HomeSort by relevance Sort by last modified time
    Searched refs:prf (Results 1 - 25 of 58) sorted by null

1 2 3

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 10 * Extension of PBEKeySpec which takes into account the PRF algorithm setting available in PKCS#5 PBKDF2.
17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
26 * @param prf identifier and parameters for the PRF algorithm to use.
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
32 this.prf = prf;
36 * Return true if this spec is for the default PRF (HmacSHA1), false otherwise.
38 * @return true if this spec uses the default PRF, false otherwise.
42 return defaultPRF.equals(prf);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBKDF2Params.java 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
96 * @param prf the pseudo-random function to use.
102 AlgorithmIdentifier prf)
116 this.prf = prf;
120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
    [all...]
  /external/libedit/src/
prompt.c 149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide)
158 if (prf == NULL) {
164 p->p_func = prf;
181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op)
185 if (prf == NULL)
193 if (prf)
194 *prf = p->p_func;
  /external/syslinux/gpxe/src/include/gpxe/
sha1.h 18 const void *data, size_t data_len, void *prf, size_t prf_len );
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.h 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
eap_eke_common.c 121 static int eap_eke_prf_len(u8 prf)
123 if (prf == EAP_EKE_PRF_HMAC_SHA1)
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
131 static int eap_eke_nonce_len(u8 prf)
135 prf_len = eap_eke_prf_len(prf);
146 static int eap_eke_auth_len(u8 prf)
148 switch (prf) {
206 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data,
222 if (prf == EAP_EKE_PRF_HMAC_SHA1)
224 if (prf == EAP_EKE_PRF_HMAC_SHA2_256
    [all...]
ikev2_common.c 122 const struct ikev2_prf_alg *prf; local
125 prf = ikev2_get_prf(alg);
126 if (prf == NULL)
128 hash_len = prf->hash_len;
379 const struct ikev2_prf_alg *prf; local
382 prf = ikev2_get_prf(prf_alg);
384 shared_secret == NULL || nonce == NULL || prf == NULL)
387 /* prf(SK_pi/r,IDi/r') */
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
401 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') *
    [all...]
eap_ikev2_common.c 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
eap_eke_common.h 65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
eap_pwd_common.h 49 u8 prf; member in struct:eap_pwd_id
  /external/lisa/libs/utils/
results.py 329 self.slack_pct.append(task.prf['slack_pct'])
330 self.perf_avg.append(task.prf['perf_avg'])
331 self.edp1.append(task.prf['edp1'])
332 self.edp2.append(task.prf['edp2'])
333 self.edp3.append(task.prf['edp3'])
336 rta[task.name] = task.prf
349 self.prf = {
373 self.prf['perf_avg'] = np.mean(perf)
374 self.prf['perf_std'] = np.std(perf)
376 self.name, self.prf['perf_avg']
    [all...]
  /external/scapy/scapy/layers/tls/crypto/
prf.py 69 ### PRF functions, according to the protocol version
89 Provides the implementation of SSLv3 PRF function:
91 SSLv3-PRF(secret, seed) =
119 Provides the implementation of TLS PRF function as defined in
122 PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR
130 depending on the use of the generated PRF keystream
145 Provides the implementation of TLS 1.2 PRF function as
148 PRF(secret, label, seed) = P_SHA256(secret, label + seed)
155 depending on the use of the generated PRF keystream
168 class PRF(object)
    [all...]
  /external/e2fsprogs/lib/support/
profile.c 208 (prf_file_t prf);
395 prf_file_t prf; local
404 for (prf = profile->first_file; prf; prf = prf->next) {
405 if (strcmp(prf->filespec, default_filename) == 0)
408 if (!prf)
411 if (prf->root) {
412 profile_free_node(prf->root)
466 prf_file_t prf; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
Makefile 47 sha1-prf.o \
51 sha256-prf.o \
55 sha384-prf.o \
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 41 const struct ikev2_prf_alg *prf; local
50 prf = ikev2_get_prf(data->proposal.prf);
52 if (integ == NULL || prf == NULL || encr == NULL) {
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
111 skeyseed, prf->hash_len);
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
190 transform_id == data->proposal.prf)
191 prop->prf = transform_id
607 const struct ikev2_prf_alg *prf; local
1050 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
  /external/syslinux/gpxe/src/crypto/
sha1extra.c 32 * @v label NUL-terminated ASCII string describing purpose of PRF data
33 * @v data Further data that should be included in the PRF
34 * @v data_len Length of further PRF data
35 * @v prf_len Bytes of PRF to generate
36 * @ret prf Pseudorandom function bytes
38 * This is the PRF variant used by 802.11, defined in IEEE 802.11-2007
39 * 8.5.5.1. EAP-FAST uses a different SHA1-based PRF, and TLS uses an
40 * MD5-based PRF.
43 const void *data, size_t data_len, void *prf, size_t prf_len )
71 memcpy ( prf, out, prf_len )
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 37 const struct ikev2_prf_alg *prf; local
46 prf = ikev2_get_prf(data->proposal.prf);
48 if (integ == NULL || prf == NULL || encr == NULL) {
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
107 skeyseed, prf->hash_len);
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
184 prop->prf = transform_id;
318 prop.prf = -1
539 const struct ikev2_prf_alg *prf; local
984 const struct ikev2_prf_alg *prf; local
    [all...]
ikev2.h 17 int prf; member in struct:ikev2_proposal_data
  /external/llvm/utils/TableGen/
OptParserEmitter.cpp 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
126 PrefixKeyT prfkey(prf.begin(), prf.end());
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/
hashlib.py 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
  /external/python/cpython2/Lib/
hashlib.py 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
  /prebuilts/go/darwin-x86/src/crypto/tls/
prf.go 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128
138 prf, _ := prfAndHashForVersion(version, suite)
139 return prf
202 prf, hash := prfAndHashForVersion(version, cipherSuite)
204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf}
224 prf func(result, secret, label, seed []byte)
296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum())
308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
  /prebuilts/go/linux-x86/src/crypto/tls/
prf.go 85 // RFC 5246 section 6.3 says that the largest PRF output needed is 128
138 prf, _ := prfAndHashForVersion(version, suite)
139 return prf
202 prf, hash := prfAndHashForVersion(version, cipherSuite)
204 return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
207 return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf}
224 prf func(result, secret, label, seed []byte)
296 h.prf(out, masterSecret, clientFinishedLabel, h.Sum())
308 h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
  /external/boringssl/src/crypto/pkcs8/
p5_pbev2.c 193 // Omit the PRF. We use the default hmacWithSHA1.
268 CBS alg_id, prf; local
270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) ||
278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {

Completed in 625 milliseconds

1 2 3