Lines Matching +full:0 +full:x43

41  * Returns 0 on success with the pseudorandom key stored in @prk,
71 * Returns 0 on success with output keying material stored in @okm,
90 for (i = 0; i < okmlen; i += hashlen) { in hkdf_expand()
122 err = 0; in hkdf_expand()
165 .okm = "\x3c\xb2\x5f\x25\xfa\xac\xd5\x7a\x90\x43\x4f\x64\xd0\x36\x2f\x2a"
175 "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f",
196 "\xcc\x30\xc5\x81\x79\xec\x3e\x87\xc1\x4c\x01\xd5\xc1\xf3\x43\x4f"
205 .salt_size = 0,
207 .info_size = 0,
209 "\x96\x59\x67\x76\xaf\xdb\x63\x77\xac\x43\x4c\x1c\x29\x3c\xcb\x04",
226 .okm = "\x58\xdc\xe1\x0d\x58\x01\xcd\xfd\xa8\x31\x72\x6b\xfe\xbc\xb7\x43"
239 .info_size = 0,
243 .okm = "\x59\x68\x99\x17\x9a\xb1\xbc\x00\xa7\xc0\x37\x86\xff\x43\xee\x53"
274 "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f",
288 .prk = "\xb3\x19\xf6\x83\x1d\xff\x93\x14\xef\xb6\x43\xba\xa2\x92\x63\xb3"
305 .salt_size = 0,
307 .info_size = 0,
308 .prk = "\x10\xe4\x0c\xf0\x72\xa4\xc5\x62\x6e\x43\xdd\x22\xc1\xcf\x72\x7d"
313 "\x85\x40\x62\xe5\x4c\x73\xa7\xab\xc7\x43\xfa\xde\x9b\x24\x2d\xaa"
328 .okm = "\xfb\x7e\x67\x43\xeb\x42\xcd\xe9\x6f\x1b\x70\x77\x89\x52\xab\x75"
342 .info_size = 0,
345 "\xd8\xfe\x55\x43\x58\x53\x47\x21\x90\x39\xd1\x68\x28\x36\x33\xf5",
348 "\x7e\x2b\x2c\xd6\xca\x43\x73\xa1\xf3\x14\x50\xa7\xbd\xf9\x48\x2b"
379 "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f",
411 .salt_size = 0,
413 .info_size = 0,
451 .info_size = 0,
471 tfm = crypto_alloc_shash(shash, 0, 0); in hkdf_test()
544 int ret = 0, i; in crypto_hkdf_module_init()
547 return 0; in crypto_hkdf_module_init()
549 for (i = 0; i < ARRAY_SIZE(hkdf_sha256_tv); i++) { in crypto_hkdf_module_init()
554 for (i = 0; i < ARRAY_SIZE(hkdf_sha384_tv); i++) { in crypto_hkdf_module_init()
559 for (i = 0; i < ARRAY_SIZE(hkdf_sha512_tv); i++) { in crypto_hkdf_module_init()
564 return 0; in crypto_hkdf_module_init()