/freebsd-9.3-release/lib/libedit/ |
H A D | prompt.c | 144 prompt_set(EditLine *el, el_pfunc_t prf, char c, int op) argument 153 if (prf == NULL) { 159 p->p_func = prf; 174 prompt_get(EditLine *el, el_pfunc_t *prf, char *c, int op) argument 178 if (prf == NULL) 186 *prf = el->el_rprompt.p_func;
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 24 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 32 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 128 const struct ikev2_prf_alg *prf; local 131 prf = ikev2_get_prf(alg); 132 if (prf == NULL) 134 hash_len = prf->hash_len; 446 const struct ikev2_prf_alg *prf; local 449 prf = ikev2_get_prf(prf_alg); 451 shared_secret == NULL || nonce == NULL || prf == NULL) 454 /* prf(SK_pi/r,IDi/r') */ 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 468 /* sign_data = msg | Nr/i | prf(SK_p 696 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | ikev2_common.h | 338 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 46 const struct ikev2_prf_alg *prf; local 55 prf = ikev2_get_prf(data->proposal.prf); 57 if (integ == NULL || prf == NULL || encr == NULL) { 85 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 99 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 116 skeyseed, prf->hash_len); 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 195 transform_id == data->proposal.prf) 196 prop->prf 613 const struct ikev2_prf_alg *prf; local 1056 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 23 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_server_ikev2.c | 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 333 data->ikev2.proposal.prf, &data->ikev2.keys,
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 42 const struct ikev2_prf_alg *prf; local 51 prf = ikev2_get_prf(data->proposal.prf); 53 if (integ == NULL || prf == NULL || encr == NULL) { 94 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 112 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 129 skeyseed, prf->hash_len); 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 215 prop->prf = transform_id; 349 prop.prf 579 const struct ikev2_prf_alg *prf; local 1037 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 23 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys,
|
/freebsd-9.3-release/contrib/llvm/utils/TableGen/ |
H A D | OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/freebsd-9.3-release/kerberos5/lib/libgssapi_krb5/ |
H A D | Makefile | 51 prf.c \
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 237 if (kdf->prf && (OBJ_obj2nid(kdf->prf->algorithm) != NID_hmacWithSHA1)) {
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 79 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 169 /* prf can stay NULL because we are using hmacWithSHA1 */
|
/freebsd-9.3-release/sys/dev/ath/ath_hal/ |
H A D | ah.c | 145 struct ath_hal_rf * const *prf; local 147 OS_SET_FOREACH(prf, ah_rfs) { 148 struct ath_hal_rf *rf = *prf;
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 130 krb5_error_code (*prf)(krb5_context, member in struct:encryption_type 2489 krb5_abortx(context, "internal prf error"); 2493 crypto->et->type, "prf", 3, &derived); 4081 if(et->prf == NULL) { 4082 krb5_set_error_string(context, "kerberos prf for %s not supported", 4087 return (*et->prf)(context, crypto, input, output);
|
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 530 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
|