/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 10 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec 12 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 16 this.prf = prf; 21 return prf;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBKDF2Params.java | 26 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 } 37 private AlgorithmIdentifier prf; field in class:PBKDF2Params 62 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 93 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 98 * @param prf the pseudo-random function to use. 104 AlgorithmIdentifier prf) 109 this.prf = prf; 113 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf 100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument 119 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument [all...] |
/external/libedit/src/ |
H A D | prompt.c | 149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) argument 158 if (prf == NULL) { 164 p->p_func = prf; 181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) argument 185 if (prf == NULL) 193 if (prf) 194 *prf = p->p_func;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_eke_common.c | 123 static int eap_eke_prf_len(u8 prf) argument 125 if (prf == EAP_EKE_PRF_HMAC_SHA1) 127 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 133 static int eap_eke_nonce_len(u8 prf) argument 137 prf_len = eap_eke_prf_len(prf); 148 static int eap_eke_auth_len(u8 prf) argument 150 switch (prf) { 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument 227 if (prf == EAP_EKE_PRF_HMAC_SHA1) 229 if (prf 318 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument [all...] |
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 376 const struct ikev2_prf_alg *prf; local 379 prf = ikev2_get_prf(prf_alg); 381 shared_secret == NULL || nonce == NULL || prf == NULL) 384 /* prf(SK_pi/r,IDi/r') */ 391 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 398 /* sign_data = msg | Nr/i | prf(SK_p 626 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_eke_common.c | 123 static int eap_eke_prf_len(u8 prf) argument 125 if (prf == EAP_EKE_PRF_HMAC_SHA1) 127 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 133 static int eap_eke_nonce_len(u8 prf) argument 137 prf_len = eap_eke_prf_len(prf); 148 static int eap_eke_auth_len(u8 prf) argument 150 switch (prf) { 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument 227 if (prf == EAP_EKE_PRF_HMAC_SHA1) 229 if (prf 318 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument [all...] |
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 376 const struct ikev2_prf_alg *prf; local 379 prf = ikev2_get_prf(prf_alg); 381 shared_secret == NULL || nonce == NULL || prf == NULL) 384 /* prf(SK_pi/r,IDi/r') */ 391 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 398 /* sign_data = msg | Nr/i | prf(SK_p 626 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_eke_common.c | 123 static int eap_eke_prf_len(u8 prf) argument 125 if (prf == EAP_EKE_PRF_HMAC_SHA1) 127 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 133 static int eap_eke_nonce_len(u8 prf) argument 137 prf_len = eap_eke_prf_len(prf); 148 static int eap_eke_auth_len(u8 prf) argument 150 switch (prf) { 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument 227 if (prf == EAP_EKE_PRF_HMAC_SHA1) 229 if (prf 318 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument [all...] |
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 376 const struct ikev2_prf_alg *prf; local 379 prf = ikev2_get_prf(prf_alg); 381 shared_secret == NULL || nonce == NULL || prf == NULL) 384 /* prf(SK_pi/r,IDi/r') */ 391 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 398 /* sign_data = msg | Nr/i | prf(SK_p 626 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/e2fsprogs/e2fsck/ |
H A D | profile.c | 206 (prf_file_t prf); 392 prf_file_t prf; local 401 for (prf = profile->first_file; prf; prf = prf->next) { 402 if (strcmp(prf->filespec, default_filename) == 0) 405 if (!prf) 408 if (prf->root) { 409 profile_free_node(prf 463 prf_file_t prf; local 525 profile_update_file(prf_file_t prf) argument 607 profile_free_file(prf_file_t prf) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf 540 const struct ikev2_prf_alg *prf; local 985 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf 540 const struct ikev2_prf_alg *prf; local 985 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf 540 const struct ikev2_prf_alg *prf; local 985 const struct ikev2_prf_alg *prf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | Makefile | 43 sha1-prf.o \ 47 sha256-prf.o \
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | Makefile | 43 sha1-prf.o \ 47 sha256-prf.o \
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | Makefile | 43 sha1-prf.o \ 47 sha256-prf.o \
|