/external/openssl/crypto/evp/ |
p5_crpt2.c | 177 PBKDF2PARAM *kdf = NULL; local 234 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 242 /* Now check the parameters of the kdf */ 244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 250 if (kdf->prf) 251 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 268 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 275 salt = kdf->salt->value.octet_string->data; 276 saltlen = kdf->salt->value.octet_string->length [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 62 u16 kdf; member in struct:eap_aka_data 665 u8 id, u16 kdf) 670 data->kdf = kdf; 671 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF " 676 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 687 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 692 /* No matching KDF found - fail authentication as if AUTN had been 706 /* The only allowed (and required) duplication of a KDF is the additio [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 57 u16 kdf; member in struct:eap_aka_data 375 if (data->kdf) { 376 /* Add the selected KDF into the beginning */ 378 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 812 /* KDF negotiation; to be enabled only after more than one KDF is 816 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 818 "unknown KDF"); 825 data->kdf = attr->kdf[0] [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|