Searched defs:prf (Results 1 - 25 of 41) sorted by relevance

12

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java17 private AlgorithmIdentifier prf; field in class:PBKDF2KeySpec
26 * @param prf identifier and parameters for the PRF algorithm to use.
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
32 this.prf = prf;
42 return defaultPRF.equals(prf);
52 return prf;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBKDF2Params.java27 * prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 }
38 private final AlgorithmIdentifier prf; field in class:PBKDF2Params
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
91 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and a defined prf.
96 * @param prf the pseudo-random function to use.
102 AlgorithmIdentifier prf)
116 this.prf = prf;
120 * Create a PBKDF2Params with the specified salt, iteration count, and a defined prf
98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument
126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument
[all...]
/external/libedit/src/
H A Dprompt.c149 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) argument
158 if (prf == NULL) {
164 p->p_func = prf;
181 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) argument
185 if (prf == NULL)
193 if (prf)
194 *prf = p->p_func;
/external/python/cpython2/Lib/
H A Dhashlib.py188 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
209 prev = prf(salt + struct.pack(b'>I', loop))
212 prev = prf(prev)
/external/python/cpython3/Lib/
H A Dhashlib.py200 def prf(msg, inner=inner, outer=outer): function in function:.pbkdf2_hmac
220 prev = prf(salt + loop.to_bytes(4, 'big'))
224 prev = prf(prev)
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
H A Deap_pwd_common.h49 u8 prf; member in struct:eap_pwd_id
H A Deap_eke_common.h65 u8 prf; member in struct:eap_eke_session
82 u8 prf, u8 mac);
/external/llvm/utils/TableGen/
H A DOptParserEmitter.cpp125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
126 PrefixKeyT prfkey(prf.begin(), prf.end());
210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local
211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
/external/syslinux/gpxe/src/crypto/
H A Dsha1extra.c36 * @ret prf Pseudorandom function bytes
43 const void *data, size_t data_len, void *prf, size_t prf_len )
71 memcpy ( prf, out, prf_len );
75 memcpy ( prf, out, SHA1_SIZE );
77 prf += SHA1_SIZE;
42 prf_sha1( const void *key, size_t key_len, const char *label, const void *data, size_t data_len, void *prf, size_t prf_len ) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
/external/boringssl/src/crypto/pkcs8/
H A Dp5_pbev2.c268 CBS alg_id, prf; local
270 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) ||
278 if (!CBS_mem_equal(&prf, kHMACWithSHA1, sizeof(kHMACWithSHA1))) {
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
114 pos = os_strstr(phase1, "prf=");
116 data->prf = atoi(pos + 4);
117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
118 data->prf);
181 static int eap_eke_supp_prf(u8 prf) argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
184 prf == EAP_EKE_PRF_HMAC_SHA2_256;
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
274 if ((data->prf
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data
114 pos = os_strstr(phase1, "prf=");
116 data->prf = atoi(pos + 4);
117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
118 data->prf);
181 static int eap_eke_supp_prf(u8 prf) argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 ||
184 prf == EAP_EKE_PRF_HMAC_SHA2_256;
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
274 if ((data->prf
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h17 int prf; member in struct:ikev2_proposal_data

Completed in 592 milliseconds

12