Home
last modified time | relevance | path

Searched refs:PRF (Results 1 – 14 of 14) sorted by relevance

/external/lzma/C/
DLzma2Dec.c42 #define PRF(x) x macro
44 #define PRF(x) macro
104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState()
105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState()
125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState()
135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
DLzma2Enc.c34 #define PRF(x) /* x */ macro
91 PRF(printf("\npackSize = %7d unpackSize = %7d ", packSize, unpackSize)); in Lzma2EncInt_EncodeSubblock()
109 PRF(printf("################# COPY ")); in Lzma2EncInt_EncodeSubblock()
142 PRF(printf(" ")); in Lzma2EncInt_EncodeSubblock()
/external/chromium_org/third_party/lzma_sdk/
DLzma2Dec.c42 #define PRF(x) x macro
44 #define PRF(x) macro
104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState()
105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState()
125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState()
135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
/external/chromium_org/third_party/tlslite/tlslite/
DSession.py71 self.masterSecret = PRF(premasterSecret, "master secret",
126 self.masterSecret = PRF(premasterSecret, "shared secret",
Dmathtls.py45 def PRF(secret, label, seed, length): function
DTLSRecordLayer.py1005 keyBlock = PRF(self.session.masterSecret,
1129 verifyData = PRF(self.session.masterSecret, label, handshakeHashes,
/external/srtp/
DTODO36 use of the PRF has been implemented, as it's sufficient
/external/chromium_org/net/third_party/nss/patches/
Dchannelid2.patch121 + * SHA-1/MD5 combination (for TLS < 1.2) or the TLS PRF hash (for
/external/srtp/doc/
Drfc3711.txt73 4.3.3. AES-CM PRF . . . . . . . . . . . . . . . . . . . 28
77 5.3. Key Derivation: AES-CM PRF . . . . . . . . . . . . . . . 29
1450 [HAC]. For the purpose of key derivation in SRTP, a secure PRF with
1451 m = 128 (or more) MUST be used, and a default PRF transform is
1489 (The PRF may internally specify additional formatting and padding of
1490 x, see e.g., Section 4.3.3 for the default PRF.)
1540 4.3.3. AES-CM PRF
1542 The currently defined PRF, keyed by 128, 192, or 256 bit master key,
1560 key derivation (PRF) AES-CM - AES-CM
1596 5.3. Key Derivation: AES-CM PRF
[all …]
/external/chromium_org/third_party/openssl/openssl/patches/
Dtls1_change_cipher_state_rewrite.patch220 - /* If GCM mode only part of IV comes from PRF */
/external/openssl/crypto/objects/
Dobjects.txt1174 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
/external/chromium_org/third_party/openssl/openssl/crypto/objects/
Dobjects.txt1174 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog738 * fixed PeerKey key derivation to use the correct PRF label
/external/chromium_org/third_party/openssl/patches.chromium/
D0007-chacha.patch8689 +- /* If GCM mode only part of IV comes from PRF */