HomeSort by relevance Sort by last modified time
    Searched full:kdf (Results 1 - 25 of 60) sorted by null

1 2 3

  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
p5_pbev2.c 204 PBKDF2PARAM *kdf = NULL;
207 if(!(kdf = PBKDF2PARAM_new()))
212 kdf->salt->value.octet_string = osalt;
213 kdf->salt->type = V_ASN1_OCTET_STRING;
230 if(!ASN1_INTEGER_set(kdf->iter, iter))
237 if(!(kdf->keylength = M_ASN1_INTEGER_new()))
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
246 kdf->prf = X509_ALGOR_new();
247 if (!kdf->prf)
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid)
    [all...]
  /external/openssl/crypto/asn1/
p5_pbev2.c 204 PBKDF2PARAM *kdf = NULL;
207 if(!(kdf = PBKDF2PARAM_new()))
212 kdf->salt->value.octet_string = osalt;
213 kdf->salt->type = V_ASN1_OCTET_STRING;
230 if(!ASN1_INTEGER_set(kdf->iter, iter))
237 if(!(kdf->keylength = M_ASN1_INTEGER_new()))
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
246 kdf->prf = X509_ALGOR_new();
247 if (!kdf->prf)
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyAgreementSpi.java 29 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
30 // import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
81 // private DerivationFunction kdf;
93 DerivationFunction kdf)
98 // this.kdf = kdf;
160 // if (kdf != null)
163 // "KDF can only be used when algorithm is known");
194 // if (kdf != null)
206 // kdf.init(params)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 240 PBKDF2PARAM *kdf = NULL; local
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
269 /* Now check the parameters of the kdf */
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
277 if (kdf->prf)
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
295 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
302 salt = kdf->salt->value.octet_string->data;
303 saltlen = kdf->salt->value.octet_string->length
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 262 PBKDF2PARAM *kdf = NULL; local
284 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
291 /* Now check the parameters of the kdf */
293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
299 if (kdf->prf)
300 prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
317 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
324 salt = kdf->salt->value.octet_string->data;
325 saltlen = kdf->salt->value.octet_string->length
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_key.c 33 /* IEEE Std 802.1X-2010, 6.2.1 KDF */
80 * CAK = KDF(Key, Label, mac1 | mac2, CAKlength)
97 * CKN = KDF(Key, Label, ID | mac1 | mac2, CKNlength)
126 * KEK = KDF(Key, Label, Keyid, KEKLength)
146 * ICK = KDF(Key, Label, Keyid, ICKLength)
183 * SAK = KDF(Key, Label, KS-nonce | MI-value list | KN, SAKLength)
  /external/chromium_org/third_party/openssl/openssl/crypto/ecdh/
ech_ossl.c 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
106 * Finally an optional KDF is applied.
110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
191 if (KDF != 0)
193 if (KDF(buf, buflen, out, &outlen) == NULL)
202 /* no KDF, just copy as much as we can */
ech_key.c 74 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
79 return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF);
ech_err.c 81 {ERR_REASON(ECDH_R_KDF_FAILED) ,"KDF failed"},
ech_locl.h 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
ecdh.h 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
  /external/openssl/crypto/ecdh/
ech_ossl.c 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
106 * Finally an optional KDF is applied.
110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
191 if (KDF != 0)
193 if (KDF(buf, buflen, out, &outlen) == NULL)
202 /* no KDF, just copy as much as we can */
ech_key.c 74 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
79 return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF);
ech_err.c 81 {ERR_REASON(ECDH_R_KDF_FAILED) ,"KDF failed"},
ech_locl.h 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 54 u16 kdf; member in struct:eap_aka_data
798 u8 id, u16 kdf)
803 data->kdf = kdf;
804 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
825 /* No matching KDF found - fail authentication as if AUTN had been
839 /* The only allowed (and required) duplication of a KDF is the addition
840 * of the selected KDF into the beginning of the list. *
    [all...]
  /external/chromium_org/third_party/libsrtp/srtp/srtp/
srtp.c 333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher
336 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key
341 * srtp_kdf_clear(&kdf) zeroizes and deallocates the kdf state
356 * default KDF is the only one implemented at present.
364 srtp_kdf_init(srtp_kdf_t *kdf, cipher_type_id_t cipher_id, const uint8_t *key, int length) {
367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length);
371 stat = cipher_init(kdf->cipher, key, direction_encrypt);
373 cipher_dealloc(kdf->cipher)
439 srtp_kdf_t kdf; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 51 u16 kdf; member in struct:eap_aka_data
479 if (data->kdf) {
480 /* Add the selected KDF into the beginning */
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
919 /* KDF negotiation; to be enabled only after more than one KDF is
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
925 "unknown KDF");
932 data->kdf = attr->kdf[0]
    [all...]
  /external/srtp/srtp/
srtp.c 48 #include "aes_icm.h" /* aes_icm is used in the KDF */
289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k
291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key
296 * srtp_kdf_clear(&kdf) zeroizes the kdf state
311 * default KDF is the only one implemented at present.
319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) {
321 aes_icm_context_init(&kdf->c, key);
327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label
363 srtp_kdf_t kdf; local
    [all...]
  /external/chromium_org/net/quic/crypto/
crypto_server_config_protobuf.h 131 // It can be of any length as it is fed into a KDF before use.
  /external/wpa_supplicant_8/src/eap_common/
eap_pax_common.c 22 * @entropy: Exchanged entropy to seed the KDF (Z)
28 * RFC 4746, Section 2.6: PAX-KDF-W(X, Y, Z)
eap_sake_common.c 194 * eap_sake_kdf - EAP-SAKE Key Derivation Function (KDF)
195 * @key: Key for KDF
197 * @label: A unique label for each purpose of the KDF
  /external/wpa_supplicant_8/src/crypto/
sha256-prf.c 38 * @key: Key for KDF
  /system/vold/
cryptfs.c 259 SLOGE("Unknown KDF type %d", ftr->kdf_type);
1398 kdf_func kdf; local
1731 kdf_func kdf; local
    [all...]
  /external/chromium_org/third_party/libsrtp/srtp/include/
srtp_priv.h 175 * deriving all of the needed keys using the KDF and the key k.

Completed in 4409 milliseconds

1 2 3