/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
PasswordRecipient.java | 13 static final class PRF 15 public static final PRF HMacSHA1 = new PRF("HMacSHA1", new AlgorithmIdentifier(PKCSObjectIdentifiers.id_hmacWithSHA1, DERNull.INSTANCE)); 16 public static final PRF HMacSHA224 = new PRF("HMacSHA224", new AlgorithmIdentifier(PKCSObjectIdentifiers.id_hmacWithSHA224, DERNull.INSTANCE)); 17 public static final PRF HMacSHA256 = new PRF("HMacSHA256", new AlgorithmIdentifier(PKCSObjectIdentifiers.id_hmacWithSHA256, DERNull.INSTANCE)); 18 public static final PRF HMacSHA384 = new PRF("HMacSHA384", new AlgorithmIdentifier(PKCSObjectIdentifiers.id_hmacWithSHA384, DERNull.INSTANCE)); 19 public static final PRF HMacSHA512 = new PRF("HMacSHA512", new AlgorithmIdentifier(PKCSObjectIdentifiers.id_hmacWithSHA512 (…) [all...] |
/external/cn-cbor/test/ |
test.c | 50 #define PRF(f, a) out += sprintf(out, f, a) 56 case CN_CBOR_TAG: PRF("%ld(\n", cb->v.sint); goto sequence; 68 PRF("%02x", cb->v.str[i] & 0xff); 79 case CN_CBOR_INT: PRF("%ld", cb->v.sint); break; 80 case CN_CBOR_UINT: PRF("%lu", cb->v.uint); break; 81 case CN_CBOR_DOUBLE: PRF("%e", cb->v.dbl); break; 82 case CN_CBOR_SIMPLE: PRF("simple(%ld)", cb->v.sint); break; 83 default: PRF("???%d???", cb->type); break;
|
/external/lzma/C/ |
Bcj2Enc.c | 10 #define PRF(x) x
12 #define PRF(x)
246 PRF(printf("\n"));
247 PRF(printf("---- ip = %8d tempPos = %8d src = %8d\n", p->ip, p->tempPos, p->srcLim - p->src));
264 PRF(printf(" ip = %8d tempPos = %8d src = %8d\n", p->ip, p->tempPos, p->srcLim - p->src));
298 PRF(printf("++++ ip = %8d tempPos = %8d src = %8d\n", p->ip, p->tempPos, p->srcLim - p->src));
|
Lzma2Dec.c | 44 #define PRF(x) x
46 #define PRF(x)
106 PRF(printf("\n %4X ", (unsigned)p->decoder.dicPos));
107 PRF(printf(" %2X", (unsigned)b));
127 PRF(printf(" %8u", (unsigned)p->unpackSize));
137 PRF(printf(" %8u", (unsigned)p->packSize));
|
Lzma2Enc.c | 36 #define PRF(x) /* x */
93 PRF(printf("\npackSize = %7d unpackSize = %7d ", packSize, unpackSize));
111 PRF(printf("################# COPY "));
148 PRF(printf(" "));
|
/kernel/tests/net/test/ |
multinetwork_test.py | 601 def SendRIO(self, rtlifetime, plen, prefix, prf): 603 prefix=prefix, prf=prf) 663 PRF = 0 665 self.SendRIO(RTLIFETIME, PLEN, PREFIX, PRF) 670 self.SendRIO(0, PLEN, PREFIX, PRF) 678 PRF = 0 683 self.SendRIO(RTLIFETIME, plen - 1, PREFIX, PRF) 693 PRF = 0 698 self.SendRIO(RTLIFETIME, plen + 1, PREFIX, PRF) [all...] |
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 69 ### PRF functions, according to the protocol version 89 Provides the implementation of SSLv3 PRF function: 91 SSLv3-PRF(secret, seed) = 119 Provides the implementation of TLS PRF function as defined in 122 PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR 130 depending on the use of the generated PRF keystream 145 Provides the implementation of TLS 1.2 PRF function as 148 PRF(secret, label, seed) = P_SHA256(secret, label + seed) 155 depending on the use of the generated PRF keystream 168 class PRF(object) [all...] |
/external/scapy/scapy/layers/tls/ |
session.py | 22 from scapy.layers.tls.crypto.prf import PRF 112 self.prf = PRF(ciphersuite.hash_alg.name, tls_version) 132 key_block = self.prf.derive_key_block(master_secret, 166 cipher_secret = self.prf.postprocess_key_for_export(cipher_secret, 203 iv = self.prf.generate_iv_for_export(client_random, 530 ms = self.pwcs.prf.compute_master_secret(self.pre_master_secret, 557 km = self.pwcs.prf.derive_key_block(self.master_secret, [all...] |
/external/lzma/CPP/7zip/UI/Common/ |
OpenArchive.cpp | 36 #define PRF(x) x
38 #define PRF(x)
[all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
prf.go | 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128 138 prf, _ := prfAndHashForVersion(version, suite) 139 return prf 202 prf, hash := prfAndHashForVersion(version, cipherSuite) 204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf} 207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf} 224 prf func(result, secret, label, seed []byte) 296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) 308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
prf.go | 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128 138 prf, _ := prfAndHashForVersion(version, suite) 139 return prf 202 prf, hash := prfAndHashForVersion(version, cipherSuite) 204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf} 207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf} 224 prf func(result, secret, label, seed []byte) 296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) 308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
|
/external/boringssl/src/ssl/test/runner/ |
prf.go | 86 // RFC5246 section 6.3 says that the largest PRF output needed is 128 198 ret.prf = prf12(ret.hash.New) 210 ret.prf = prf10 237 prf func(result, secret, label, seed []byte) 327 h.prf(out, baseKey, clientFinishedLabel, h.Sum()) 346 h.prf(out, baseKey, serverFinishedLabel, h.Sum())
|
handshake_client.go | 732 // Once the PRF hash is known, TLS 1.3 does not require a handshake [all...] |
runner.go | [all...] |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/ |
jsse.jar | |
/prebuilts/jdk/jdk8/linux-x86/jre/lib/ |
jsse.jar | |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_darwin_armx.go | [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_darwin_armx.go | [all...] |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.56/ |
bcpkix-jdk15on-1.56.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.56/ |
bcprov-jdk15on-1.56.jar | |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/misc/common/robolectric/3.1.1/lib/ |
bcprov-jdk16-1.46.jar | |
/prebuilts/misc/common/robolectric/3.4.2/lib/ |
bcprov-jdk16-1.46.jar | |
/prebuilts/misc/common/robolectric/3.5.1/lib/ |
bcprov-jdk15on-1.52.jar | |