HomeSort by relevance Sort by last modified time
    Searched defs:kdf (Results 1 - 4 of 4) sorted by null

  /external/openssl/crypto/evp/
p5_crpt2.c 177 PBKDF2PARAM *kdf = NULL; local
234 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
242 /* Now check the parameters of the kdf */
244 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
250 if (kdf->prf)
251 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
268 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
275 salt = kdf->salt->value.octet_string->data;
276 saltlen = kdf->salt->value.octet_string->length
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
62 u16 kdf; member in struct:eap_aka_data
665 u8 id, u16 kdf)
670 data->kdf = kdf;
671 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
676 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
687 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
692 /* No matching KDF found - fail authentication as if AUTN had been
706 /* The only allowed (and required) duplication of a KDF is the additio
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
57 u16 kdf; member in struct:eap_aka_data
375 if (data->kdf) {
376 /* Add the selected KDF into the beginning */
378 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
812 /* KDF negotiation; to be enabled only after more than one KDF is
816 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
818 "unknown KDF");
825 data->kdf = attr->kdf[0]
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs

Completed in 89 milliseconds