/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
PBKDF2KeySpec.java | 10 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2. 17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec 26 * @param prf identifier and parameters for the PRF algorithm to use. 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) 32 this.prf = prf; 36 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise. 38 * @return true if this spec uses the default PRF, false otherwise. 42 return defaultPRF.equals(prf); [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/spec/ |
PBKDF2KeySpec.java | 11 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2. 19 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec 28 * @param prf identifier and parameters for the PRF algorithm to use. 30 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) 34 this.prf = prf; 38 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise. 40 * @return true if this spec uses the default PRF, false otherwise. 44 return defaultPRF.equals(prf); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBKDF2Params.java | 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 } 38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params 63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 96 * @param prf the pseudo-random function to use. 102 AlgorithmIdentifier prf) 116 this.prf = prf; 120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/ |
PBKDF2Params.java | 28 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 } 40 private final AlgorithmIdentifier prf; field in class:PBKDF2Params 65 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 78 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 98 * @param prf the pseudo-random function to use. 104 AlgorithmIdentifier prf) 118 this.prf = prf; 122 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 131 static int eap_eke_nonce_len(u8 prf) 135 prf_len = eap_eke_prf_len(prf); 146 static int eap_eke_auth_len(u8 prf) 148 switch (prf) { 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) 201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256 [all...] |
ikev2_common.c | 122 const struct ikev2_prf_alg *prf; local 125 prf = ikev2_get_prf(alg); 126 if (prf == NULL) 128 hash_len = prf->hash_len; 379 const struct ikev2_prf_alg *prf; local 382 prf = ikev2_get_prf(prf_alg); 384 shared_secret == NULL || nonce == NULL || prf == NULL) 387 /* prf(SK_pi/r,IDi/r') */ 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 401 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') * [all...] |
eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
eap_pwd_common.h | 43 u8 prf; member in struct:eap_pwd_id
|
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 69 ### PRF functions, according to the protocol version 89 Provides the implementation of SSLv3 PRF function: 91 SSLv3-PRF(secret, seed) = 119 Provides the implementation of TLS PRF function as defined in 122 PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR 130 depending on the use of the generated PRF keystream 145 Provides the implementation of TLS 1.2 PRF function as 148 PRF(secret, label, seed) = P_SHA256(secret, label + seed) 155 depending on the use of the generated PRF keystream 168 class PRF(object) [all...] |
/external/e2fsprogs/lib/support/ |
profile.c | 208 (prf_file_t prf); 395 prf_file_t prf; local 404 for (prf = profile->first_file; prf; prf = prf->next) { 405 if (strcmp(prf->filespec, default_filename) == 0) 408 if (!prf) 411 if (prf->root) { 412 profile_free_node(prf->root) 466 prf_file_t prf; local [all...] |
/external/cldr/tools/java/org/unicode/cldr/tool/ |
PluralRulesFactory.java | 46 PluralRulesFactory prf = singletons.get(key); local 47 if (prf == null) { 50 prf = new PluralRulesFactoryVanilla(supplementalDataInfo); 53 // prf = new PluralRulesFactoryWithOverrides(supplementalDataInfo); 58 singletons.put(key, prf); 60 return prf; [all...] |
GeneratePluralConfirmation.java | 37 private static final PluralRulesFactory prf = PluralRulesFactory.getInstance(SUPPLEMENTAL); field in class:GeneratePluralConfirmation 40 for (String uLocale : new TreeSet<>(prf.getLocales())) { 43 String pattern = prf.getSamplePattern(uLocale, type, count); 74 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count); 84 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, Count.other); 90 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count); 188 String pattern = prf.getSamplePattern(locale, type.standardType, count);
|
/external/wpa_supplicant_8/src/crypto/ |
Makefile | 47 sha1-prf.o \ 51 sha256-prf.o \ 55 sha384-prf.o \
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf = transform_id 607 const struct ikev2_prf_alg *prf; local 1050 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf = -1 539 const struct ikev2_prf_alg *prf; local 984 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/llvm/utils/TableGen/ |
OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/ |
hashlib.py | 188 def prf(msg, inner=inner, outer=outer):
function in function:.pbkdf2_hmac 209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
|
/external/python/cpython2/Lib/ |
hashlib.py | 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac 209 prev = prf(salt + struct.pack(b'>I', loop)) 212 prev = prf(prev)
|
/external/swiftshader/third_party/llvm-7.0/llvm/utils/TableGen/ |
OptParserEmitter.cpp | 127 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local 128 PrefixKeyT prfkey(prf.begin(), prf.end()); 215 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local 216 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 193 // Omit the PRF. We use the default hmacWithSHA1. 268 CBS alg_id, prf; local 270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) || 278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {
|
/external/python/cpython3/Lib/ |
hashlib.py | 201 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac 221 prev = prf(salt + loop.to_bytes(4, 'big')) 225 prev = prf(prev)
|