/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
PBKDF2KeySpec.java | 10 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2. 17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec 26 * @param prf identifier and parameters for the PRF algorithm to use. 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) 32 this.prf = prf; 36 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise. 38 * @return true if this spec uses the default PRF, false otherwise. 42 return defaultPRF.equals(prf); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBKDF2Params.java | 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 } 38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params 63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 96 * @param prf the pseudo-random function to use. 102 AlgorithmIdentifier prf) 116 this.prf = prf; 120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf [all...] |
/external/libedit/src/ |
prompt.c | 149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) 158 if (prf == NULL) { 164 p->p_func = prf; 181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) 185 if (prf == NULL) 193 if (prf) 194 *prf = p->p_func;
|
/external/syslinux/gpxe/src/include/gpxe/ |
sha1.h | 18 const void *data, size_t data_len, void *prf, size_t prf_len );
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 131 static int eap_eke_nonce_len(u8 prf) 135 prf_len = eap_eke_prf_len(prf); 146 static int eap_eke_auth_len(u8 prf) 148 switch (prf) { 206 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, 222 if (prf == EAP_EKE_PRF_HMAC_SHA1) 224 if (prf == EAP_EKE_PRF_HMAC_SHA2_256 [all...] |
ikev2_common.c | 122 const struct ikev2_prf_alg *prf; local 125 prf = ikev2_get_prf(alg); 126 if (prf == NULL) 128 hash_len = prf->hash_len; 379 const struct ikev2_prf_alg *prf; local 382 prf = ikev2_get_prf(prf_alg); 384 shared_secret == NULL || nonce == NULL || prf == NULL) 387 /* prf(SK_pi/r,IDi/r') */ 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 401 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') * [all...] |
eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
/external/lisa/libs/utils/ |
results.py | 329 self.slack_pct.append(task.prf['slack_pct']) 330 self.perf_avg.append(task.prf['perf_avg']) 331 self.edp1.append(task.prf['edp1']) 332 self.edp2.append(task.prf['edp2']) 333 self.edp3.append(task.prf['edp3']) 336 rta[task.name] = task.prf 349 self.prf = { 373 self.prf['perf_avg'] = np.mean(perf) 374 self.prf['perf_std'] = np.std(perf) 376 self.name, self.prf['perf_avg'] [all...] |
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 69 ### PRF functions, according to the protocol version 89 Provides the implementation of SSLv3 PRF function: 91 SSLv3-PRF(secret, seed) = 119 Provides the implementation of TLS PRF function as defined in 122 PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR 130 depending on the use of the generated PRF keystream 145 Provides the implementation of TLS 1.2 PRF function as 148 PRF(secret, label, seed) = P_SHA256(secret, label + seed) 155 depending on the use of the generated PRF keystream 168 class PRF(object) [all...] |
/external/e2fsprogs/lib/support/ |
profile.c | 208 (prf_file_t prf); 395 prf_file_t prf; local 404 for (prf = profile->first_file; prf; prf = prf->next) { 405 if (strcmp(prf->filespec, default_filename) == 0) 408 if (!prf) 411 if (prf->root) { 412 profile_free_node(prf->root) 466 prf_file_t prf; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
Makefile | 47 sha1-prf.o \ 51 sha256-prf.o \ 55 sha384-prf.o \
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf = transform_id 607 const struct ikev2_prf_alg *prf; local 1050 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/syslinux/gpxe/src/crypto/ |
sha1extra.c | 32 * @v label NUL-terminated ASCII string describing purpose of PRF data 33 * @v data Further data that should be included in the PRF 34 * @v data_len Length of further PRF data 35 * @v prf_len Bytes of PRF to generate 36 * @ret prf Pseudorandom function bytes 38 * This is the PRF variant used by 802.11, defined in IEEE 802.11-2007 39 * 8.5.5.1. EAP-FAST uses a different SHA1-based PRF, and TLS uses an 40 * MD5-based PRF. 43 const void *data, size_t data_len, void *prf, size_t prf_len ) 71 memcpy ( prf, out, prf_len ) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf = -1 539 const struct ikev2_prf_alg *prf; local 984 const struct ikev2_prf_alg *prf; local [all...] |
ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/llvm/utils/TableGen/ |
OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/ |
hashlib.py | 188 def prf(msg, inner=inner, outer=outer):
function in function:.pbkdf2_hmac 209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
|
/external/python/cpython2/Lib/ |
hashlib.py | 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac 209 prev = prf(salt + struct.pack(b'>I', loop)) 212 prev = prf(prev)
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
prf.go | 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128 138 prf, _ := prfAndHashForVersion(version, suite) 139 return prf 202 prf, hash := prfAndHashForVersion(version, cipherSuite) 204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf} 207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf} 224 prf func(result, secret, label, seed []byte) 296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) 308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
prf.go | 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128 138 prf, _ := prfAndHashForVersion(version, suite) 139 return prf 202 prf, hash := prfAndHashForVersion(version, cipherSuite) 204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf} 207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf} 224 prf func(result, secret, label, seed []byte) 296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) 308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 193 // Omit the PRF. We use the default hmacWithSHA1. 268 CBS alg_id, prf; local 270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) || 278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {
|