Home
last modified time | relevance | path

Searched refs:prf (Results 1 - 25 of 106) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_eke_common.c121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
148 switch (prf) { in eap_eke_auth_len()
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
201 if (prf in eap_eke_prf()
290 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) eap_eke_prfplus() argument
699 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) eap_eke_session_init() argument
[all...]
H A Dikev2_common.c122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
126 if (prf == NULL) in ikev2_prf_plus()
128 hash_len = prf->hash_len; in ikev2_prf_plus()
379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
387 /* prf(SK_pi/r,IDi/r') */ in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
401 /* sign_data = msg | Nr/i | prf(SK_p in ikev2_derive_auth_data()
629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument
[all...]
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
H A Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
H A Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_eke_common.c121 static int eap_eke_prf_len(u8 prf) in eap_eke_prf_len() argument
123 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf_len()
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_prf_len()
131 static int eap_eke_nonce_len(u8 prf) in eap_eke_nonce_len() argument
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
146 static int eap_eke_auth_len(u8 prf) in eap_eke_auth_len() argument
148 switch (prf) { in eap_eke_auth_len()
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
199 if (prf == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_prf()
201 if (prf in eap_eke_prf()
290 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) eap_eke_prfplus() argument
699 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) eap_eke_session_init() argument
[all...]
H A Dikev2_common.c122 const struct ikev2_prf_alg *prf; in ikev2_prf_plus() local
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
126 if (prf == NULL) in ikev2_prf_plus()
128 hash_len = prf->hash_len; in ikev2_prf_plus()
379 const struct ikev2_prf_alg *prf; in ikev2_derive_auth_data() local
382 prf = ikev2_get_prf(prf_alg); in ikev2_derive_auth_data()
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
387 /* prf(SK_pi/r,IDi/r') */ in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
401 /* sign_data = msg | Nr/i | prf(SK_p in ikev2_derive_auth_data()
629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument
[all...]
H A Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
H A Deap_eke_common.h65 u8 prf; member
82 u8 prf, u8 mac);
H A Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf in ikev2_parse_transform()
607 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local
1050 const struct ikev2_prf_alg *prf; ikev2_build_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Dikev2.c41 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys()
94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
111 skeyseed, prf->hash_len); in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
191 prop->prf in ikev2_parse_transform()
607 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local
1050 const struct ikev2_prf_alg *prf; ikev2_build_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys()
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
107 skeyseed, prf->hash_len); in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
184 prop->prf = transform_id; in ikev2_parse_transform()
318 prop.prf in ikev2_process_sai1()
539 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local
984 const struct ikev2_prf_alg *prf; ikev2_build_auth() local
[all...]
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member
114 pos = os_strstr(phase1, "prf="); in eap_eke_init()
116 data->prf = atoi(pos + 4); in eap_eke_init()
117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", in eap_eke_init()
118 data->prf); in eap_eke_init()
181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", in eap_eke_process_id()
274 if ((data->prf in eap_eke_process_id()
[all...]
H A Dikev2.h17 int prf; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Dikev2.c37 const struct ikev2_prf_alg *prf; in ikev2_derive_keys() local
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ in ikev2_derive_keys()
90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, in ikev2_derive_keys()
107 skeyseed, prf->hash_len); in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
184 prop->prf = transform_id; in ikev2_parse_transform()
320 prop.prf in ikev2_process_sai1()
541 const struct ikev2_prf_alg *prf; ikev2_process_auth_secret() local
986 const struct ikev2_prf_alg *prf; ikev2_build_auth() local
[all...]
H A Deap_eke.c33 u8 prf; /* forced PRF or 0 to allow all supported */ member
114 pos = os_strstr(phase1, "prf="); in eap_eke_init()
116 data->prf = atoi(pos + 4); in eap_eke_init()
