HomeSort by relevance Sort by last modified time
    Searched refs:prf (Results 1 - 25 of 43) sorted by null

1 2

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 10 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2.
17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
26 * @param prf identifier and parameters for the PRF algorithm to use.
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
32 this.prf = prf;
36 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise.
38 * @return true if this spec uses the default PRF, false otherwise.
42 return defaultPRF.equals(prf);
    [all...]
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 11 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2.
19 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
28 * @param prf identifier and parameters for the PRF algorithm to use.
30 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
34 this.prf = prf;
38 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise.
40 * @return true if this spec uses the default PRF, false otherwise.
44 return defaultPRF.equals(prf);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBKDF2Params.java 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
96 * @param prf the pseudo-random function to use.
102 AlgorithmIdentifier prf)
116 this.prf = prf;
120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
    [all...]
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/
PBKDF2Params.java 28 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
40 private final AlgorithmIdentifier prf; field in class:PBKDF2Params
65 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
78 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
98 * @param prf the pseudo-random function to use.
104 AlgorithmIdentifier prf)
118 this.prf = prf;
122 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.h 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_eke_common.c 121 static int eap_eke_prf_len(u8 prf)
123 if (prf == EAP_EKE_PRF_HMAC_SHA1)
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
131 static int eap_eke_nonce_len(u8 prf)
135 prf_len = eap_eke_prf_len(prf);
146 static int eap_eke_auth_len(u8 prf)
148 switch (prf) {
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data,
199 if (prf == EAP_EKE_PRF_HMAC_SHA1)
201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256
    [all...]
ikev2_common.c 122 const struct ikev2_prf_alg *prf; local
125 prf = ikev2_get_prf(alg);
126 if (prf == NULL)
128 hash_len = prf->hash_len;
379 const struct ikev2_prf_alg *prf; local
382 prf = ikev2_get_prf(prf_alg);
384 shared_secret == NULL || nonce == NULL || prf == NULL)
387 /* prf(SK_pi/r,IDi/r') */
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
401 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
eap_ikev2_common.c 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
eap_eke_common.h 65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
eap_pwd_common.h 43 u8 prf; member in struct:eap_pwd_id
  /external/scapy/scapy/layers/tls/crypto/
prf.py 69 ### PRF functions, according to the protocol version
89 Provides the implementation of SSLv3 PRF function:
91 SSLv3-PRF(secret, seed) =
119 Provides the implementation of TLS PRF function as defined in
122 PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR
130 depending on the use of the generated PRF keystream
145 Provides the implementation of TLS 1.2 PRF function as
148 PRF(secret, label, seed) = P_SHA256(secret, label + seed)
155 depending on the use of the generated PRF keystream
168 class PRF(object)
    [all...]
  /external/e2fsprogs/lib/support/
profile.c 208 (prf_file_t prf);
395 prf_file_t prf; local
404 for (prf = profile->first_file; prf; prf = prf->next) {
405 if (strcmp(prf->filespec, default_filename) == 0)
408 if (!prf)
411 if (prf->root) {
412 profile_free_node(prf->root)
466 prf_file_t prf; local
    [all...]
  /external/cldr/tools/java/org/unicode/cldr/tool/
PluralRulesFactory.java 46 PluralRulesFactory prf = singletons.get(key); local
47 if (prf == null) {
50 prf = new PluralRulesFactoryVanilla(supplementalDataInfo);
53 // prf = new PluralRulesFactoryWithOverrides(supplementalDataInfo);
58 singletons.put(key, prf);
60 return prf;
    [all...]
GeneratePluralConfirmation.java 37 private static final PluralRulesFactory prf = PluralRulesFactory.getInstance(SUPPLEMENTAL); field in class:GeneratePluralConfirmation
40 for (String uLocale : new TreeSet<>(prf.getLocales())) {
43 String pattern = prf.getSamplePattern(uLocale, type, count);
74 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count);
84 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, Count.other);
90 String pat = prf.getSamplePattern(loc, ICU_ORDINAL, count);
188 String pattern = prf.getSamplePattern(locale, type.standardType, count);
  /external/wpa_supplicant_8/src/crypto/
Makefile 47 sha1-prf.o \
51 sha256-prf.o \
55 sha384-prf.o \
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 41 const struct ikev2_prf_alg *prf; local
50 prf = ikev2_get_prf(data->proposal.prf);
52 if (integ == NULL || prf == NULL || encr == NULL) {
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
111 skeyseed, prf->hash_len);
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
190 transform_id == data->proposal.prf)
191 prop->prf = transform_id
607 const struct ikev2_prf_alg *prf; local
1050 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 37 const struct ikev2_prf_alg *prf; local
46 prf = ikev2_get_prf(data->proposal.prf);
48 if (integ == NULL || prf == NULL || encr == NULL) {
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
107 skeyseed, prf->hash_len);
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
184 prop->prf = transform_id;
318 prop.prf = -1
539 const struct ikev2_prf_alg *prf; local
984 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
  /external/llvm/utils/TableGen/
OptParserEmitter.cpp 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
126 PrefixKeyT prfkey(prf.begin(), prf.end());
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/
hashlib.py 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
  /external/python/cpython2/Lib/
hashlib.py 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
  /external/swiftshader/third_party/llvm-7.0/llvm/utils/TableGen/
OptParserEmitter.cpp 127 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local
128 PrefixKeyT prfkey(prf.begin(), prf.end());
215 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local
216 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /external/boringssl/src/crypto/pkcs8/
p5_pbev2.c 193 // Omit the PRF. We use the default hmacWithSHA1.
268 CBS alg_id, prf; local
270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) ||
278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {
  /external/python/cpython3/Lib/
hashlib.py 201 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
221 prev = prf(salt + loop.to_bytes(4, 'big'))
225 prev = prf(prev)

Completed in 1009 milliseconds

1 2