/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len() 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len() 131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument 148 switch (prf) { in eap_eke_auth_len() 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf() 201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf() [all …]
|
D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 126 if (prf == NULL) in ikev2_prf_plus() 128 hash_len = prf->hash_len; in ikev2_prf_plus() 379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() [all …]
|
D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
D | eap_eke_common.h | 65 u8 prf; member 82 u8 prf, u8 mac);
|
D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len() 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len() 131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument 148 switch (prf) { in eap_eke_auth_len() 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf() 201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf() [all …]
|
D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 126 if (prf == NULL) in ikev2_prf_plus() 128 hash_len = prf->hash_len; in ikev2_prf_plus() 379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() [all …]
|
D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
D | eap_eke_common.h | 65 u8 prf; member 82 u8 prf, u8 mac);
|
D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf = transform_id; in ikev2_parse_transform() 326 prop.prf = -1; in ikev2_process_sar1() 333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf = transform_id; in ikev2_parse_transform() 326 prop.prf = -1; in ikev2_process_sar1() 333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 184 prop->prf = transform_id; in ikev2_parse_transform() 320 prop.prf = -1; in ikev2_process_sai1() 327 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1() 349 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() [all …]
|
D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member 116 data->prf = atoi(pos + 4); in eap_eke_init() 118 data->prf); in eap_eke_init() 181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf() 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf() 274 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 184 prop->prf = transform_id; in ikev2_parse_transform() 318 prop.prf = -1; in ikev2_process_sai1() 325 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() [all …]
|
D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member 116 data->prf = atoi(pos + 4); in eap_eke_init() 118 data->prf); in eap_eke_init() 181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf() 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf() 274 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
D | openssl.c | 329 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local 336 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_extract() 347 if (EVP_KDF_derive(kctx, dest, (size_t)EVP_MD_size(prf), params) <= 0) { in ngtcp2_crypto_hkdf_extract() 355 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() 358 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract() 366 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_extract() 384 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local 391 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_expand() 410 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() 419 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_expand() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | Makefile | 36 sha1-prf.o \ 40 sha256-prf.o \ 44 sha384-prf.o \ 47 sha512-prf.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | Makefile | 47 sha1-prf.o \ 51 sha256-prf.o \ 55 sha384-prf.o \
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
D | p5_pbev2.c | 31 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 211 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set_ex() 212 if (kdf->prf == NULL) in PKCS5_pbkdf2_set_ex() 214 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set_ex()
|
/third_party/openssl/crypto/asn1/ |
D | p5_pbev2.c | 31 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 211 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set_ex() 212 if (kdf->prf == NULL) in PKCS5_pbkdf2_set_ex() 214 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set_ex()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
D | boringssl.c | 286 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local 287 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract() 289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract() 301 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local 303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand() 314 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf() local 316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf()
|
/third_party/mbedtls/library/ |
D | psa_crypto.c | 6140 static psa_status_t psa_tls12_prf_set_seed(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_seed() argument 6144 if (prf->state != PSA_TLS12_PRF_STATE_INIT) { in psa_tls12_prf_set_seed() 6149 prf->seed = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_seed() 6150 if (prf->seed == NULL) { in psa_tls12_prf_set_seed() 6154 memcpy(prf->seed, data, data_length); in psa_tls12_prf_set_seed() 6155 prf->seed_length = data_length; in psa_tls12_prf_set_seed() 6158 prf->state = PSA_TLS12_PRF_STATE_SEED_SET; in psa_tls12_prf_set_seed() 6163 static psa_status_t psa_tls12_prf_set_key(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_key() argument 6167 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET && in psa_tls12_prf_set_key() 6168 prf->state != PSA_TLS12_PRF_STATE_OTHER_KEY_SET) { in psa_tls12_prf_set_key() [all …]
|
/third_party/python/Lib/ |
D | hashlib.py | 218 def prf(msg, inner=inner, outer=outer): function 238 prev = prf(salt + loop.to_bytes(4, 'big')) 242 prev = prf(prev)
|
/third_party/libwebsockets/lib/misc/fts/ |
D | trie-fd.c | 768 struct lws_fts_result_filepath **prf, *rf1, *rf2; in lws_fts_search() local 774 prf = &result->filepath_head; in lws_fts_search() 775 while (*prf) { in lws_fts_search() 777 rf1 = *prf; in lws_fts_search() 785 *prf = rf2; in lws_fts_search() 790 prf = &(*prf)->next; in lws_fts_search()
|