Home
last modified time | relevance | path

Searched refs:seed (Results 1 – 25 of 31) sorted by relevance

12

/hostap-latest/src/eap_common/
Deap_gpsk_common.c111 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_helper() argument
153 os_memcpy(pos, seed, seed_len); /* inputString */ in eap_gpsk_derive_keys_helper()
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) in eap_gpsk_derive_keys_helper()
190 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
226 const u8 *seed, size_t seed_len, in eap_gpsk_derive_keys_sha256() argument
252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256()
287 u8 *seed, *pos; in eap_gpsk_derive_keys() local
299 seed = os_malloc(2 * EAP_GPSK_RAND_LEN + id_server_len + id_peer_len); in eap_gpsk_derive_keys()
300 if (seed == NULL) { in eap_gpsk_derive_keys()
[all …]
Deap_fast_common.c73 u8 seed[2 * TLS_RANDOM_LEN]; in eap_fast_derive_master_secret() local
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); in eap_fast_derive_master_secret()
89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN); in eap_fast_derive_master_secret()
Deap_peap_common.c16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument
31 addr[2] = seed; in peap_prfplus()
Deap_peap_common.h13 const char *label, const u8 *seed, size_t seed_len,
Deap_teap_common.c74 const char *label, const u8 *seed, size_t seed_len, in eap_teap_tls_prf() argument
79 return tls_prf_sha384(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf()
81 return tls_prf_sha256(secret, secret_len, label, seed, seed_len, in eap_teap_tls_prf()
/hostap-latest/src/tls/
Dtlsv1_server.c60 u8 seed[2 * TLS_RANDOM_LEN]; in tlsv1_server_derive_keys() local
68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_derive_keys()
73 "master secret", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys()
83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys()
89 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tlsv1_server_derive_keys()
477 u8 *seed, *pos; in tlsv1_server_prf() local
490 seed = os_malloc(seed_len); in tlsv1_server_prf()
491 if (!seed) in tlsv1_server_prf()
[all …]
Dtlsv1_client.c78 u8 seed[2 * TLS_RANDOM_LEN]; in tls_derive_keys() local
86 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
87 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tls_derive_keys()
91 "master secret", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys()
101 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); in tls_derive_keys()
102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); in tls_derive_keys()
108 "key expansion", seed, 2 * TLS_RANDOM_LEN, in tls_derive_keys()
553 u8 *seed, *pos; in tlsv1_client_prf() local
566 seed = os_malloc(seed_len); in tlsv1_client_prf()
567 if (!seed) in tlsv1_client_prf()
[all …]
Dtlsv1_common.c322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
/hostap-latest/src/crypto/
Dsha1-tlsprf.c31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() argument
47 MD5_addr[2] = seed; in tls_prf_sha1_md5()
54 SHA1_addr[2] = seed; in tls_prf_sha1_md5()
Dsha256-tlsprf.c30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha256() argument
43 addr[2] = seed; in tls_prf_sha256()
Dsha384-tlsprf.c30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha384() argument
43 addr[2] = seed; in tls_prf_sha384()
Dsha1-tprf.c30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) in sha1_t_prf() argument
44 addr[2] = seed; in sha1_t_prf()
Dsha1.h21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
23 const char *label, const u8 *seed,
Dsha256.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
Dsha384.h24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
Dfips_prf_internal.c17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
33 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
Dsha256-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument
51 addr[2] = seed; in hmac_sha256_kdf()
Dsha384-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha384_kdf() argument
51 addr[2] = seed; in hmac_sha384_kdf()
Dsha512-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha512_kdf() argument
51 addr[2] = seed; in hmac_sha512_kdf()
Dfips_prf_wolfssl.c36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
51 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
Dfips_prf_openssl.c61 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) in fips186_2_prf() argument
76 os_memcpy(xkey, seed, seed_len); in fips186_2_prf()
Dtls_mbedtls_alt.c2153 unsigned char seed[MBEDTLS_EXPKEY_RAND_LEN * 2]; in tls_connection_get_eap_fast_key() local
2154 os_memcpy(seed, conn->expkey_randbytes + MBEDTLS_EXPKEY_RAND_LEN, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_get_eap_fast_key()
2155 os_memcpy(seed + MBEDTLS_EXPKEY_RAND_LEN, conn->expkey_randbytes, MBEDTLS_EXPKEY_RAND_LEN); in tls_connection_get_eap_fast_key()
2159 seed, sizeof(seed), tmp_out, skip + out_len); in tls_connection_get_eap_fast_key()
2167 forced_memzero(seed, sizeof(seed)); in tls_connection_get_eap_fast_key()
2618 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha1_md5() argument
2620 …return mbedtls_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_TLS1, secret, secret_len, label, seed, seed_len, ou… in tls_prf_sha1_md5()
2634 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha256() argument
2636 …return mbedtls_ssl_tls_prf(MBEDTLS_SSL_TLS_PRF_SHA256, secret, secret_len, label, seed, seed_len, … in tls_prf_sha256()
2650 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in tls_prf_sha384() argument
[all …]
Dsha512.h24 const char *label, const u8 *seed, size_t seed_len,
Dtls_wolfssl.c2072 byte seed[SEED_LEN]; in tls_connection_get_eap_fast_key() local
2099 os_memcpy(seed, server_random, RAN_LEN); in tls_connection_get_eap_fast_key()
2100 os_memcpy(seed + RAN_LEN, client_random, RAN_LEN); in tls_connection_get_eap_fast_key()
2104 "key expansion", seed, sizeof(seed), in tls_connection_get_eap_fast_key()
2114 "key expansion", seed, sizeof(seed), in tls_connection_get_eap_fast_key()
/hostap-latest/src/utils/
Dos_unix.c340 unsigned int seed; in os_program_init() local
370 if (os_get_random((unsigned char *) &seed, sizeof(seed)) == 0) in os_program_init()
371 srandom(seed); in os_program_init()

12