Home
last modified time | relevance | path

Searched refs:prf (Results 1 – 25 of 38) sorted by relevance

12

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
DPBKDF2Params.java38 private final AlgorithmIdentifier prf; field in PBKDF2Params
102 AlgorithmIdentifier prf) in PBKDF2Params() argument
116 this.prf = prf; in PBKDF2Params()
129 AlgorithmIdentifier prf) in PBKDF2Params() argument
131 this(salt, iterationCount, 0, prf); in PBKDF2Params()
165 prf = AlgorithmIdentifier.getInstance(o); in PBKDF2Params()
169 prf = null; in PBKDF2Params()
175 prf = null; in PBKDF2Params()
221 return prf == null || prf.equals(algid_hmacWithSHA1); in isDefaultPrf()
231 if (prf != null) in getPrf()
[all …]
/external/e2fsprogs/e2fsck/
Dprofile.c206 (prf_file_t prf);
392 prf_file_t prf; in profile_set_default() local
401 for (prf = profile->first_file; prf; prf = prf->next) { in profile_set_default()
402 if (strcmp(prf->filespec, default_filename) == 0) in profile_set_default()
405 if (!prf) in profile_set_default()
408 if (prf->root) { in profile_set_default()
409 profile_free_node(prf->root); in profile_set_default()
410 prf->root = 0; in profile_set_default()
439 (syntax_err_cb)(prf->filespec, retval, in profile_set_default()
442 if (prf->root) in profile_set_default()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
DPBKDF2KeySpec.java13 private AlgorithmIdentifier prf; field in PBKDF2KeySpec
24 …KDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) in PBKDF2KeySpec() argument
28 this.prf = prf; in PBKDF2KeySpec()
33 return prf; in getPrf()
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
148 switch (prf) { in eap_eke_auth_len()
206 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
222 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
224 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf()
[all …]
Dikev2_common.c122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
126 if (prf == NULL) in ikev2_prf_plus()
128 hash_len = prf->hash_len; in ikev2_prf_plus()
379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
Deap_pwd_common.h49 u8 prf; member
/external/libedit/src/
Dprompt.c149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) in prompt_set() argument
158 if (prf == NULL) { in prompt_set()
164 p->p_func = prf; in prompt_set()
181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) in prompt_get() argument
185 if (prf == NULL) in prompt_get()
193 if (prf) in prompt_get()
194 *prf = p->p_func; in prompt_get()
/external/tcpdump/tests/
Dikev2pI2.out7 (t: #3 type=prf id=hmac-sha )
12 (t: #3 type=prf id=hmac-md5 )
17 (t: #3 type=prf id=hmac-sha )
22 (t: #3 type=prf id=hmac-md5 )
27 (t: #3 type=prf id=hmac-sha )
32 (t: #3 type=prf id=hmac-md5 )
Dikev2four.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
11 (t: #7 type=prf id=aes128_xcbc )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
35 (t: #7 type=prf id=aes128_xcbc )
50 (t: #2 type=prf id=hmac-sha )
Dikev2fourv.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
11 (t: #7 type=prf id=aes128_xcbc )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
35 (t: #7 type=prf id=aes128_xcbc )
50 (t: #2 type=prf id=hmac-sha )
Dikev2fourv4.out9 (t: #5 type=prf id=hmac-sha )
10 (t: #6 type=prf id=hmac-md5 )
11 (t: #7 type=prf id=aes128_xcbc )
33 (t: #5 type=prf id=hmac-sha )
34 (t: #6 type=prf id=hmac-md5 )
35 (t: #7 type=prf id=aes128_xcbc )
50 (t: #2 type=prf id=hmac-sha )
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf = transform_id; in ikev2_parse_transform()
326 prop.prf = -1; in ikev2_process_sar1()
333 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sar1()
[all …]
Dikev2.h17 int prf; member
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
107 skeyseed, prf->hash_len); in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
184 prop->prf = transform_id; in ikev2_parse_transform()
318 prop.prf = -1; in ikev2_process_sai1()
325 if (!found && prop.integ != -1 && prop.prf != -1 && in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
[all …]
Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member
117 data->prf = atoi(pos + 4); in eap_eke_init()
119 data->prf); in eap_eke_init()
182 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
184 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
185 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
275 if ((data->prf && data->prf != *tmp) || in eap_eke_process_id()
Dikev2.h17 int prf; member
/external/llvm/utils/TableGen/
DOptParserEmitter.cpp125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local
126 PrefixKeyT prfkey(prf.begin(), prf.end()); in EmitOptParser()
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); in EmitOptParser() local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", "; in EmitOptParser()
/external/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c84 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
271 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
272 if (!kdf->prf) in PKCS5_pbkdf2_set()
274 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
343 if (pbkdf2param->prf != NULL && in PKCS5_v2_PBKDF2_keyivgen()
344 OBJ_obj2nid(pbkdf2param->prf->algorithm) != NID_hmacWithSHA1) { in PKCS5_v2_PBKDF2_keyivgen()
/external/wpa_supplicant_8/src/crypto/
DMakefile44 sha1-prf.o \
48 sha256-prf.o \
/external/libchrome/crypto/
Dsymmetric_key_win.cc405 ScopedHCRYPTHASH prf; in DeriveKeyFromPassword() local
406 if (!CreateHMACHash(provider, password_as_key, CALG_SHA1, &prf)) in DeriveKeyFromPassword()
411 ok = CryptGetHashParam(prf, HP_HASHSIZE, in DeriveKeyFromPassword()
447 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
/external/boringssl/src/ssl/
Dt1_enc.c264 return ssl->enc_method->prf( in tls1_generate_key_block()
530 if (!ssl->enc_method->prf(ssl, out, 12, ssl->session->master_key, in tls1_final_finish_mac()
553 if (!ssl->enc_method->prf(ssl, out, SSL3_MASTER_SECRET_SIZE, premaster, in tls1_generate_master_secret()
561 if (!ssl->enc_method->prf(ssl, out, SSL3_MASTER_SECRET_SIZE, premaster, in tls1_generate_master_secret()
604 int ret = ssl->enc_method->prf(ssl, out, out_len, ssl->session->master_key, in tls1_export_keying_material()
/external/boringssl/src/ssl/test/runner/
Dprf.go236 prf func(result, secret, label, seed []byte) member
308 h.prf(out, masterSecret, clientFinishedLabel, h.Sum())
320 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())

12