HomeSort by relevance Sort by last modified time
    Searched refs:prf (Results 1 - 15 of 15) sorted by null

  /external/e2fsprogs/e2fsck/
profile.c 206 (prf_file_t prf);
387 prf_file_t prf; local
396 for (prf = profile->first_file; prf; prf = prf->next) {
397 if (strcmp(prf->filespec, default_filename) == 0)
400 if (!prf)
403 if (prf->root) {
404 profile_free_node(prf->root)
458 prf_file_t prf; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ikev2_common.h 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_ikev2_common.c 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
32 /* KEYMAT = prf+(SK_d, Ni | Nr) */
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
ikev2_common.c 128 const struct ikev2_prf_alg *prf; local
131 prf = ikev2_get_prf(alg);
132 if (prf == NULL)
134 hash_len = prf->hash_len;
446 const struct ikev2_prf_alg *prf; local
449 prf = ikev2_get_prf(prf_alg);
451 shared_secret == NULL || nonce == NULL || prf == NULL)
454 /* prf(SK_pi/r,IDi/r') */
461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
ikev2_common.h 20 * key size of the negotiated PRF.
338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 46 const struct ikev2_prf_alg *prf; local
55 prf = ikev2_get_prf(data->proposal.prf);
57 if (integ == NULL || prf == NULL || encr == NULL) {
85 /* SKEYSEED = prf(Ni | Nr, g^ir) */
99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
116 skeyseed, prf->hash_len);
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
195 transform_id == data->proposal.prf)
196 prop->prf = transform_id
613 const struct ikev2_prf_alg *prf; local
1056 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
333 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 42 const struct ikev2_prf_alg *prf; local
51 prf = ikev2_get_prf(data->proposal.prf);
53 if (integ == NULL || prf == NULL || encr == NULL) {
94 /* SKEYSEED = prf(Ni | Nr, g^ir) */
112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
129 skeyseed, prf->hash_len);
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
215 prop->prf = transform_id;
349 prop.prf = -1
579 const struct ikev2_prf_alg *prf; local
1037 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 124 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/openssl/crypto/asn1/
p5_pbev2.c 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
86 * Extended version to allow application supplied PRF NID and IV.
129 /* Dummy cipherinit to just setup the IV, and PRF */
137 /* If prf NID unspecified see if cipher has a preference.
138 * An error is OK here: just means use default PRF.
173 /* prf can stay NULL if we are using hmacWithSHA1 */
176 kdf->prf = X509_ALGOR_new();
177 if (!kdf->prf)
179 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
  /external/openssl/crypto/evp/
p5_crpt2.c 250 if (kdf->prf)
251 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
  /external/openssl/crypto/x509/
x509.h 575 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
    [all...]
  /external/openssl/include/openssl/
x509.h 575 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
    [all...]

Completed in 151 milliseconds