/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
D | PBKDF2Params.java | 38 private final AlgorithmIdentifier prf; field in PBKDF2Params 102 AlgorithmIdentifier prf) in PBKDF2Params() argument 116 this.prf = prf; in PBKDF2Params() 129 AlgorithmIdentifier prf) in PBKDF2Params() argument 131 this(salt, iterationCount, 0, prf); in PBKDF2Params() 165 prf = AlgorithmIdentifier.getInstance(o); in PBKDF2Params() 169 prf = null; in PBKDF2Params() 175 prf = null; in PBKDF2Params() 221 return prf == null || prf.equals(algid_hmacWithSHA1); in isDefaultPrf() 231 if (prf != null) in getPrf() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/ |
D | PBKDF2Params.java | 40 private final AlgorithmIdentifier prf; field in PBKDF2Params 104 AlgorithmIdentifier prf) in PBKDF2Params() argument 118 this.prf = prf; in PBKDF2Params() 131 AlgorithmIdentifier prf) in PBKDF2Params() argument 133 this(salt, iterationCount, 0, prf); in PBKDF2Params() 167 prf = AlgorithmIdentifier.getInstance(o); in PBKDF2Params() 171 prf = null; in PBKDF2Params() 177 prf = null; in PBKDF2Params() 223 return prf == null || prf.equals(algid_hmacWithSHA1); in isDefaultPrf() 233 if (prf != null) in getPrf() [all …]
|
/external/e2fsprogs/lib/support/ |
D | profile.c | 208 (prf_file_t prf); 395 prf_file_t prf; in profile_set_default() local 404 for (prf = profile->first_file; prf; prf = prf->next) { in profile_set_default() 405 if (strcmp(prf->filespec, default_filename) == 0) in profile_set_default() 408 if (!prf) in profile_set_default() 411 if (prf->root) { in profile_set_default() 412 profile_free_node(prf->root); in profile_set_default() 413 prf->root = 0; in profile_set_default() 442 (syntax_err_cb)(prf->filespec, retval, in profile_set_default() 445 if (prf->root) in profile_set_default() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
D | PBKDF2KeySpec.java | 17 private AlgorithmIdentifier prf; field in PBKDF2KeySpec 28 …KDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) in PBKDF2KeySpec() argument 32 this.prf = prf; in PBKDF2KeySpec() 42 return defaultPRF.equals(prf); in isDefaultPrf() 52 return prf; in getPrf()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len() 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len() 131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument 148 switch (prf) { in eap_eke_auth_len() 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf() 201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf() [all …]
|
D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 126 if (prf == NULL) in ikev2_prf_plus() 128 hash_len = prf->hash_len; in ikev2_prf_plus() 379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() [all …]
|
D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
D | eap_eke_common.h | 65 u8 prf; member 82 u8 prf, u8 mac);
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/spec/ |
D | PBKDF2KeySpec.java | 19 private AlgorithmIdentifier prf; field in PBKDF2KeySpec 30 …KDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) in PBKDF2KeySpec() argument 34 this.prf = prf; in PBKDF2KeySpec() 44 return defaultPRF.equals(prf); in isDefaultPrf() 54 return prf; in getPrf()
|
/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 183 self.prf = _sslv2_PRF 185 self.prf = _ssl_PRF 188 self.prf = _tls_PRF 191 self.prf = _tls12_SHA384PRF 193 self.prf = _tls12_SHA512PRF 195 self.prf = _tls12_SHA256PRF 209 return self.prf(pre_master_secret, seed, 48) 211 return self.prf(pre_master_secret, b"master secret", seed, 48) 221 return self.prf(master_secret, seed, req_len) 223 return self.prf(master_secret, b"key expansion", seed, req_len) [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf = transform_id; in ikev2_parse_transform() 326 prop.prf = -1; in ikev2_process_sar1() 333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 184 prop->prf = transform_id; in ikev2_parse_transform() 318 prop.prf = -1; in ikev2_process_sai1() 325 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() [all …]
|
D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member 116 data->prf = atoi(pos + 4); in eap_eke_init() 118 data->prf); in eap_eke_init() 181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf() 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf() 274 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
|
/external/tcpdump/tests/ |
D | ikev2pI2.out | 7 (t: #3 type=prf id=hmac-sha ) 12 (t: #3 type=prf id=hmac-md5 ) 17 (t: #3 type=prf id=hmac-sha ) 22 (t: #3 type=prf id=hmac-md5 ) 27 (t: #3 type=prf id=hmac-sha ) 32 (t: #3 type=prf id=hmac-md5 )
|
D | ikev2four.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 11 (t: #7 type=prf id=aes128_xcbc ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 35 (t: #7 type=prf id=aes128_xcbc ) 50 (t: #2 type=prf id=hmac-sha )
|
D | ikev2fourv.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 11 (t: #7 type=prf id=aes128_xcbc ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 35 (t: #7 type=prf id=aes128_xcbc ) 50 (t: #2 type=prf id=hmac-sha )
|
D | ikev2fourv4.out | 9 (t: #5 type=prf id=hmac-sha ) 10 (t: #6 type=prf id=hmac-md5 ) 11 (t: #7 type=prf id=aes128_xcbc ) 33 (t: #5 type=prf id=hmac-sha ) 34 (t: #6 type=prf id=hmac-md5 ) 35 (t: #7 type=prf id=aes128_xcbc ) 50 (t: #2 type=prf id=hmac-sha )
|
/external/cldr/tools/java/org/unicode/cldr/tool/ |
D | PluralRulesFactory.java | 46 PluralRulesFactory prf = singletons.get(key); in getInstance() local 47 if (prf == null) { in getInstance() 50 prf = new PluralRulesFactoryVanilla(supplementalDataInfo); in getInstance() 58 singletons.put(key, prf); in getInstance() 60 return prf; in getInstance()
|
D | GeneratePluralConfirmation.java | 37 private static final PluralRulesFactory prf = PluralRulesFactory.getInstance(SUPPLEMENTAL); field in GeneratePluralConfirmation 40 for (String uLocale : new TreeSet<>(prf.getLocales())) { in main() 43 String pattern = prf.getSamplePattern(uLocale, type, count); in main() 74 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count); in mainOld2() 84 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, Count.other); in mainOld2() 90 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count); in mainOld2() 188 String pattern = prf.getSamplePattern(locale, type.standardType, count); in toString()
|
/external/llvm/utils/TableGen/ |
D | OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); in EmitOptParser() 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", "; in EmitOptParser()
|
/external/swiftshader/third_party/llvm-7.0/llvm/utils/TableGen/ |
D | OptParserEmitter.cpp | 127 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local 128 PrefixKeyT prfkey(prf.begin(), prf.end()); in EmitOptParser() 215 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local 216 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", "; in EmitOptParser()
|
/external/wpa_supplicant_8/src/crypto/ |
D | Makefile | 47 sha1-prf.o \ 51 sha256-prf.o \ 55 sha384-prf.o \
|
/external/python/cpython2/Lib/ |
D | hashlib.py | 188 def prf(msg, inner=inner, outer=outer): function 209 prev = prf(salt + struct.pack(b'>I', loop)) 212 prev = prf(prev)
|
/external/python/cpython3/Lib/ |
D | hashlib.py | 201 def prf(msg, inner=inner, outer=outer): function 221 prev = prf(salt + loop.to_bytes(4, 'big')) 225 prev = prf(prev)
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 268 CBS alg_id, prf; in PKCS5_pbe2_decrypt_init() local 270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) || in PKCS5_pbe2_decrypt_init() 278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) { in PKCS5_pbe2_decrypt_init()
|