Searched refs:PRF (Results 1 – 16 of 16) sorted by relevance
/external/chromium_org/third_party/lzma_sdk/ |
D | Lzma2Dec.c | 42 #define PRF(x) x macro 44 #define PRF(x) macro 104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState() 105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState() 125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState() 135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
|
/external/lzma/C/ |
D | Lzma2Dec.c | 42 #define PRF(x) x macro 44 #define PRF(x) macro 104 PRF(printf("\n %4X ", p->decoder.dicPos)); in Lzma2Dec_UpdateState() 105 PRF(printf(" %2X", b)); in Lzma2Dec_UpdateState() 125 PRF(printf(" %8d", p->unpackSize)); in Lzma2Dec_UpdateState() 135 PRF(printf(" %8d", p->packSize)); in Lzma2Dec_UpdateState()
|
D | Lzma2Enc.c | 34 #define PRF(x) /* x */ macro 91 PRF(printf("\npackSize = %7d unpackSize = %7d ", packSize, unpackSize)); in Lzma2EncInt_EncodeSubblock() 109 PRF(printf("################# COPY ")); in Lzma2EncInt_EncodeSubblock() 142 PRF(printf(" ")); in Lzma2EncInt_EncodeSubblock()
|
/external/chromium_org/third_party/tlslite/tlslite/ |
D | mathtls.py | 37 def PRF(secret, label, seed, length): function 72 masterSecret = PRF(premasterSecret, b"master secret",
|
D | tlsrecordlayer.py | 1098 keyBlock = PRF(masterSecret,
|
D | tlsconnection.py | 1910 verifyData = PRF(masterSecret, label, handshakeHashes, 12)
|
/external/chromium_org/third_party/libsrtp/srtp/ |
D | TODO | 36 use of the PRF has been implemented, as it's sufficient
|
/external/srtp/ |
D | TODO | 36 use of the PRF has been implemented, as it's sufficient
|
/external/chromium_org/net/third_party/nss/patches/ |
D | fallbackscsv.patch | 120 @@ -183,6 +183,8 @@ SSL_IMPORT PRFileDesc *DTLS_ImportFD(PRF
|
D | signedcertificatetimestamps.patch | 142 @@ -181,6 +181,9 @@ SSL_IMPORT PRFileDesc *DTLS_ImportFD(PRF
|
D | channelid.patch | 542 + * SHA-1/MD5 combination (for TLS < 1.2) or the TLS PRF hash (for
|
/external/chromium_org/third_party/libsrtp/srtp/doc/ |
D | rfc3711.txt | 73 4.3.3. AES-CM PRF . . . . . . . . . . . . . . . . . . . 28 77 5.3. Key Derivation: AES-CM PRF . . . . . . . . . . . . . . . 29 1450 [HAC]. For the purpose of key derivation in SRTP, a secure PRF with 1451 m = 128 (or more) MUST be used, and a default PRF transform is 1489 (The PRF may internally specify additional formatting and padding of 1490 x, see e.g., Section 4.3.3 for the default PRF.) 1540 4.3.3. AES-CM PRF 1542 The currently defined PRF, keyed by 128, 192, or 256 bit master key, 1560 key derivation (PRF) AES-CM - AES-CM 1596 5.3. Key Derivation: AES-CM PRF [all …]
|
/external/srtp/doc/ |
D | rfc3711.txt | 73 4.3.3. AES-CM PRF . . . . . . . . . . . . . . . . . . . 28 77 5.3. Key Derivation: AES-CM PRF . . . . . . . . . . . . . . . 29 1450 [HAC]. For the purpose of key derivation in SRTP, a secure PRF with 1451 m = 128 (or more) MUST be used, and a default PRF transform is 1489 (The PRF may internally specify additional formatting and padding of 1490 x, see e.g., Section 4.3.3 for the default PRF.) 1540 4.3.3. AES-CM PRF 1542 The currently defined PRF, keyed by 128, 192, or 256 bit master key, 1560 key derivation (PRF) AES-CM - AES-CM 1596 5.3. Key Derivation: AES-CM PRF [all …]
|
/external/openssl/crypto/objects/ |
D | objects.txt | 1174 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
|
/external/chromium_org/third_party/boringssl/src/crypto/obj/ |
D | objects.txt | 1175 cryptopro 23 : prf-gostr3411-94 : GOST R 34.11-94 PRF
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 1028 * fixed PeerKey key derivation to use the correct PRF label
|