/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec 26 * @param prf identifier and parameters for the PRF algorithm to use. 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 32 this.prf = prf; 42 return defaultPRF.equals(prf); 52 return prf;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBKDF2Params.java | 27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 } 38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params 63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf. 96 * @param prf the pseudo-random function to use. 102 AlgorithmIdentifier prf) 116 this.prf = prf; 120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf 98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument 126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument [all...] |
/external/libedit/src/ |
H A D | prompt.c | 149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) argument 158 if (prf == NULL) { 164 p->p_func = prf; 181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) argument 185 if (prf == NULL) 193 if (prf) 194 *prf = p->p_func;
|
/external/python/cpython2/Lib/ |
H A D | hashlib.py | 188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac 209 prev = prf(salt + struct.pack(b'>I', loop)) 212 prev = prf(prev)
|
/external/python/cpython3/Lib/ |
H A D | hashlib.py | 200 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac 220 prev = prf(salt + loop.to_bytes(4, 'big')) 224 prev = prf(prev)
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
H A D | eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
H A D | eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
H A D | eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
/external/llvm/utils/TableGen/ |
H A D | OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/external/syslinux/gpxe/src/crypto/ |
H A D | sha1extra.c | 36 * @ret prf Pseudorandom function bytes 43 const void *data, size_t data_len, void *prf, size_t prf_len ) 71 memcpy ( prf, out, prf_len ); 75 memcpy ( prf, out, SHA1_SIZE ); 77 prf += SHA1_SIZE; 42 prf_sha1( const void *key, size_t key_len, const char *label, const void *data, size_t data_len, void *prf, size_t prf_len ) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbev2.c | 268 CBS alg_id, prf; local 270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) || 278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data 114 pos = os_strstr(phase1, "prf="); 116 data->prf = atoi(pos + 4); 117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", 118 data->prf); 181 static int eap_eke_supp_prf(u8 prf) argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 274 if ((data->prf [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data 114 pos = os_strstr(phase1, "prf="); 116 data->prf = atoi(pos + 4); 117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", 118 data->prf); 181 static int eap_eke_supp_prf(u8 prf) argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 274 if ((data->prf [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|