| /src/external/bsd/wpa/dist/src/crypto/ |
| sha384-tlsprf.c | 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0)
|
| sha384.c | 50 /* the HMAC_SHA384 transform looks like: 92 * hmac_sha384 - HMAC-SHA384 over data buffer (RFC 2104) 100 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| sha384.h | 16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
|
| crypto_nettle.c | 207 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| crypto_gnutls.c | 187 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| crypto_linux.c | 224 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| crypto_openssl.c | 1627 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function 1749 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| crypto_module_tests.c | 1993 if (hmac_sha384(t->key, t->key_len, t->data, t->data_len,
|
| crypto_wolfssl.c | 484 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, function
|
| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.c | 252 if (hmac_sha384(key, key_len, buf, len, hash)) 288 if (hmac_sha384(key, key_len, buf, len, hash)) 302 if (hmac_sha384(key, key_len, buf, len, hash)) 325 if (hmac_sha384(key, key_len, buf, len, hash)) 346 if (hmac_sha384(key, key_len, buf, len, hash)) 1600 if (hmac_sha384(kdk, kdk_len, buf, buf_len, hash)) { 1692 if (hmac_sha384(kck, WPA_PASN_KCK_LEN, buf, buf_len, hash))
|
| dpp_crypto.c | 155 return hmac_sha384(key, key_len, data, data_len, mac);
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_teap_common.c | 335 res = hmac_sha384(cmk, cmk_len, buffer, buffer_len, tmp);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11.c | 3718 res = hmac_sha384(wpabuf_head(hkey), wpabuf_len(hkey),
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 6606 res = hmac_sha384(wpabuf_head(hkey), wpabuf_len(hkey),
|