/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_peap_common.h | 13 const char *label, const u8 *seed, size_t seed_len,
|
H A D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, 32 len[2] = seed_len; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, 140 data_len = 2 + psk_len + 6 + seed_len; 153 os_memcpy(pos, seed, seed_len); /* inputString */ 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 190 const u8 *seed, size_t seed_len, 218 psk, psk_len, seed, seed_len, 226 const u8 *seed, size_t seed_len, 252 psk, psk_len, seed, seed_len, 346 size_t seed_len, u8 method_type) 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | fips_prf_internal.c | 17 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 25 if (seed_len < sizeof(xkey)) 26 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 28 seed_len = sizeof(xkey); 32 os_memcpy(xkey, seed, seed_len);
|
H A D | fips_prf_wolfssl.c | 36 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 44 if (seed_len < sizeof(xkey)) 45 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 47 seed_len = sizeof(xkey); 51 os_memcpy(xkey, seed, seed_len);
|
H A D | fips_prf_openssl.c | 48 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) argument 56 if (seed_len < sizeof(xkey)) 57 os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 59 seed_len = sizeof(xkey); 63 os_memcpy(xkey, seed, seed_len);
|
H A D | sha1.h | 21 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 24 size_t seed_len, u8 *out, size_t outlen);
|
H A D | sha256-tlsprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 44 len[2] = seed_len; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha1-tlsprf.c | 22 * @seed_len: Length of the seed 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 48 MD5_len[2] = seed_len; 55 SHA1_len[2] = seed_len; 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha1-tprf.c | 21 * @seed_len: Length of the seed 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 45 len[2] = seed_len; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len; 32 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha512-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len; 32 hmac_sha512_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256.h | 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
H A D | sha384-kdf.c | 22 * @seed_len: Length of the seed 33 const char *label, const u8 *seed, size_t seed_len, 52 len[2] = seed_len; 32 hmac_sha384_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha512.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
H A D | sha384.h | 24 const char *label, const u8 *seed, size_t seed_len,
|
/freebsd-11-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_locl.h | 59 size_t seed_len, unsigned char *seed_out, 65 size_t seed_len, int idx, unsigned char *seed_out,
|
H A D | dsa_depr.c | 93 unsigned char *seed_in, int seed_len, 106 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, 92 DSA_generate_parameters(int bits, unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback) (int, int, void *), void *cb_arg) argument
|
H A D | dsa_gen.c | 95 const unsigned char *seed_in, int seed_len, 107 return ret->meth->dsa_paramgen(ret, bits, seed_in, seed_len, 112 seed_in, seed_len, 121 seed_in, seed_len, NULL, counter_ret, 128 size_t seed_len, unsigned char *seed_out, 166 * NB: seed_len == 0 is special case: copy generated seed to seed_in if 169 if (seed_len && (seed_len < (size_t)qsize)) 171 if (seed_len > (size_t)qsize) 172 seed_len 94 DSA_generate_parameters_ex(DSA *ret, int bits, const unsigned char *seed_in, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument 126 dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits, const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, unsigned char *seed_out, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument 408 dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N, const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, int idx, unsigned char *seed_out, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument [all...] |
H A D | dsa.h | 148 const unsigned char *seed, int seed_len, 227 unsigned char *seed, int seed_len, 234 const unsigned char *seed, int seed_len,
|
/freebsd-11-stable/crypto/openssl/crypto/ec/ |
H A D | ec_lib.c | 112 ret->seed_len = 0; 167 OPENSSL_cleanse(group->seed, group->seed_len); 247 dest->seed = OPENSSL_malloc(src->seed_len); 250 if (!memcpy(dest->seed, src->seed, src->seed_len)) 252 dest->seed_len = src->seed_len; 257 dest->seed_len = 0; 500 group->seed_len = 0; 509 group->seed_len = len; 521 return group->seed_len; [all...] |
H A D | eck_prn.c | 154 size_t seed_len = 0; local 254 seed_len = EC_GROUP_get_seed_len(x); 315 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off))
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | tlsv1_client.c | 530 size_t seed_len = 2 * TLS_RANDOM_LEN; local 540 seed_len += 2 + context_len; 542 seed = os_malloc(seed_len); 565 label, seed, seed_len, out, out_len);
|
/freebsd-11-stable/crypto/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 306 const unsigned char *seed_in, size_t seed_len, 313 size_t seed_len, int idx,
|