Lines Matching +full:0 +full:x67

41  * Returns 0 on success with the pseudorandom key stored in @prk,
71 * Returns 0 on success with output keying material stored in @okm,
90 for (i = 0; i < okmlen; i += hashlen) { in hkdf_expand()
122 err = 0; in hkdf_expand()
177 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f"
205 .salt_size = 0,
207 .info_size = 0,
209 "\x96\x59\x67\x76\xaf\xdb\x63\x77\xac\x43\x4c\x1c\x29\x3c\xcb\x04",
239 .info_size = 0,
241 "\x77\x67\x82\xa5\xdf\xa1\x92\x38\x92\xfd\x8b\x63\x5d\x3a\x89\xdf",
276 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f"
294 "\xbf\x69\xf8\xd5\xc8\x32\x85\x6b\xf4\xe4\xfb\xc1\x79\x67\xd5\x49"
305 .salt_size = 0,
307 .info_size = 0,
328 .okm = "\xfb\x7e\x67\x43\xeb\x42\xcd\xe9\x6f\x1b\x70\x77\x89\x52\xab\x75"
342 .info_size = 0,
381 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f"
393 .prk = "\x35\x67\x25\x42\x90\x7d\x4e\x14\x2c\x00\xe8\x44\x99\xe7\x4e\x1d"
398 .okm = "\xce\x6c\x97\x19\x28\x05\xb3\x46\xe6\x16\x1e\x82\x1e\xd1\x65\x67"
411 .salt_size = 0,
413 .info_size = 0,
431 .prk = "\x67\x40\x9c\x9c\xac\x28\xb5\x2e\xe9\xfa\xd9\x1c\x2f\xda\x99\x9f"
451 .info_size = 0,
471 tfm = crypto_alloc_shash(shash, 0, 0); in hkdf_test()
544 int ret = 0, i; in crypto_hkdf_module_init()
547 return 0; in crypto_hkdf_module_init()
549 for (i = 0; i < ARRAY_SIZE(hkdf_sha256_tv); i++) { in crypto_hkdf_module_init()
554 for (i = 0; i < ARRAY_SIZE(hkdf_sha384_tv); i++) { in crypto_hkdf_module_init()
559 for (i = 0; i < ARRAY_SIZE(hkdf_sha512_tv); i++) { in crypto_hkdf_module_init()
564 return 0; in crypto_hkdf_module_init()