HomeSort by relevance Sort by last modified time
    Searched refs:prf (Results 1 - 25 of 29) sorted by null

1 2

  /external/e2fsprogs/e2fsck/
profile.c 206 (prf_file_t prf);
387 prf_file_t prf; local
396 for (prf = profile->first_file; prf; prf = prf->next) {
397 if (strcmp(prf->filespec, default_filename) == 0)
400 if (!prf)
403 if (prf->root) {
404 profile_free_node(prf->root)
458 prf_file_t prf; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ikev2_common.h 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_ikev2_common.c 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
32 /* KEYMAT = prf+(SK_d, Ni | Nr) */
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
ikev2_common.c 128 const struct ikev2_prf_alg *prf; local
131 prf = ikev2_get_prf(alg);
132 if (prf == NULL)
134 hash_len = prf->hash_len;
446 const struct ikev2_prf_alg *prf; local
449 prf = ikev2_get_prf(prf_alg);
451 shared_secret == NULL || nonce == NULL || prf == NULL)
454 /* prf(SK_pi/r,IDi/r') */
461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
ikev2_common.h 20 * key size of the negotiated PRF.
338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.h 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_ikev2_common.c 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
32 /* KEYMAT = prf+(SK_d, Ni | Nr) */
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
ikev2_common.c 129 const struct ikev2_prf_alg *prf; local
132 prf = ikev2_get_prf(alg);
133 if (prf == NULL)
135 hash_len = prf->hash_len;
447 const struct ikev2_prf_alg *prf; local
450 prf = ikev2_get_prf(prf_alg);
452 shared_secret == NULL || nonce == NULL || prf == NULL)
455 /* prf(SK_pi/r,IDi/r') */
462 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
469 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
eap_pwd_common.h 61 u8 prf; member in struct:eap_pwd_id
ikev2_common.h 20 * key size of the negotiated PRF.
338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 46 const struct ikev2_prf_alg *prf; local
55 prf = ikev2_get_prf(data->proposal.prf);
57 if (integ == NULL || prf == NULL || encr == NULL) {
85 /* SKEYSEED = prf(Ni | Nr, g^ir) */
99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
116 skeyseed, prf->hash_len);
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
195 transform_id == data->proposal.prf)
196 prop->prf = transform_id
613 const struct ikev2_prf_alg *prf; local
1056 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
333 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 47 const struct ikev2_prf_alg *prf; local
56 prf = ikev2_get_prf(data->proposal.prf);
58 if (integ == NULL || prf == NULL || encr == NULL) {
86 /* SKEYSEED = prf(Ni | Nr, g^ir) */
100 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
117 skeyseed, prf->hash_len);
119 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
196 transform_id == data->proposal.prf)
197 prop->prf = transform_id
614 const struct ikev2_prf_alg *prf; local
1057 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_server_ikev2.c 108 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
334 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 42 const struct ikev2_prf_alg *prf; local
51 prf = ikev2_get_prf(data->proposal.prf);
53 if (integ == NULL || prf == NULL || encr == NULL) {
94 /* SKEYSEED = prf(Ni | Nr, g^ir) */
112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
129 skeyseed, prf->hash_len);
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
215 prop->prf = transform_id;
349 prop.prf = -1
579 const struct ikev2_prf_alg *prf; local
1037 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 124 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 43 const struct ikev2_prf_alg *prf; local
52 prf = ikev2_get_prf(data->proposal.prf);
54 if (integ == NULL || prf == NULL || encr == NULL) {
95 /* SKEYSEED = prf(Ni | Nr, g^ir) */
113 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
130 skeyseed, prf->hash_len);
132 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
216 prop->prf = transform_id;
350 prop.prf = -1
580 const struct ikev2_prf_alg *prf; local
1038 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 23 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 124 data->ikev2.proposal.prf, &data->ikev2.keys,
  /external/openssl/crypto/asn1/
p5_pbev2.c 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
86 * Extended version to allow application supplied PRF NID and IV.
129 /* Dummy cipherinit to just setup the IV, and PRF */
137 /* If prf NID unspecified see if cipher has a preference.
138 * An error is OK here: just means use default PRF.
173 /* prf can stay NULL if we are using hmacWithSHA1 */
176 kdf->prf = X509_ALGOR_new();
177 if (!kdf->prf)
179 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
  /external/chromium/crypto/
symmetric_key_win.cc 233 // specified |block_index| using the PRF |hash|, writing the output to
235 // |output_buf| must have enough space to accomodate the output of the PRF
246 // c iterates of the underlying pseudorandom function PRF applied to the
250 // U_1 = PRF(P, S || INT (i))
251 // U_2 = PRF(P, U_1)
253 // U_c = PRF(P, U_{c-1})
259 // Iteration U_1: Compute PRF for S.
280 // Iteration 2 - c: Compute U_{iteration} by applying the PRF to
362 // supported as the PRF.
390 // Convert the user password into a key suitable to be fed into the PRF
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 250 if (kdf->prf)
251 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);

Completed in 406 milliseconds

1 2