Lines Matching +full:0 +full:x2c
41 * Returns 0 on success with the pseudorandom key stored in @prk,
71 * Returns 0 on success with output keying material stored in @okm,
90 for (i = 0; i < okmlen; i += hashlen) { in hkdf_expand()
122 err = 0; in hkdf_expand()
162 .prk = "\x07\x77\x09\x36\x2c\x2e\x32\xdf\x0d\xdc\x3f\x0d\xc4\x7b\xba\x63"
173 "\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f"
205 .salt_size = 0,
207 .info_size = 0,
208 .prk = "\x19\xef\x24\xa3\x2c\x71\x7b\x16\x7f\x33\xa9\x1d\x6f\x64\x8b\xdf"
239 .info_size = 0,
260 .prk = "\x70\x4b\x39\x99\x07\x79\xce\x1d\xc5\x48\x05\x2c\x7d\xc3\x9f\x30"
272 "\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f"
305 .salt_size = 0,
307 .info_size = 0,
342 .info_size = 0,
348 "\x7e\x2b\x2c\xd6\xca\x43\x73\xa1\xf3\x14\x50\xa7\xbd\xf9\x48\x2b"
370 "\xc8\xe2\x6a\x1a\x16\xed\x34\xd9\xfc\x7f\xe9\x2c\x14\x81\x57\x93"
371 "\x38\xda\x36\x2c\xb8\xd9\xf9\x25\xd7\xcb",
377 "\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f"
393 .prk = "\x35\x67\x25\x42\x90\x7d\x4e\x14\x2c\x00\xe8\x44\x99\xe7\x4e\x1d"
411 .salt_size = 0,
413 .info_size = 0,
419 .okm = "\xf5\xfa\x02\xb1\x82\x98\xa7\x2a\x8c\x23\x89\x8a\x87\x03\x47\x2c"
436 .okm = "\x74\x13\xe8\x99\x7e\x02\x06\x10\xfb\xf6\x82\x3f\x2c\xe1\x4b\xff"
451 .info_size = 0,
471 tfm = crypto_alloc_shash(shash, 0, 0); in hkdf_test()
544 int ret = 0, i; in crypto_hkdf_module_init()
547 return 0; in crypto_hkdf_module_init()
549 for (i = 0; i < ARRAY_SIZE(hkdf_sha256_tv); i++) { in crypto_hkdf_module_init()
554 for (i = 0; i < ARRAY_SIZE(hkdf_sha384_tv); i++) { in crypto_hkdf_module_init()
559 for (i = 0; i < ARRAY_SIZE(hkdf_sha512_tv); i++) { in crypto_hkdf_module_init()
564 return 0; in crypto_hkdf_module_init()