/hostap-latest/src/eap_common/ |
D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument 153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper() 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper() 190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() 287 u8 *seed, *pos; in eap_gpsk_derive_keys() local 299 seed = os_malloc(2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len); in eap_gpsk_derive_keys() 300 if (seed == NULL) { in eap_gpsk_derive_keys() [all …]
|
D | eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; in eap_fast_derive_master_secret() local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret() 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
|
D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 31 addr[2] = seed; in peap_prfplus()
|
D | eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
D | eap_teap_common.c | 74 const char *label, const u8 *seed, size_t seed_len, in eap_teap_tls_prf() argument 79 return tls_prf_sha384(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf() 81 return tls_prf_sha256(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf()
|
/hostap-latest/src/tls/ |
D | tlsv1_server.c | 60 u8 seed[2 * TLS_RANDOM_LEN]; in tlsv1_server_derive_keys() local 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_derive_keys() 73 "master secret", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys() 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 89 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys() 477 u8 *seed, *pos; in tlsv1_server_prf() local 490 seed = os_malloc(seed_len); in tlsv1_server_prf() 491 if (!seed) in tlsv1_server_prf() [all …]
|
D | tlsv1_client.c | 78 u8 seed[2 * TLS_RANDOM_LEN]; in tls_derive_keys() local 86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 87 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tls_derive_keys() 91 "master secret", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys() 101 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tls_derive_keys() 102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys() 108 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys() 553 u8 *seed, *pos; in tlsv1_client_prf() local 566 seed = os_malloc(seed_len); in tlsv1_client_prf() 567 if (!seed) in tlsv1_client_prf() [all …]
|
D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
/hostap-latest/src/crypto/ |
D | sha1-tlsprf.c | 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument 47 MD5_addr[2] = seed; in tls_prf_sha1_md5() 54 SHA1_addr[2] = seed; in tls_prf_sha1_md5()
|
D | sha256-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument 43 addr[2] = seed; in tls_prf_sha256()
|
D | sha384-tlsprf.c | 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument 43 addr[2] = seed; in tls_prf_sha384()
|
D | sha1-tprf.c | 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument 44 addr[2] = seed; in sha1_t_prf()
|
D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 23 const char *label, const u8 *seed,
|
D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha384.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 33 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | sha256-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument 51 addr[2] = seed; in hmac_sha256_kdf()
|
D | sha384-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha384_kdf() argument 51 addr[2] = seed; in hmac_sha384_kdf()
|
D | sha512-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha512_kdf() argument 51 addr[2] = seed; in hmac_sha512_kdf()
|
D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | fips_prf_openssl.c | 61 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument 76 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
|
D | tls_mbedtls_alt.c | 2153 unsigned char seed[MBEDTLS_EXPKEY_RAND_LEN * 2]; in tls_connection_get_eap_fast_key() local 2154 os_memcpy(seed, conn->expkey_randbytes + MBEDTLS_EXPKEY_RAND_LEN, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_get_eap_fast_key() 2155 os_memcpy(seed + MBEDTLS_EXPKEY_RAND_LEN, conn->expkey_randbytes, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_get_eap_fast_key() 2159 seed, sizeof(seed), tmp_out, skip + out_len); in tls_connection_get_eap_fast_key() 2167 forced_memzero(seed, sizeof(seed)); in tls_connection_get_eap_fast_key() 2618 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha1_md5() argument 2620 …return mbedtls_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_TLS1, secret, secret_len, label, seed, seed_len, ou… in tls_prf_sha1_md5() 2634 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha256() argument 2636 …return mbedtls_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_SHA256, secret, secret_len, label, seed, seed_len, … in tls_prf_sha256() 2650 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha384() argument [all …]
|
D | sha512.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
D | tls_wolfssl.c | 2072 byte seed[SEED_LEN]; in tls_connection_get_eap_fast_key() local 2099 os_memcpy(seed, server_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2100 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key() 2104 "key expansion", seed, sizeof(seed), in tls_connection_get_eap_fast_key() 2114 "key expansion", seed, sizeof(seed), in tls_connection_get_eap_fast_key()
|
/hostap-latest/src/utils/ |
D | os_unix.c | 340 unsigned int seed; in os_program_init() local 370 if (os_get_random((unsigned char *) &seed, sizeof(seed)) == 0) in os_program_init() 371 srandom(seed); in os_program_init()
|