, wpabuf_put(res, 0), &outlen, in crypto_rsa_oaep_sha256_encrypt() 4533 wpabuf_put(res, outlen); in crypto_rsa_oaep_sha256_encrypt() 4552 size_t outlen; in crypto_rsa_oaep_sha256_decrypt() local [all …]
|
| D | tls_openssl.c | 89 size_t outlen) in SSL_get_client_random() argument 91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random() 99 size_t outlen) in SSL_get_server_random() argument 101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random() 110 unsigned char *out, size_t outlen) in SSL_SESSION_get_master_key() argument 113 (size_t) session->master_key_length > outlen) in SSL_SESSION_get_master_key() 115 if ((size_t) session->master_key_length < outlen) in SSL_SESSION_get_master_key() 116 outlen = session->master_key_length; in SSL_SESSION_get_master_key() 117 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key() 118 return outlen; in SSL_SESSION_get_master_key()
|
| D | tls_mbedtls_alt.c | 2618 …ret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 2620 …sl_tls_prf(MBEDTLS_SSL_TLS_PRF_TLS1, secret, secret_len, label, seed, seed_len, out, outlen) ? -1 : in tls_prf_sha1_md5() 2634 …ret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 2636 …s_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_SHA256, secret, secret_len, label, seed, seed_len, out, outlen) ? in tls_prf_sha256() 2650 …ret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 2652 …s_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_SHA384, secret, secret_len, label, seed, seed_len, out, outlen) ? in tls_prf_sha384()
|
| /hostap-latest/src/eap_common/ |
| D | eap_teap_common.c | 75 u8 *out, size_t outlen) in eap_teap_tls_prf() argument 80 out, outlen); in eap_teap_tls_prf() 82 out, outlen); in eap_teap_tls_prf()
|
| /hostap-latest/src/common/ |
| D | dpp_i.h | 93 const char *label, u8 *out, size_t outlen);
|