/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/x86/mm/ |
H A D | pf_in.c | 89 static int skip_prefix(unsigned char *addr, struct prefix_bits *prf) argument 93 prf->shorted = 0; 94 prf->enlarged = 0; 95 prf->rexr = 0; 96 prf->rex = 0; 102 prf->shorted = 1; 105 prf->enlarged = 1; 107 prf->rexr = 1; 109 prf->rex = 1; 147 struct prefix_bits prf; local 168 struct prefix_bits prf; local 191 struct prefix_bits prf; local 415 struct prefix_bits prf; local 475 struct prefix_bits prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/x86/mm/ |
H A D | pf_in.c | 89 static int skip_prefix(unsigned char *addr, struct prefix_bits *prf) argument 93 prf->shorted = 0; 94 prf->enlarged = 0; 95 prf->rexr = 0; 96 prf->rex = 0; 102 prf->shorted = 1; 105 prf->enlarged = 1; 107 prf->rexr = 1; 109 prf->rex = 1; 147 struct prefix_bits prf; local 168 struct prefix_bits prf; local 191 struct prefix_bits prf; local 415 struct prefix_bits prf; local 475 struct prefix_bits prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 32 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/bcmcrypto/ |
H A D | Makefile | 21 PROGS := aes aeskeywrap des dh passhash prf rc4 sha1 tkhash tkhash_shared_sbox sha256 41 passhash: passhash.c sha1.c prf.c 44 prf: prf.c hmac.c sha1.c md5.c
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/asn1/ |
H A D | p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 137 /* If prf NID unspecified see if cipher has a preference. 173 /* prf can stay NULL if we are using hmacWithSHA1 */ 176 kdf->prf = X509_ALGOR_new(); 177 if (!kdf->prf) 179 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/asn1/ |
H A D | p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 137 /* If prf NID unspecified see if cipher has a preference. 173 /* prf can stay NULL if we are using hmacWithSHA1 */ 176 kdf->prf = X509_ALGOR_new(); 177 if (!kdf->prf) 179 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/asn1/ |
H A D | p5_pbev2.c | 78 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 137 /* If prf NID unspecified see if cipher has a preference. 173 /* prf can stay NULL if we are using hmacWithSHA1 */ 176 kdf->prf = X509_ALGOR_new(); 177 if (!kdf->prf) 179 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
|