HomeSort by relevance Sort by last modified time
    Searched defs:prf (Results 1 - 19 of 19) sorted by null

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 8 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2.
13 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
22 * @param prf identifier and parameters for the PRF algorithm to use.
24 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
28 this.prf = prf;
33 return prf;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBKDF2Params.java 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
96 * @param prf the pseudo-random function to use.
102 AlgorithmIdentifier prf)
116 this.prf = prf;
120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
    [all...]
  /external/llvm/utils/TableGen/
OptParserEmitter.cpp 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
126 PrefixKeyT prfkey(prf.begin(), prf.end());
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 49 u8 prf; member in struct:eap_pwd_id
eap_eke_common.h 65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
ikev2_common.c 122 const struct ikev2_prf_alg *prf; local
125 prf = ikev2_get_prf(alg);
126 if (prf == NULL)
128 hash_len = prf->hash_len;
379 const struct ikev2_prf_alg *prf; local
382 prf = ikev2_get_prf(prf_alg);
384 shared_secret == NULL || nonce == NULL || prf == NULL)
387 /* prf(SK_pi/r,IDi/r') */
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
401 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
ikev2.c 41 const struct ikev2_prf_alg *prf; local
50 prf = ikev2_get_prf(data->proposal.prf);
52 if (integ == NULL || prf == NULL || encr == NULL) {
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
111 skeyseed, prf->hash_len);
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
190 transform_id == data->proposal.prf)
191 prop->prf = transform_id
608 const struct ikev2_prf_alg *prf; local
1051 const struct ikev2_prf_alg *prf; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
eap_eke.c 33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
115 pos = os_strstr(phase1, "prf=");
117 data->prf = atoi(pos + 4);
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
119 data->prf);
182 static int eap_eke_supp_prf(u8 prf)
184 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
185 prf == EAP_EKE_PRF_HMAC_SHA2_256;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u"
    [all...]
ikev2.c 37 const struct ikev2_prf_alg *prf; local
46 prf = ikev2_get_prf(data->proposal.prf);
48 if (integ == NULL || prf == NULL || encr == NULL) {
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
107 skeyseed, prf->hash_len);
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
184 prop->prf = transform_id;
318 prop.prf = -1
540 const struct ikev2_prf_alg *prf; local
985 const struct ikev2_prf_alg *prf; local
    [all...]
  /libcore/ojluni/src/main/java/sun/security/ssl/
CipherSuite.java 41 import static sun.security.ssl.CipherSuite.PRF.*;
106 // key exchange, bulk cipher, mac and prf algorithms. See those
111 final PRF prfAlg;
131 boolean allowed, int obsoleted, int supported, PRF prfAlg) {
263 * TLS 1.2+ that doesn't use the "default" PRF.
267 boolean allowed, int obsoleted, int supported, PRF prf) {
270 cipher, allowed, obsoleted, supported, prf);
285 * suite can be used, and the PRF is P_SHA256. That is, the
294 // protocol have a valid PRF value
295 PRF prf = P_SHA256; local
    [all...]
HandshakeMessage.java 50 import static sun.security.ssl.CipherSuite.PRF.*;
1909 PRF prf; local
    [all...]
Handshaker.java 51 import static sun.security.ssl.CipherSuite.PRF.*;
1031 PRF prf; local
1165 PRF prf; local
    [all...]
  /external/boringssl/src/ssl/
internal.h 843 int (*prf)(SSL *, uint8_t *, size_t, const uint8_t *, size_t, const char *, member in struct:ssl3_enc_method
    [all...]
  /external/e2fsprogs/e2fsck/
profile.c 206 (prf_file_t prf);
392 prf_file_t prf; local
401 for (prf = profile->first_file; prf; prf = prf->next) {
402 if (strcmp(prf->filespec, default_filename) == 0)
405 if (!prf)
408 if (prf->root) {
409 profile_free_node(prf->root)
463 prf_file_t prf; local
    [all...]
  /external/boringssl/src/include/openssl/
x509.h 527 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
    [all...]
  /external/mesa3d/src/mesa/drivers/dri/r200/
r200_context.h 511 struct radeon_state_atom prf; member in struct:r200_hw_state
  /prebuilts/sdk/tools/lib/
signapk.jar 

Completed in 1793 milliseconds