HomeSort by relevance Sort by last modified time
    Searched refs:kdf (Results 1 - 15 of 15) sorted by null

  /external/openssl/crypto/asn1/
p5_pbev2.c 204 PBKDF2PARAM *kdf = NULL;
207 if(!(kdf = PBKDF2PARAM_new()))
212 kdf->salt->value.octet_string = osalt;
213 kdf->salt->type = V_ASN1_OCTET_STRING;
230 if(!ASN1_INTEGER_set(kdf->iter, iter))
237 if(!(kdf->keylength = M_ASN1_INTEGER_new()))
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
246 kdf->prf = X509_ALGOR_new();
247 if (!kdf->prf)
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid)
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 240 PBKDF2PARAM *kdf = NULL; local
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
269 /* Now check the parameters of the kdf */
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
277 if (kdf->prf)
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
295 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
302 salt = kdf->salt->value.octet_string->data;
303 saltlen = kdf->salt->value.octet_string->length
    [all...]
  /external/srtp/srtp/
srtp.c 48 #include "aes_icm.h" /* aes_icm is used in the KDF */
289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k
291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key
296 * srtp_kdf_clear(&kdf) zeroizes the kdf state
311 * default KDF is the only one implemented at present.
319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) {
321 aes_icm_context_init(&kdf->c, key);
327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label
363 srtp_kdf_t kdf; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
62 u16 kdf; member in struct:eap_aka_data
665 u8 id, u16 kdf)
670 data->kdf = kdf;
671 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
676 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
687 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
692 /* No matching KDF found - fail authentication as if AUTN had been
706 /* The only allowed (and required) duplication of a KDF is the additio
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 54 u16 kdf; member in struct:eap_aka_data
692 u8 id, u16 kdf)
697 data->kdf = kdf;
698 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
703 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
714 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
719 /* No matching KDF found - fail authentication as if AUTN had been
733 /* The only allowed (and required) duplication of a KDF is the addition
734 * of the selected KDF into the beginning of the list. *
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
57 u16 kdf; member in struct:eap_aka_data
375 if (data->kdf) {
376 /* Add the selected KDF into the beginning */
378 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
812 /* KDF negotiation; to be enabled only after more than one KDF is
816 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
818 "unknown KDF");
825 data->kdf = attr->kdf[0]
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 51 u16 kdf; member in struct:eap_aka_data
478 if (data->kdf) {
479 /* Add the selected KDF into the beginning */
481 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
907 /* KDF negotiation; to be enabled only after more than one KDF is
911 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
913 "unknown KDF");
920 data->kdf = attr->kdf[0]
    [all...]
  /external/openssh/
umac.c 163 /* ----- Begin KDF & PDF Section ---------------------------------------- */
182 * mode to supply all random bits needed by UMAC. The kdf function takes
187 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function
227 kdf(buf, prf_key, 0, UMAC_KEY_LEN);
602 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key));
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyAgreementSpi.java 29 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
30 // import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
81 // private DerivationFunction kdf;
93 DerivationFunction kdf)
98 // this.kdf = kdf;
160 // if (kdf != null)
163 // "KDF can only be used when algorithm is known");
194 // if (kdf != null)
206 // kdf.init(params)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
eap_sim_common.c 491 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')",
903 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
eap_sim_common.c 486 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')",
898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
  /external/openssl/apps/
speed.c     [all...]
  /tools/motodev/src/plugins/certmanager/lib/
bcprov-jdk15on-147.jar 

Completed in 244 milliseconds