/external/e2fsprogs/e2fsck/ |
D | profile.c | 206 (prf_file_t prf); 387 prf_file_t prf; in profile_set_default() local 396 for (prf = profile->first_file; prf; prf = prf->next) { in profile_set_default() 397 if (strcmp(prf->filespec, default_filename) == 0) in profile_set_default() 400 if (!prf) in profile_set_default() 403 if (prf->root) { in profile_set_default() 404 profile_free_node(prf->root); in profile_set_default() 405 prf->root = 0; in profile_set_default() 434 (syntax_err_cb)(prf->filespec, retval, in profile_set_default() 437 if (prf->root) in profile_set_default() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | ikev2.c | 46 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 55 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 57 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 116 skeyseed, prf->hash_len); in ikev2_derive_keys() 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 195 transform_id == data->proposal.prf) in ikev2_parse_transform() 196 prop->prf = transform_id; in ikev2_parse_transform() 331 prop.prf = -1; in ikev2_process_sar1() 338 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1() [all …]
|
D | ikev2.h | 23 int prf; member
|
D | eap_ikev2.c | 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 333 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf = transform_id; in ikev2_parse_transform() 326 prop.prf = -1; in ikev2_process_sar1() 333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1() [all …]
|
D | ikev2.h | 17 int prf; member
|
D | eap_server_ikev2.c | 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 328 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 126 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 127 if (prf == NULL) in ikev2_prf_plus() 129 hash_len = prf->hash_len; in ikev2_prf_plus() 441 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 444 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 446 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 473 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() [all …]
|
D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
D | eap_pwd_common.h | 49 u8 prf; member
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | ikev2_common.c | 128 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 131 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 132 if (prf == NULL) in ikev2_prf_plus() 134 hash_len = prf->hash_len; in ikev2_prf_plus() 446 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 449 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 451 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 469 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 478 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() [all …]
|
D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
D | ikev2_common.h | 338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 124 skeyseed, prf->hash_len); in ikev2_derive_keys() 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 210 prop->prf = transform_id; in ikev2_parse_transform() 344 prop.prf = -1; in ikev2_process_sai1() 351 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1() 373 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() [all …]
|
D | ikev2.h | 17 int prf; member
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | ikev2.c | 42 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 51 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 53 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 129 skeyseed, prf->hash_len); in ikev2_derive_keys() 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 215 prop->prf = transform_id; in ikev2_parse_transform() 349 prop.prf = -1; in ikev2_process_sai1() 356 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1() 378 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() [all …]
|
D | ikev2.h | 23 int prf; member
|
/external/openssl/crypto/asn1/ |
D | p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set() 247 if (!kdf->prf) in PKCS5_pbkdf2_set() 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
|
/external/wpa_supplicant_8/src/crypto/ |
D | Makefile | 42 sha1-prf.o \ 46 sha256-prf.o \
|
/external/chromium/crypto/ |
D | symmetric_key_win.cc | 402 ScopedHCRYPTHASH prf; in DeriveKeyFromPassword() local 403 if (!CreateHMACHash(provider, password_as_key, CALG_SHA1, &prf)) in DeriveKeyFromPassword() 408 ok = CryptGetHashParam(prf, HP_HASHSIZE, in DeriveKeyFromPassword() 444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
|
/external/webkit/Source/WebKit2/UIProcess/API/qt/tests/ |
D | tests.pri | 5 # Add the tst_ prefix, In QTDIR_build it's done by qttest_p4.prf
|
/external/webkit/Source/WebKit/qt/tests/ |
D | tests.pri | 5 # Add the tst_ prefix, In QTDIR_build it's done by qttest_p4.prf
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen() 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
|