/freebsd-11-stable/lib/libedit/ |
H A D | prompt.c | 151 prompt_set(EditLine *el, el_pfunc_t prf, Char c, int op, int wide) argument 160 if (prf == NULL) { 166 p->p_func = prf; 183 prompt_get(EditLine *el, el_pfunc_t *prf, Char *c, int op) argument 187 if (prf == NULL) 195 if (prf) 196 *prf = p->p_func;
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_eke_common.c | 121 static int eap_eke_prf_len(u8 prf) argument 123 if (prf == EAP_EKE_PRF_HMAC_SHA1) 125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256) 131 static int eap_eke_nonce_len(u8 prf) argument 135 prf_len = eap_eke_prf_len(prf); 146 static int eap_eke_auth_len(u8 prf) argument 148 switch (prf) { 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument 199 if (prf == EAP_EKE_PRF_HMAC_SHA1) 201 if (prf 290 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument 699 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument [all...] |
H A D | ikev2_common.c | 122 const struct ikev2_prf_alg *prf; local 125 prf = ikev2_get_prf(alg); 126 if (prf == NULL) 128 hash_len = prf->hash_len; 379 const struct ikev2_prf_alg *prf; local 382 prf = ikev2_get_prf(prf_alg); 384 shared_secret == NULL || nonce == NULL || prf == NULL) 387 /* prf(SK_pi/r,IDi/r') */ 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 401 /* sign_data = msg | Nr/i | prf(SK_p 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | eap_eke_common.h | 65 u8 prf; member in struct:eap_eke_session 82 u8 prf, u8 mac);
|
H A D | eap_pwd_common.h | 43 u8 prf; member in struct:eap_pwd_id
|
H A D | ikev2_common.h | 328 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 607 const struct ikev2_prf_alg *prf; local 1050 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_server_ikev2.c | 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 337 data->ikev2.proposal.prf, &data->ikev2.keys,
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 76 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 90 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 107 skeyseed, prf->hash_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 184 prop->prf = transform_id; 318 prop.prf 539 const struct ikev2_prf_alg *prf; local 984 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_eke.c | 33 u8 prf; /* forced PRF or 0 to allow all supported */ member in struct:eap_eke_data 114 pos = os_strstr(phase1, "prf="); 116 data->prf = atoi(pos + 4); 117 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", 118 data->prf); 181 static int eap_eke_supp_prf(u8 prf) argument 183 return prf == EAP_EKE_PRF_HMAC_SHA1 || 184 prf == EAP_EKE_PRF_HMAC_SHA2_256; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 274 if ((data->prf [all...] |
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | eap_pwd.c | 274 "EAP-PWD: Server EAP-pwd-ID proposal: group=%u random=%u prf=%u prep=%u", 275 data->group_num, id->random_function, id->prf, id->prep); 277 id->prf != EAP_PWD_DEFAULT_PRF || 715 * prf
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 79 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 136 * If prf NID unspecified see if cipher has a preference. An error is OK 242 /* prf can stay NULL if we are using hmacWithSHA1 */ 244 kdf->prf = X509_ALGOR_new(); 245 if (!kdf->prf) 247 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL);
|
/freebsd-11-stable/usr.sbin/wpa/ |
H A D | Makefile.crypto | 4 SRCS+= crypto_openssl.c random.c sha1-prf.c sha256-prf.c sha256-tlsprf.c \ 115 SRCS+= sha1-internal.c sha1-pbkdf2.c sha1.c sha1-prf.c 122 SRCS+= sha256-internal.c sha256-prf.c
|
/freebsd-11-stable/contrib/llvm-project/llvm/utils/TableGen/ |
H A D | OptParserEmitter.cpp | 57 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local 58 PrefixKeyT prfkey(prf.begin(), prf.end()); 145 std::vector<StringRef> prf = R.getValueAsListOfStrings("Prefixes"); local 146 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.h | 120 krb5_error_code (*prf)(krb5_context, member in struct:_krb5_encryption_type
|
/freebsd-11-stable/kerberos5/lib/libgssapi_krb5/ |
H A D | Makefile | 53 prf.c \
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 291 if (kdf->prf) 292 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
|
/freebsd-11-stable/sys/dev/ath/ath_hal/ |
H A D | ah.c | 171 struct ath_hal_rf * const *prf; local 173 OS_SET_FOREACH(prf, ah_rfs) { 174 struct ath_hal_rf *rf = *prf;
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 973 if (kdf->prf == NULL) { 976 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf);
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | Android.mk | 1283 SHA1OBJS += src/crypto/sha1-prf.c 1354 SHA256OBJS += src/crypto/sha256-prf.c 1390 OBJS += src/crypto/sha384-prf.c 1399 OBJS += src/crypto/sha512-prf.c
|