Home
last modified time | relevance | path

Searched refs:prf (Results 1 – 25 of 38) sorted by relevance

12

/external/e2fsprogs/e2fsck/
Dprofile.c206 (prf_file_t prf);
387 prf_file_t prf; in profile_set_default() local
396 for (prf = profile->first_file; prf; prf = prf->next) { in profile_set_default()
397 if (strcmp(prf->filespec, default_filename) == 0) in profile_set_default()
400 if (!prf) in profile_set_default()
403 if (prf->root) { in profile_set_default()
404 profile_free_node(prf->root); in profile_set_default()
405 prf->root = 0; in profile_set_default()
434 (syntax_err_cb)(prf->filespec, retval, in profile_set_default()
437 if (prf->root) in profile_set_default()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Dikev2.c46 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
55 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
57 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
116 skeyseed, prf->hash_len); in ikev2_derive_keys()
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
195 transform_id == data->proposal.prf) in ikev2_parse_transform()
196 prop->prf = transform_id; in ikev2_parse_transform()
331 prop.prf = -1; in ikev2_process_sar1()
338 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
Dikev2.h23 int prf; member
Deap_ikev2.c107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
333 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf = transform_id; in ikev2_parse_transform()
326 prop.prf = -1; in ikev2_process_sar1()
333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
Dikev2.h17 int prf; member
Deap_server_ikev2.c102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
328 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c123 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
126 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
127 if (prf == NULL) in ikev2_prf_plus()
129 hash_len = prf->hash_len; in ikev2_prf_plus()
441 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
444 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
446 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
473 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_ikev2_common.h27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
Deap_pwd_common.h49 u8 prf; member
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Dikev2_common.c128 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
131 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
132 if (prf == NULL) in ikev2_prf_plus()
134 hash_len = prf->hash_len; in ikev2_prf_plus()
446 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
449 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
451 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
469 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
478 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_ikev2_common.h33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
Dikev2_common.h338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
124 skeyseed, prf->hash_len); in ikev2_derive_keys()
126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
210 prop->prf = transform_id; in ikev2_parse_transform()
344 prop.prf = -1; in ikev2_process_sai1()
351 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
373 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Dikev2.h17 int prf; member
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Dikev2.c42 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
51 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
53 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
129 skeyseed, prf->hash_len); in ikev2_derive_keys()
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
215 prop->prf = transform_id; in ikev2_parse_transform()
349 prop.prf = -1; in ikev2_process_sai1()
356 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
378 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Dikev2.h23 int prf; member
/external/openssl/crypto/asn1/
Dp5_pbev2.c78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
247 if (!kdf->prf) in PKCS5_pbkdf2_set()
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
/external/wpa_supplicant_8/src/crypto/
DMakefile42 sha1-prf.o \
46 sha256-prf.o \
/external/chromium/crypto/
Dsymmetric_key_win.cc402 ScopedHCRYPTHASH prf; in DeriveKeyFromPassword() local
403 if (!CreateHMACHash(provider, password_as_key, CALG_SHA1, &prf)) in DeriveKeyFromPassword()
408 ok = CryptGetHashParam(prf, HP_HASHSIZE, in DeriveKeyFromPassword()
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
/external/webkit/Source/WebKit2/UIProcess/API/qt/tests/
Dtests.pri5 # Add the tst_ prefix, In QTDIR_build it's done by qttest_p4.prf
/external/webkit/Source/WebKit/qt/tests/
Dtests.pri5 # Add the tst_ prefix, In QTDIR_build it's done by qttest_p4.prf
/external/openssl/crypto/evp/
Dp5_crpt2.c277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()

12