Lines Matching +full:0 +full:x89
41 * Returns 0 on success with the pseudorandom key stored in @prk,
71 * Returns 0 on success with output keying material stored in @okm,
90 for (i = 0; i < okmlen; i += hashlen) { in hkdf_expand()
122 err = 0; in hkdf_expand()
179 "\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f"
205 .salt_size = 0,
207 .info_size = 0,
239 .info_size = 0,
241 "\x77\x67\x82\xa5\xdf\xa1\x92\x38\x92\xfd\x8b\x63\x5d\x3a\x89\xdf",
278 "\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f"
290 "\x62\xe6\x76\xd4\xdc\x87\xb0\x89\x5c\x6a\x7d\xc9\x7b\x52\xce\xbb",
305 .salt_size = 0,
307 .info_size = 0,
310 "\xa5\x7c\xdb\x59\x8a\xf9\xdf\xa6\x96\x3a\x96\x89\x9a\xf0\x47\xe5",
312 .okm = "\xc8\xc9\x6e\x71\x0f\x89\xb0\xd7\x99\x0b\xca\x68\xbc\xde\xc8\xcf"
328 .okm = "\xfb\x7e\x67\x43\xeb\x42\xcd\xe9\x6f\x1b\x70\x77\x89\x52\xab\x75"
342 .info_size = 0,
364 .prk = "\x66\x57\x99\x82\x37\x37\xde\xd0\x4a\x88\xe4\x7e\x54\xa5\x89\x0b"
383 "\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f"
395 "\xc8\x6c\xd1\xe5\xb7\xd1\x78\xc7\x44\x89\xbd\xbe\xb3\x07\x12\xbe"
399 "\x3b\x84\xf4\x00\xa2\xb5\x14\xb2\xfe\x23\xd8\x4c\xd1\x89\xdd\xf1"
411 .salt_size = 0,
413 .info_size = 0,
419 .okm = "\xf5\xfa\x02\xb1\x82\x98\xa7\x2a\x8c\x23\x89\x8a\x87\x03\x47\x2c"
451 .info_size = 0,
452 .prk = "\x53\x46\xb3\x76\xbf\x3a\xa9\xf8\x4f\x8f\x6e\xd5\xb1\xc4\xf4\x89"
471 tfm = crypto_alloc_shash(shash, 0, 0); in hkdf_test()
544 int ret = 0, i; in crypto_hkdf_module_init()
547 return 0; in crypto_hkdf_module_init()
549 for (i = 0; i < ARRAY_SIZE(hkdf_sha256_tv); i++) { in crypto_hkdf_module_init()
554 for (i = 0; i < ARRAY_SIZE(hkdf_sha384_tv); i++) { in crypto_hkdf_module_init()
559 for (i = 0; i < ARRAY_SIZE(hkdf_sha512_tv); i++) { in crypto_hkdf_module_init()
564 return 0; in crypto_hkdf_module_init()