117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", in eap_eke_init()
118 data->prf); in eap_eke_init()
181 static int eap_eke_supp_prf(u8 prf) in eap_eke_supp_prf() argument
183 return prf == EAP_EKE_PRF_HMAC_SHA1 || in eap_eke_supp_prf()
184 prf == EAP_EKE_PRF_HMAC_SHA2_256; in eap_eke_supp_prf()
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", in eap_eke_process_id()
274 if ((data->prf in eap_eke_process_id()
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/
H A Dopenssl.c329 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local
336 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_extract()
347 if (EVP_KDF_derive(kctx, dest, (size_t)EVP_MD_size(prf), params) <= 0) { in ngtcp2_crypto_hkdf_extract()
355 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract()
358 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract()
366 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) != 1 || in ngtcp2_crypto_hkdf_extract()
384 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local
391 (char *)EVP_MD_get0_name(prf), 0), in ngtcp2_crypto_hkdf_expand()
410 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand()
419 EVP_PKEY_CTX_set_hkdf_md(pctx, prf) ! in ngtcp2_crypto_hkdf_expand()
438 const EVP_MD *prf = md->native_handle; ngtcp2_crypto_hkdf() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A DMakefile36 sha1-prf.o \
40 sha256-prf.o \
44 sha384-prf.o \
47 sha512-prf.o \
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A DMakefile47 sha1-prf.o \
51 sha256-prf.o \
55 sha384-prf.o \
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/
H A Dboringssl.c286 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_extract() local
287 size_t destlen = (size_t)EVP_MD_size(prf); in ngtcp2_crypto_hkdf_extract()
289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract()
301 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf_expand() local
303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand()
314 const EVP_MD *prf = md->native_handle; in ngtcp2_crypto_hkdf() local
316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf()
/third_party/python/Lib/
H A Dhashlib.py218 def prf(msg, inner=inner, outer=outer): function
238 prev = prf(salt + loop.to_bytes(4))
242 prev = prf(prev)
/third_party/libwebsockets/lib/misc/fts/
H A Dtrie-fd.c768 struct lws_fts_result_filepath **prf, *rf1, *rf2; in lws_fts_search() local
774 prf = &result->filepath_head; in lws_fts_search()
775 while (*prf) { in lws_fts_search()
777 rf1 = *prf; in lws_fts_search()
785 *prf = rf2; in lws_fts_search()
790 prf = &(*prf)->next; in lws_fts_search()
/third_party/mbedtls/library/
H A Dpsa_crypto.c6852 static psa_status_t psa_tls12_prf_set_seed(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_seed() argument
6856 if (prf->state != PSA_TLS12_PRF_STATE_INIT) { in psa_tls12_prf_set_seed()
6861 prf->seed = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_seed()
6862 if (prf->seed == NULL) { in psa_tls12_prf_set_seed()
6866 memcpy(prf->seed, data, data_length); in psa_tls12_prf_set_seed()
6867 prf->seed_length = data_length; in psa_tls12_prf_set_seed()
6870 prf->state = PSA_TLS12_PRF_STATE_SEED_SET; in psa_tls12_prf_set_seed()
6875 static psa_status_t psa_tls12_prf_set_key(psa_tls12_prf_key_derivation_t *prf, in psa_tls12_prf_set_key() argument
6879 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET && in psa_tls12_prf_set_key()
6880 prf in psa_tls12_prf_set_key()
6899 psa_tls12_prf_set_label(psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_set_label() argument
6922 psa_tls12_prf_input(psa_tls12_prf_key_derivation_t *prf, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_tls12_prf_input() argument
6942 psa_tls12_prf_psk_to_ms_set_key( psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_set_key() argument
7006 psa_tls12_prf_psk_to_ms_set_other_key( psa_tls12_prf_key_derivation_t *prf, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_set_other_key() argument
7032 psa_tls12_prf_psk_to_ms_input( psa_tls12_prf_key_derivation_t *prf, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_tls12_prf_psk_to_ms_input() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_backup.c217 struct wpabuf *params = NULL, *buf = NULL, *prf = NULL; in dpp_build_pbkdf2_alg_id() local
227 * prf AlgorithmIdentifier} in dpp_build_pbkdf2_alg_id()
230 * on Configurator signing key length, prf is in dpp_build_pbkdf2_alg_id()
242 prf = asn1_build_alg_id(oid, NULL); in dpp_build_pbkdf2_alg_id()
243 if (!prf) in dpp_build_pbkdf2_alg_id()
245 params = wpabuf_alloc(100 + wpabuf_len(salt) + wpabuf_len(prf)); in dpp_build_pbkdf2_alg_id()
251 wpabuf_put_buf(params, prf); in dpp_build_pbkdf2_alg_id()
258 wpabuf_free(prf); in dpp_build_pbkdf2_alg_id()
624 * prf AlgorithmIdentifier} in dpp_parse_recipient_infos()
627 * on Configurator signing key length, prf i in dpp_parse_recipient_infos()
[all...]

Completed in 23 milliseconds

12345