Home
last modified time | relevance | path

Searched refs:prf (Results 1 – 25 of 39) sorted by relevance

12

/external/e2fsprogs/e2fsck/
Dprofile.c206 (prf_file_t prf);
387 prf_file_t prf; in profile_set_default() local
396 for (prf = profile->first_file; prf; prf = prf->next) { in profile_set_default()
397 if (strcmp(prf->filespec, default_filename) == 0) in profile_set_default()
400 if (!prf) in profile_set_default()
403 if (prf->root) { in profile_set_default()
404 profile_free_node(prf->root); in profile_set_default()
405 prf->root = 0; in profile_set_default()
434 (syntax_err_cb)(prf->filespec, retval, in profile_set_default()
437 if (prf->root) in profile_set_default()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c123 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
125 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
127 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
133 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
137 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
148 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
150 switch (prf) { in eap_eke_auth_len()
211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
227 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
229 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf()
[all …]
Dikev2_common.c123 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
126 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
127 if (prf == NULL) in ikev2_prf_plus()
129 hash_len = prf->hash_len; in ikev2_prf_plus()
441 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
444 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
446 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
473 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
Deap_ikev2_common.h27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
Deap_pwd_common.h49 u8 prf; member
Dikev2_common.h332 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf = transform_id; in ikev2_parse_transform()
326 prop.prf = -1; in ikev2_process_sar1()
333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
Dikev2.h17 int prf; member
Deap_server_ikev2.c102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
331 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
124 skeyseed, prf->hash_len); in ikev2_derive_keys()
126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
210 prop->prf = transform_id; in ikev2_parse_transform()
344 prop.prf = -1; in ikev2_process_sai1()
351 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
373 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Dikev2.h17 int prf; member
Deap_eke.c144 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
146 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
147 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
/external/llvm/utils/TableGen/
DOptParserEmitter.cpp120 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local
121 PrefixKeyT prfkey(prf.begin(), prf.end()); in EmitOptParser()
205 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local
206 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", "; in EmitOptParser()
/external/openssl/crypto/asn1/
Dp5_pbev2.c78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
247 if (!kdf->prf) in PKCS5_pbkdf2_set()
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/
Dp5_pbev2.c78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
247 if (!kdf->prf) in PKCS5_pbkdf2_set()
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
/external/wpa_supplicant_8/src/crypto/
DMakefile42 sha1-prf.o \
46 sha256-prf.o \
/external/chromium/crypto/
Dsymmetric_key_win.cc402 ScopedHCRYPTHASH prf; in DeriveKeyFromPassword() local
403 if (!CreateHMACHash(provider, password_as_key, CALG_SHA1, &prf)) in DeriveKeyFromPassword()
408 ok = CryptGetHashParam(prf, HP_HASHSIZE, in DeriveKeyFromPassword()
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
/external/chromium_org/crypto/
Dsymmetric_key_win.cc402 ScopedHCRYPTHASH prf; in DeriveKeyFromPassword() local
403 if (!CreateHMACHash(provider, password_as_key, CALG_SHA1, &prf)) in DeriveKeyFromPassword()
408 ok = CryptGetHashParam(prf, HP_HASHSIZE, in DeriveKeyFromPassword()
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
/external/chromium_org/third_party/openssl/openssl/crypto/evp/
Dp5_crpt2.c277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
/external/openssl/crypto/evp/
Dp5_crpt2.c277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/r200/
Dr200_context.h511 struct radeon_state_atom prf; member
/external/mesa3d/src/mesa/drivers/dri/r200/
Dr200_context.h511 struct radeon_state_atom prf; member
Dr200_state_init.c744 ALLOC_STATE( prf, always, PRF_STATE_SIZE, "PRF/performance-tri", 0 ); in r200InitState()
814 rmesa->hw.prf.cmd[PRF_CMD_0] = cmdpkt(rmesa, R200_EMIT_PP_TRI_PERF_CNTL); in r200InitState()
980 rmesa->hw.prf.cmd[PRF_PP_TRI_PERF] = R200_TRI_CUTOFF_MASK - R200_TRI_CUTOFF_MASK * in r200InitState()
982 rmesa->hw.prf.cmd[PRF_PP_PERF_CNTL] = 0; in r200InitState()

12