Searched defs:prf (Results 1 - 25 of 40) sorted by relevance

12

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java10 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
12 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
16 this.prf = prf;
21 return prf;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBKDF2Params.java26 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
37 private AlgorithmIdentifier prf; field in class:PBKDF2Params
62 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
98 * @param prf the pseudo-random function to use.
104 AlgorithmIdentifier prf)
109 this.prf = prf;
113 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument
119 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument
[all...]
/external/libedit/src/
H A Dprompt.c149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) argument
158 if (prf == NULL) {
164 p->p_func = prf;
181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) argument
185 if (prf == NULL)
193 if (prf)
194 *prf = p->p_func;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
H A Deap_eke_common.c123 static int eap_eke_prf_len(u8 prf) argument
125 if (prf == EAP_EKE_PRF_HMAC_SHA1)
127 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
133 static int eap_eke_nonce_len(u8 prf) argument
137 prf_len = eap_eke_prf_len(prf);
148 static int eap_eke_auth_len(u8 prf) argument
150 switch (prf) {
211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument
227 if (prf == EAP_EKE_PRF_HMAC_SHA1)
229 if (prf
318 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument
731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument
[all...]
H A Dikev2_common.c123 const struct ikev2_prf_alg *prf; local
126 prf = ikev2_get_prf(alg);
127 if (prf == NULL)
129 hash_len = prf->hash_len;
376 const struct ikev2_prf_alg *prf; local
379 prf = ikev2_get_prf(prf_alg);
381 shared_secret == NULL || nonce == NULL || prf == NULL)
384 /* prf(SK_pi/r,IDi/r') */
391 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
398 /* sign_data = msg | Nr/i | prf(SK_p
626 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
/external/llvm/utils/TableGen/
H A DOptParserEmitter.cpp125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
126 PrefixKeyT prfkey(prf.begin(), prf.end());
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
115 pos = os_strstr(phase1, "prf=");
117 data->prf = atoi(pos + 4);
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
119 data->prf);
182 static int eap_eke_supp_prf(u8 prf) argument
184 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
185 prf == EAP_EKE_PRF_HMAC_SHA2_256;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
275 if ((data->prf
[all...]
H A Dikev2.c37 const struct ikev2_prf_alg *prf; local
46 prf = ikev2_get_prf(data->proposal.prf);
48 if (integ == NULL || prf == NULL || encr == NULL) {
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
107 skeyseed, prf->hash_len);
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
184 prop->prf = transform_id;
318 prop.prf
540 const struct ikev2_prf_alg *prf; local
985 const struct ikev2_prf_alg *prf; local
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
115 pos = os_strstr(phase1, "prf=");
117 data->prf = atoi(pos + 4);
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
119 data->prf);
182 static int eap_eke_supp_prf(u8 prf) argument
184 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
185 prf == EAP_EKE_PRF_HMAC_SHA2_256;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
275 if ((data->prf
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
115 pos = os_strstr(phase1, "prf=");
117 data->prf = atoi(pos + 4);
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
119 data->prf);
182 static int eap_eke_supp_prf(u8 prf) argument
184 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
185 prf == EAP_EKE_PRF_HMAC_SHA2_256;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
275 if ((data->prf
[all...]

Completed in 283 milliseconds

12