/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 240 PBKDF2PARAM *kdf = NULL; local 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 269 /* Now check the parameters of the kdf */ 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 277 if (kdf->prf) 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 302 salt = kdf->salt->value.octet_string->data; 303 saltlen = kdf->salt->value.octet_string->length [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 240 PBKDF2PARAM *kdf = NULL; local 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 269 /* Now check the parameters of the kdf */ 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 277 if (kdf->prf) 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 302 salt = kdf->salt->value.octet_string->data; 303 saltlen = kdf->salt->value.octet_string->length [all...] |
/external/srtp/srtp/ |
srtp.c | 48 #include "aes_icm.h" /* aes_icm is used in the KDF */ 289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k 291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key 296 * srtp_kdf_clear(&kdf) zeroizes the kdf state 311 * default KDF is the only one implemented at present. 319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { 321 aes_icm_context_init(&kdf->c, key); 327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label 363 srtp_kdf_t kdf; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 480 /* Add the selected KDF into the beginning */ 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 919 /* KDF negotiation; to be enabled only after more than one KDF is 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 925 "unknown KDF"); 932 data->kdf = attr->kdf[0] [all...] |
/external/openssh/ |
umac.c | 163 /* ----- Begin KDF & PDF Section ---------------------------------------- */ 182 * mode to supply all random bits needed by UMAC. The kdf function takes 187 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function 227 kdf(buf, prf_key, 0, UMAC_KEY_LEN); 602 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 692 u8 id, u16 kdf) 697 data->kdf = kdf; 698 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF " 703 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 714 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 719 /* No matching KDF found - fail authentication as if AUTN had been 733 /* The only allowed (and required) duplication of a KDF is the addition 734 * of the selected KDF into the beginning of the list. * [all...] |
/system/vold/ |
cryptfs.c | 931 kdf_func kdf, void *kdf_params) 938 kdf(passwd, salt, ikey, kdf_params); 961 static void get_kdf_func(struct crypt_mnt_ftr *ftr, kdf_func *kdf, void** kdf_params) 964 *kdf = scrypt; 967 *kdf = pbkdf2; 975 kdf_func kdf; local 979 get_kdf_func(crypt_ftr, &kdf, &kdf_params); 980 ret = decrypt_master_key_aux(passwd, crypt_ftr->salt, crypt_ftr->master_key, decrypted_master_key, kdf, 1205 kdf_func kdf; local [all...] |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |