/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len() 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len() 131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument 148 switch (prf) { in eap_eke_auth_len() 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf() 201 if (prf in eap_eke_prf() 290 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) eap_eke_prfplus() argument 699 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) eap_eke_session_init() argument [all...] |
H A D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 126 if (prf == NULL) in ikev2_prf_plus() 128 hash_len = prf->hash_len; in ikev2_prf_plus() 379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 387 /* prf(SK_pi/r,IDi/r') */ in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 401 /* sign_data = msg | Nr/i | prf(SK_p in ikev2_derive_auth_data() 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
H A D | eap_eke_common.h | 65 u8 prf; member 82 u8 prf, u8 mac);
|
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len() 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len() 131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument 148 switch (prf) { in eap_eke_auth_len() 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf() 201 if (prf in eap_eke_prf() 290 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) eap_eke_prfplus() argument 699 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) eap_eke_session_init() argument [all...] |
H A D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 126 if (prf == NULL) in ikev2_prf_plus() 128 hash_len = prf->hash_len; in ikev2_prf_plus() 379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local 382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data() 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 387 /* prf(SK_pi/r,IDi/r') */ in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 401 /* sign_data = msg | Nr/i | prf(SK_p in ikev2_derive_auth_data() 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
H A D | eap_eke_common.h | 65 u8 prf; member 82 u8 prf, u8 mac);
|
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf in ikev2_parse_transform() 607 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local 1050 const struct ikev2_prf_alg *prf; ikev2_build_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys() 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 191 prop->prf in ikev2_parse_transform() 607 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local 1050 const struct ikev2_prf_alg *prf; ikev2_build_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys() 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 184 prop->prf = transform_id; in ikev2_parse_transform() 318 prop.prf in ikev2_process_sai1() 539 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local 984 const struct ikev2_prf_alg *prf; ikev2_build_auth() local [all...] |
H A D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member 114 pos = os_strstr(phase1, "prf="); in eap_eke_init() 116 data->prf = atoi(pos + 4); in eap_eke_init() 117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", in eap_eke_init() 118 data->prf); in eap_eke_init() 181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf() 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf() 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", in eap_eke_process_id() 274 if ((data->prf in eap_eke_process_id() [all...] |
H A D | ikev2.h | 17 int prf; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys() 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys() 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 184 prop->prf = transform_id; in ikev2_parse_transform() 320 prop.prf in ikev2_process_sai1() 541 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local 986 const struct ikev2_prf_alg *prf; ikev2_build_auth() local [all...] |
H A D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member 114 pos = os_strstr(phase1, "prf="); in eap_eke_init() 116 data->prf = atoi(pos + 4); in eap_eke_init() 117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", in eap_eke_init() 118 data->prf); in eap_eke_init() 181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf() 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf() 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", in eap_eke_process_id() 274 if ((data->prf in eap_eke_process_id() [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 329 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local 336 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_extract() 347 if (EVP_KDF_derive(kctx, dest, (size_t)EVP_MD_size(prf), params) <= 0) { in ngtcp2_crypto_hkdf_extract() 355 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() 358 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract() 366 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_extract() 384 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local 391 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_expand() 410 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() 419 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) ! in ngtcp2_crypto_hkdf_expand() 438 const EVP_MD *prf = md->native_handle; ngtcp2_crypto_hkdf() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | Makefile | 36 sha1-prf.o \ 40 sha256-prf.o \ 44 sha384-prf.o \ 47 sha512-prf.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | Makefile | 47 sha1-prf.o \ 51 sha256-prf.o \ 55 sha384-prf.o \
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
H A D | boringssl.c | 286 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local 287 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract() 289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract() 301 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local 303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand() 314 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf() local 316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf()
|
/third_party/python/Lib/ |
H A D | hashlib.py | 218 def prf(msg, inner=inner, outer=outer): function 238 prev = prf(salt + loop.to_bytes(4)) 242 prev = prf(prev)
|
/third_party/libwebsockets/lib/misc/fts/ |
H A D | trie-fd.c | 768 struct lws_fts_result_filepath **prf, *rf1, *rf2; in lws_fts_search() local 774 prf = &result->filepath_head; in lws_fts_search() 775 while (*prf) { in lws_fts_search() 777 rf1 = *prf; in lws_fts_search() 785 *prf = rf2; in lws_fts_search() 790 prf = &(*prf)->next; in lws_fts_search()
|
/third_party/mbedtls/library/ |
H A D | psa_crypto.c | 6852 static psa_status_t psa_tls12_prf_set_seed(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_seed() argument 6856 if (prf->state != PSA_TLS12_PRF_STATE_INIT) { in psa_tls12_prf_set_seed() 6861 prf->seed = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_seed() 6862 if (prf->seed == NULL) { in psa_tls12_prf_set_seed() 6866 memcpy(prf->seed, data, data_length); in psa_tls12_prf_set_seed() 6867 prf->seed_length = data_length; in psa_tls12_prf_set_seed() 6870 prf->state = PSA_TLS12_PRF_STATE_SEED_SET; in psa_tls12_prf_set_seed() 6875 static psa_status_t psa_tls12_prf_set_key(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_key() argument 6879 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET && in psa_tls12_prf_set_key() 6880 prf in psa_tls12_prf_set_key() 6899 psa_tls12_prf_set_label(psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_set_label() argument 6922 psa_tls12_prf_input(psa_tls12_prf_key_derivation_t *prf, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_tls12_prf_input() argument 6942 psa_tls12_prf_psk_to_ms_set_key( psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_set_key() argument 7006 psa_tls12_prf_psk_to_ms_set_other_key( psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_set_other_key() argument 7032 psa_tls12_prf_psk_to_ms_input( psa_tls12_prf_key_derivation_t *prf, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_input() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_backup.c | 217 struct wpabuf *params = NULL, *buf = NULL, *prf = NULL; in dpp_build_pbkdf2_alg_id() local 227 * prf AlgorithmIdentifier} in dpp_build_pbkdf2_alg_id() 230 * on Configurator signing key length, prf is in dpp_build_pbkdf2_alg_id() 242 prf = asn1_build_alg_id(oid, NULL); in dpp_build_pbkdf2_alg_id() 243 if (!prf) in dpp_build_pbkdf2_alg_id() 245 params = wpabuf_alloc(100 + wpabuf_len(salt) + wpabuf_len(prf)); in dpp_build_pbkdf2_alg_id() 251 wpabuf_put_buf(params, prf); in dpp_build_pbkdf2_alg_id() 258 wpabuf_free(prf); in dpp_build_pbkdf2_alg_id() 624 * prf AlgorithmIdentifier} in dpp_parse_recipient_infos() 627 * on Configurator signing key length, prf i in dpp_parse_recipient_infos() [all...] |