/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
p5_pbev2.c | 204 PBKDF2PARAM *kdf = NULL; 207 if(!(kdf = PBKDF2PARAM_new())) 212 kdf->salt->value.octet_string = osalt; 213 kdf->salt->type = V_ASN1_OCTET_STRING; 230 if(!ASN1_INTEGER_set(kdf->iter, iter)) 237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) 246 kdf->prf = X509_ALGOR_new(); 247 if (!kdf->prf) 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid) [all...] |
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 204 PBKDF2PARAM *kdf = NULL; 207 if(!(kdf = PBKDF2PARAM_new())) 212 kdf->salt->value.octet_string = osalt; 213 kdf->salt->type = V_ASN1_OCTET_STRING; 230 if(!ASN1_INTEGER_set(kdf->iter, iter)) 237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) 246 kdf->prf = X509_ALGOR_new(); 247 if (!kdf->prf) 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
KeyAgreementSpi.java | 29 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 30 // import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator; 81 // private DerivationFunction kdf; 93 DerivationFunction kdf) 98 // this.kdf = kdf; 160 // if (kdf != null) 163 // "KDF can only be used when algorithm is known"); 194 // if (kdf != null) 206 // kdf.init(params) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 240 PBKDF2PARAM *kdf = NULL; local 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 269 /* Now check the parameters of the kdf */ 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 277 if (kdf->prf) 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 302 salt = kdf->salt->value.octet_string->data; 303 saltlen = kdf->salt->value.octet_string->length [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 240 PBKDF2PARAM *kdf = NULL; local 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 269 /* Now check the parameters of the kdf */ 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 277 if (kdf->prf) 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 302 salt = kdf->salt->value.octet_string->data; 303 saltlen = kdf->salt->value.octet_string->length [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/ecdh/ |
ech_ossl.c | 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); 106 * Finally an optional KDF is applied. 110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 191 if (KDF != 0) 193 if (KDF(buf, buflen, out, &outlen) == NULL) 202 /* no KDF, just copy as much as we can */
|
ech_key.c | 74 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 79 return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF);
|
ech_err.c | 81 {ERR_REASON(ECDH_R_KDF_FAILED) ,"KDF failed"},
|
ech_locl.h | 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/external/openssl/crypto/ecdh/ |
ech_ossl.c | 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); 106 * Finally an optional KDF is applied. 110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 191 if (KDF != 0) 193 if (KDF(buf, buflen, out, &outlen) == NULL) 202 /* no KDF, just copy as much as we can */
|
ech_key.c | 74 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 79 return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF);
|
ech_err.c | 81 {ERR_REASON(ECDH_R_KDF_FAILED) ,"KDF failed"},
|
ech_locl.h | 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 692 u8 id, u16 kdf) 697 data->kdf = kdf; 698 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF " 703 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 714 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 719 /* No matching KDF found - fail authentication as if AUTN had been 733 /* The only allowed (and required) duplication of a KDF is the addition 734 * of the selected KDF into the beginning of the list. * [all...] |
/external/openssh/ |
umac.h | 93 /* the kdf and kdf_key passed in. If kdf_key_len is 0 then RC6 is */ 94 /* used to generate key with a fixed key. If kdf_key_len > 0 but kdf */ 96 /* key for an RC6 based KDF. */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 480 /* Add the selected KDF into the beginning */ 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 919 /* KDF negotiation; to be enabled only after more than one KDF is 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 925 "unknown KDF"); 932 data->kdf = attr->kdf[0] [all...] |
/external/srtp/srtp/ |
srtp.c | 48 #include "aes_icm.h" /* aes_icm is used in the KDF */ 289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k 291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key 296 * srtp_kdf_clear(&kdf) zeroizes the kdf state 311 * default KDF is the only one implemented at present. 319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { 321 aes_icm_context_init(&kdf->c, key); 327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label 363 srtp_kdf_t kdf; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 22 * @entropy: Exchanged entropy to seed the KDF (Z) 28 * RFC 4746, Section 2.6: PAX-KDF-W(X, Y, Z)
|
eap_sake_common.c | 194 * eap_sake_kdf - EAP-SAKE Key Derivation Function (KDF) 195 * @key: Key for KDF 197 * @label: A unique label for each purpose of the KDF
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-prf.c | 38 * @key: Key for KDF
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/external/openssl/include/openssl/ |
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/external/srtp/include/ |
srtp_priv.h | 175 * deriving all of the needed keys using the KDF and the key k.
|