HomeSort by relevance Sort by last modified time
    Searched refs:prf (Results 1 - 25 of 25) sorted by null

  /external/e2fsprogs/e2fsck/
profile.c 206 (prf_file_t prf);
387 prf_file_t prf; local
396 for (prf = profile->first_file; prf; prf = prf->next) {
397 if (strcmp(prf->filespec, default_filename) == 0)
400 if (!prf)
403 if (prf->root) {
404 profile_free_node(prf->root)
458 prf_file_t prf; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.h 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_ikev2_common.c 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
ikev2_common.c 123 const struct ikev2_prf_alg *prf; local
126 prf = ikev2_get_prf(alg);
127 if (prf == NULL)
129 hash_len = prf->hash_len;
441 const struct ikev2_prf_alg *prf; local
444 prf = ikev2_get_prf(prf_alg);
446 shared_secret == NULL || nonce == NULL || prf == NULL)
449 /* prf(SK_pi/r,IDi/r') */
456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
463 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
eap_pwd_common.h 49 u8 prf; member in struct:eap_pwd_id
ikev2_common.h 14 * key size of the negotiated PRF.
332 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 41 const struct ikev2_prf_alg *prf; local
50 prf = ikev2_get_prf(data->proposal.prf);
52 if (integ == NULL || prf == NULL || encr == NULL) {
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
111 skeyseed, prf->hash_len);
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
190 transform_id == data->proposal.prf)
191 prop->prf = transform_id
608 const struct ikev2_prf_alg *prf; local
1051 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
eap_server_ikev2.c 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
328 data->ikev2.proposal.prf, &data->ikev2.keys,
eap_server_pwd.c 583 (id->prf != EAP_PWD_DEFAULT_PRF)) {
745 /* build up the ciphersuite: group | random_function | prf */
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 37 const struct ikev2_prf_alg *prf; local
46 prf = ikev2_get_prf(data->proposal.prf);
48 if (integ == NULL || prf == NULL || encr == NULL) {
89 /* SKEYSEED = prf(Ni | Nr, g^ir) */
107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
124 skeyseed, prf->hash_len);
126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
210 prop->prf = transform_id;
344 prop.prf = -1
574 const struct ikev2_prf_alg *prf; local
1032 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
eap_ikev2.c 118 data->ikev2.proposal.prf, &data->ikev2.keys,
eap_pwd.c 205 (id->prf != EAP_PWD_DEFAULT_PRF)) {
471 * prf
  /external/wpa_supplicant_8/src/crypto/
Makefile 42 sha1-prf.o \
46 sha256-prf.o \
  /external/clang/utils/TableGen/
OptParserEmitter.cpp 124 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
125 PrefixKeyT prfkey(prf.begin(), prf.end());
214 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
215 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /external/llvm/utils/TableGen/
OptParserEmitter.cpp 120 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
121 PrefixKeyT prfkey(prf.begin(), prf.end());
205 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
206 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /external/openssl/crypto/asn1/
p5_pbev2.c 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR)
86 * Extended version to allow application supplied PRF NID and IV.
127 /* Dummy cipherinit to just setup the IV, and PRF */
136 /* If prf NID unspecified see if cipher has a preference.
137 * An error is OK here: just means use default PRF.
243 /* prf can stay NULL if we are using hmacWithSHA1 */
246 kdf->prf = X509_ALGOR_new();
247 if (!kdf->prf)
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
  /external/chromium/crypto/
symmetric_key_win.cc 233 // specified |block_index| using the PRF |hash|, writing the output to
235 // |output_buf| must have enough space to accomodate the output of the PRF
246 // c iterates of the underlying pseudorandom function PRF applied to the
250 // U_1 = PRF(P, S || INT (i))
251 // U_2 = PRF(P, U_1)
253 // U_c = PRF(P, U_{c-1})
259 // Iteration U_1: Compute PRF for S.
280 // Iteration 2 - c: Compute U_{iteration} by applying the PRF to
362 // supported as the PRF.
390 // Convert the user password into a key suitable to be fed into the PRF
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 277 if (kdf->prf)
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
  /external/wpa_supplicant_8/hostapd/
Android.mk 712 SHA1OBJS += src/crypto/sha1-prf.c
764 OBJS += src/crypto/sha256-prf.c
Makefile 663 SHA1OBJS += ../src/crypto/sha1-prf.o
715 OBJS += ../src/crypto/sha256-prf.o
  /external/wpa_supplicant_8/wpa_supplicant/
Makefile 1117 SHA1OBJS += ../src/crypto/sha1-prf.o
1175 SHA256OBJS += ../src/crypto/sha256-prf.o
    [all...]
  /external/openssl/crypto/x509/
x509.h 576 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
    [all...]
  /external/openssl/include/openssl/
x509.h 576 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
    [all...]

Completed in 320 milliseconds