Searched refs:PRF (Results 1 – 14 of 14) sorted by relevance
/external/lzma/C/ |
D | Lzma2Dec.c | 42 #define PRF(x) x macro 44 #define PRF(x) macro 104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState() 105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState() 125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState() 135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
|
D | Lzma2Enc.c | 34 #define PRF(x) /* x */ macro 91 PRF(printf("\npackSize = %7d unpackSize = %7d ", packSize, unpackSize)); in Lzma2EncInt_EncodeSubblock() 109 PRF(printf("################# COPY ")); in Lzma2EncInt_EncodeSubblock() 142 PRF(printf(" ")); in Lzma2EncInt_EncodeSubblock()
|
/external/chromium_org/third_party/lzma_sdk/ |
D | Lzma2Dec.c | 42 #define PRF(x) x macro 44 #define PRF(x) macro 104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState() 105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState() 125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState() 135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
|
/external/chromium_org/third_party/tlslite/tlslite/ |
D | Session.py | 71 self.masterSecret = PRF(premasterSecret, "master secret", 126 self.masterSecret = PRF(premasterSecret, "shared secret",
|
D | mathtls.py | 45 def PRF(secret, label, seed, length): function
|
D | TLSRecordLayer.py | 1005 keyBlock = PRF(self.session.masterSecret, 1129 verifyData = PRF(self.session.masterSecret, label, handshakeHashes,
|
/external/srtp/ |
D | TODO | 36 use of the PRF has been implemented, as it's sufficient
|
/external/chromium_org/net/third_party/nss/patches/ |
D | channelid2.patch | 121 + * SHA-1/MD5 combination (for TLS < 1.2) or the TLS PRF hash (for
|
/external/srtp/doc/ |
D | rfc3711.txt | 73 4.3.3. AES-CM PRF . . . . . . . . . . . . . . . . . . . 28 77 5.3. Key Derivation: AES-CM PRF . . . . . . . . . . . . . . . 29 1450 [HAC]. For the purpose of key derivation in SRTP, a secure PRF with 1451 m = 128 (or more) MUST be used, and a default PRF transform is 1489 (The PRF may internally specify additional formatting and padding of 1490 x, see e.g., Section 4.3.3 for the default PRF.) 1540 4.3.3. AES-CM PRF 1542 The currently defined PRF, keyed by 128, 192, or 256 bit master key, 1560 key derivation (PRF) AES-CM - AES-CM 1596 5.3. Key Derivation: AES-CM PRF [all …]
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
D | tls1_change_cipher_state_rewrite.patch | 220 - /* If GCM mode only part of IV comes from PRF */
|
/external/openssl/crypto/objects/ |
D | objects.txt | 1174 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
|
/external/chromium_org/third_party/openssl/openssl/crypto/objects/ |
D | objects.txt | 1174 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 738 * fixed PeerKey key derivation to use the correct PRF label
|
/external/chromium_org/third_party/openssl/patches.chromium/ |
D | 0007-chacha.patch | 8689 +- /* If GCM mode only part of IV comes from PRF */
|