/external/e2fsprogs/e2fsck/ |
H A D | profile.c | 206 (prf_file_t prf); 387 prf_file_t prf; local 396 for (prf = profile->first_file; prf; prf = prf->next) { 397 if (strcmp(prf->filespec, default_filename) == 0) 400 if (!prf) 403 if (prf->root) { 404 profile_free_node(prf 458 prf_file_t prf; local 520 profile_update_file(prf_file_t prf) argument 602 profile_free_file(prf_file_t prf) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 32 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 128 const struct ikev2_prf_alg *prf; local 131 prf = ikev2_get_prf(alg); 132 if (prf == NULL) 134 hash_len = prf->hash_len; 446 const struct ikev2_prf_alg *prf; local 449 prf = ikev2_get_prf(prf_alg); 451 shared_secret == NULL || nonce == NULL || prf == NULL) 454 /* prf(SK_pi/r,IDi/r') */ 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 468 /* sign_data = msg | Nr/i | prf(SK_p 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 441 const struct ikev2_prf_alg *prf; local 444 prf = ikev2_get_prf(prf_alg); 446 shared_secret == NULL || nonce == NULL || prf == NULL) 449 /* prf(SK_pi/r,IDi/r') */ 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 463 /* sign_data = msg | Nr/i | prf(SK_p 691 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 441 const struct ikev2_prf_alg *prf; local 444 prf = ikev2_get_prf(prf_alg); 446 shared_secret == NULL || nonce == NULL || prf == NULL) 449 /* prf(SK_pi/r,IDi/r') */ 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 463 /* sign_data = msg | Nr/i | prf(SK_p 691 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 441 const struct ikev2_prf_alg *prf; local 444 prf = ikev2_get_prf(prf_alg); 446 shared_secret == NULL || nonce == NULL || prf == NULL) 449 /* prf(SK_pi/r,IDi/r') */ 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 463 /* sign_data = msg | Nr/i | prf(SK_p 691 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 89 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 124 skeyseed, prf->hash_len); 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->prf = transform_id; 344 prop.prf 574 const struct ikev2_prf_alg *prf; local 1032 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 89 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 124 skeyseed, prf->hash_len); 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->prf = transform_id; 344 prop.prf 574 const struct ikev2_prf_alg *prf; local 1032 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 89 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 124 skeyseed, prf->hash_len); 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->prf = transform_id; 344 prop.prf 574 const struct ikev2_prf_alg *prf; local 1032 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | Makefile | 42 sha1-prf.o \ 46 sha256-prf.o \
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | Makefile | 42 sha1-prf.o \ 46 sha256-prf.o \
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | Makefile | 42 sha1-prf.o \ 46 sha256-prf.o \
|
/external/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 136 /* If prf NID unspecified see if cipher has a preference. 243 /* prf can stay NULL if we are using hmacWithSHA1 */ 246 kdf->prf = X509_ALGOR_new(); 247 if (!kdf->prf) 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
|