Home
last modified time | relevance | path

Searched refs:prf (Results 1 – 25 of 124) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_eke_common.c121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
148 switch (prf) { in eap_eke_auth_len()
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf()
[all …]
Dikev2_common.c122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
126 if (prf == NULL) in ikev2_prf_plus()
128 hash_len = prf->hash_len; in ikev2_prf_plus()
379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_eke_common.c121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
148 switch (prf) { in eap_eke_auth_len()
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf()
[all …]
Dikev2_common.c122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
126 if (prf == NULL) in ikev2_prf_plus()
128 hash_len = prf->hash_len; in ikev2_prf_plus()
379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf = transform_id; in ikev2_parse_transform()
326 prop.prf = -1; in ikev2_process_sar1()
333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf = transform_id; in ikev2_parse_transform()
326 prop.prf = -1; in ikev2_process_sar1()
333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
107 skeyseed, prf->hash_len); in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
184 prop->prf = transform_id; in ikev2_parse_transform()
320 prop.prf = -1; in ikev2_process_sai1()
327 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
349 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member
116 data->prf = atoi(pos + 4); in eap_eke_init()
118 data->prf); in eap_eke_init()
181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
274 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
107 skeyseed, prf->hash_len); in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
184 prop->prf = transform_id; in ikev2_parse_transform()
318 prop.prf = -1; in ikev2_process_sai1()
325 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member
116 data->prf = atoi(pos + 4); in eap_eke_init()
118 data->prf); in eap_eke_init()
181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
274 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/
Dopenssl.c329 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local
336 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_extract()
347 if (EVP_KDF_derive(kctx, dest, (size_t)EVP_MD_size(prf), params) <= 0) { in ngtcp2_crypto_hkdf_extract()
355 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract()
358 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract()
366 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_extract()
384 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local
391 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_expand()
410 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand()
419 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_expand()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
DMakefile36 sha1-prf.o \
40 sha256-prf.o \
44 sha384-prf.o \
47 sha512-prf.o \
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
DMakefile47 sha1-prf.o \
51 sha256-prf.o \
55 sha384-prf.o \
/third_party/node/deps/openssl/openssl/crypto/asn1/
Dp5_pbev2.c31 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
211 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set_ex()
212 if (kdf->prf == NULL) in PKCS5_pbkdf2_set_ex()
214 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set_ex()
/third_party/openssl/crypto/asn1/
Dp5_pbev2.c31 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
211 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set_ex()
212 if (kdf->prf == NULL) in PKCS5_pbkdf2_set_ex()
214 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set_ex()
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/
Dboringssl.c286 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local
287 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract()
289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract()
301 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local
303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand()
314 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf() local
316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf()
/third_party/mbedtls/library/
Dpsa_crypto.c6140 static psa_status_t psa_tls12_prf_set_seed(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_seed() argument
6144 if (prf->state != PSA_TLS12_PRF_STATE_INIT) { in psa_tls12_prf_set_seed()
6149 prf->seed = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_seed()
6150 if (prf->seed == NULL) { in psa_tls12_prf_set_seed()
6154 memcpy(prf->seed, data, data_length); in psa_tls12_prf_set_seed()
6155 prf->seed_length = data_length; in psa_tls12_prf_set_seed()
6158 prf->state = PSA_TLS12_PRF_STATE_SEED_SET; in psa_tls12_prf_set_seed()
6163 static psa_status_t psa_tls12_prf_set_key(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_key() argument
6167 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET && in psa_tls12_prf_set_key()
6168 prf->state != PSA_TLS12_PRF_STATE_OTHER_KEY_SET) { in psa_tls12_prf_set_key()
[all …]
/third_party/python/Lib/
Dhashlib.py218 def prf(msg, inner=inner, outer=outer): function
238 prev = prf(salt + loop.to_bytes(4, 'big'))
242 prev = prf(prev)
/third_party/libwebsockets/lib/misc/fts/
Dtrie-fd.c768 struct lws_fts_result_filepath **prf, *rf1, *rf2; in lws_fts_search() local
774 prf = &result->filepath_head; in lws_fts_search()
775 while (*prf) { in lws_fts_search()
777 rf1 = *prf; in lws_fts_search()
785 *prf = rf2; in lws_fts_search()
790 prf = &(*prf)->next; in lws_fts_search()

12345