/freebsd-10.1-release/lib/libedit/ |
H A D | prompt.c | 144 prompt_set(EditLine *el, el_pfunc_t prf, char c, int op) argument 153 if (prf == NULL) { 159 p->p_func = prf; 174 prompt_get(EditLine *el, el_pfunc_t *prf, char *c, int op) argument 178 if (prf == NULL) 186 *prf = el->el_rprompt.p_func;
|
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.h | 27 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
|
H A D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, argument 26 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
H A D | ikev2_common.c | 123 const struct ikev2_prf_alg *prf; local 126 prf = ikev2_get_prf(alg); 127 if (prf == NULL) 129 hash_len = prf->hash_len; 441 const struct ikev2_prf_alg *prf; local 444 prf = ikev2_get_prf(prf_alg); 446 shared_secret == NULL || nonce == NULL || prf == NULL) 449 /* prf(SK_pi/r,IDi/r') */ 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 463 /* sign_data = msg | Nr/i | prf(SK_p 691 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument [all...] |
H A D | eap_pwd_common.h | 49 u8 prf; member in struct:eap_pwd_id
|
H A D | ikev2_common.h | 332 int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 41 const struct ikev2_prf_alg *prf; local 50 prf = ikev2_get_prf(data->proposal.prf); 52 if (integ == NULL || prf == NULL || encr == NULL) { 80 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 94 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 111 skeyseed, prf->hash_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 190 transform_id == data->proposal.prf) 191 prop->prf 608 const struct ikev2_prf_alg *prf; local 1051 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_server_ikev2.c | 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | eap_server_pwd.c | 583 (id->prf != EAP_PWD_DEFAULT_PRF)) { 745 /* build up the ciphersuite: group | random_function | prf */
|
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 37 const struct ikev2_prf_alg *prf; local 46 prf = ikev2_get_prf(data->proposal.prf); 48 if (integ == NULL || prf == NULL || encr == NULL) { 89 /* SKEYSEED = prf(Ni | Nr, g^ir) */ 107 if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 124 skeyseed, prf->hash_len); 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->prf = transform_id; 344 prop.prf 574 const struct ikev2_prf_alg *prf; local 1032 const struct ikev2_prf_alg *prf; local [all...] |
H A D | ikev2.h | 17 int prf; member in struct:ikev2_proposal_data
|
H A D | eap_ikev2.c | 118 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | eap_pwd.c | 205 (id->prf != EAP_PWD_DEFAULT_PRF)) { 471 * prf
|
/freebsd-10.1-release/contrib/llvm/utils/TableGen/ |
H A D | OptParserEmitter.cpp | 125 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 126 PrefixKeyT prfkey(prf.begin(), prf.end()); 210 std::vector<std::string> prf = R.getValueAsListOfStrings("Prefixes"); local 211 OS << Prefixes[PrefixKeyT(prf.begin(), prf.end())] << ", ";
|
/freebsd-10.1-release/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 79 ASN1_OPT(PBKDF2PARAM, prf, X509_ALGOR) 138 * If prf NID unspecified see if cipher has a preference. An error is OK 246 /* prf can stay NULL if we are using hmacWithSHA1 */ 248 kdf->prf = X509_ALGOR_new(); 249 if (!kdf->prf) 251 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL);
|
/freebsd-10.1-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.h | 120 krb5_error_code (*prf)(krb5_context, member in struct:_krb5_encryption_type
|
H A D | crypto.c | 2457 if(et->prf == NULL) { 2459 "kerberos prf for %s not supported", 2464 return (*et->prf)(context, crypto, input, output);
|
/freebsd-10.1-release/kerberos5/lib/libgssapi_krb5/ |
H A D | Makefile | 55 prf.c \
|
/freebsd-10.1-release/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 291 if (kdf->prf) 292 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
|
/freebsd-10.1-release/sys/dev/ath/ath_hal/ |
H A D | ah.c | 168 struct ath_hal_rf * const *prf; local 170 OS_SET_FOREACH(prf, ah_rfs) { 171 struct ath_hal_rf *rf = *prf;
|
/freebsd-10.1-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 556 X509_ALGOR *prf; member in struct:PBKDF2PARAM_st
|