/external/e2fsprogs/e2fsck/ |
profile.c | 206 (prf_file_t prf); 387 prf_file_t prf; local 396 for (prf = profile->first_file; prf; prf = prf->next) { 397 if (strcmp(prf->filespec, default_filename) == 0) 400 if (!prf) 403 if (prf->root) { 404 profile_free_node(prf->root) 458 prf_file_t prf; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 441 const struct ikev2_prf_alg *prf; local 444 prf = ikev2_get_prf(prf_alg); 446 shared_secret == NULL || nonce == NULL || prf == NULL) 449 /* prf(SK_pi/r,IDi/r') */ 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 463 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') * [all...] |
eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
ikev2_common.h | 14 * key size of the negotiated PRF. 332 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf = transform_id 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
eap_server_ikev2.c | 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
eap_server_pwd.c | 583 (id->prf != EAP_PWD_DEFAULT_PRF)) { 745 /* build up the ciphersuite: group | random_function | prf */
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 89 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 124 skeyseed, prf->hash_len); 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->prf = transform_id; 344 prop.prf = -1 574 const struct ikev2_prf_alg *prf; local 1032 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
eap_ikev2.c | 118 data->ikev2.proposal.prf, &data->ikev2.keys,
|
eap_pwd.c | 205 (id->prf != EAP_PWD_DEFAULT_PRF)) { 471 * prf
|
/external/wpa_supplicant_8/src/crypto/ |
Makefile | 42 sha1-prf.o \ 46 sha256-prf.o \
|
/external/clang/utils/TableGen/ |
OptParserEmitter.cpp | 124 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 125 PrefixKeyT prfkey(prf.begin(), prf.end()); 214 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 215 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/external/llvm/utils/TableGen/ |
OptParserEmitter.cpp | 120 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 121 PrefixKeyT prfkey(prf.begin(), prf.end()); 205 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 206 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 86 * Extended version to allow application supplied PRF NID and IV. 127 /* Dummy cipherinit to just setup the IV, and PRF */ 136 /* If prf NID unspecified see if cipher has a preference. 137 * An error is OK here: just means use default PRF. 243 /* prf can stay NULL if we are using hmacWithSHA1 */ 246 kdf->prf = X509_ALGOR_new(); 247 if (!kdf->prf) 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
|
/external/chromium/crypto/ |
symmetric_key_win.cc | 233 // specified |block_index| using the PRF |hash|, writing the output to 235 // |output_buf| must have enough space to accomodate the output of the PRF 246 // c iterates of the underlying pseudorandom function PRF applied to the 250 // U_1 = PRF(P, S || INT (i)) 251 // U_2 = PRF(P, U_1) 253 // U_c = PRF(P, U_{c-1}) 259 // Iteration U_1: Compute PRF for S. 280 // Iteration 2 - c: Compute U_{iteration} by applying the PRF to 362 // supported as the PRF. 390 // Convert the user password into a key suitable to be fed into the PRF [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 277 if (kdf->prf) 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
|
/external/wpa_supplicant_8/hostapd/ |
Android.mk | 712 SHA1OBJS += src/crypto/sha1-prf.c 764 OBJS += src/crypto/sha256-prf.c
|
Makefile | 663 SHA1OBJS += ../src/crypto/sha1-prf.o 715 OBJS += ../src/crypto/sha256-prf.o
|
/external/wpa_supplicant_8/wpa_supplicant/ |
Makefile | 1117 SHA1OBJS += ../src/crypto/sha1-prf.o 1175 SHA256OBJS += ../src/crypto/sha256-prf.o [all...] |
/external/openssl/crypto/x509/ |
x509.h | 576 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st [all...] |
/external/openssl/include/openssl/ |
x509.h | 576 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st [all...] |