HomeSort by relevance Sort by last modified time
    Searched refs:kdf (Results 1 - 25 of 43) sorted by null

1 2

  /system/keymaster/
kdf_test.cpp 17 #include "kdf.h"
24 class ForTestAbstractKdf : public Kdf {
31 TEST(KdfTest, Kdf) {
32 ForTestAbstractKdf kdf; local
35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128));
36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128));
37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0));
38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128));
39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128));
40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128))
    [all...]
ecies_kem.cpp 45 keymaster_kdf_t kdf; local
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) {
47 LOG_E("EciesKem: No KDF specified", 0);
51 switch (kdf) {
56 LOG_E("Kdf %d is unsupported", kdf);
115 LOG_E("EciesKem: KDF failed, can't derived keys", 0);
121 LOG_E("EciesKem: KDF failed, can't derived keys", 0);
170 LOG_E("%s", "EciesKem: KDF failed, can't derived keys");
177 LOG_E("%s", "EciesKem: KDF failed, can't derived keys")
    [all...]
Makefile 96 kdf.cpp \
220 kdf.o \
228 kdf.o \
238 kdf.o \
249 kdf.o \
273 kdf.o \
attestation_record.cpp 67 ASN1_INTEGER_SET* kdf; member in struct:keymaster::km_auth_list
102 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()),
296 integer_set = &record->kdf;
    [all...]
  /external/boringssl/src/include/openssl/
ecdh.h 83 * If |kdf| is not NULL, then it is called with the bytes of the shared key and
84 * the parameter |out|. When |kdf| returns, the value of |*outlen| becomes the
90 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *outlen));
  /external/tpm2/
CpriDataEcc.h 26 TPMT_KDF_SCHEME kdf; member in struct:__anon35317
tpm_types.h 1082 TPMI_ALG_KDF kdf; member in struct:__anon35589
1299 TPMT_KDF_SCHEME kdf; member in struct:__anon35610
1432 TPMT_KDF_SCHEME kdf; member in struct:__anon35622
    [all...]
Object_spt.c 116 // Determine the algorithms for the KDF and the encryption/decryption
134 // Get seed for KDF
170 // Get seed for KDF
332 // TPM_RC_KDF incorrect KDF specified for decrypting keyed hash object
412 // For now, the KDF must be TPM_ALG_NULL
413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL)
466 // is a KDF
472 if(scheme->details.xor_.kdf == TPM_ALG_NULL)
513 // TPM_RC_KDF incorrect KDF specified for decrypting keyed hash object
655 // Get a seed for KDF. The KDF for encryption and HMAC key use the same seed. It returns a pointer t
    [all...]
  /external/boringssl/src/crypto/ecdh/
ecdh.c 82 void *(*kdf)(const void *in, size_t inlen, void *out,
135 if (kdf != NULL) {
136 if (kdf(buf, buflen, out, &outlen) == NULL) {
141 /* no KDF, just copy as much as we can */
  /external/boringssl/src/crypto/pkcs8/
p5_pbev2.c 177 CBB algorithm, oid, param, kdf, kdf_oid, kdf_param, salt_cbb, cipher_cbb, local
183 !CBB_add_asn1(&param, &kdf, CBS_ASN1_SEQUENCE) ||
184 !CBB_add_asn1(&kdf, &kdf_oid, CBS_ASN1_OBJECT) ||
186 !CBB_add_asn1(&kdf, &kdf_param, CBS_ASN1_SEQUENCE) ||
211 CBS pbe_param, kdf, kdf_obj, enc_scheme, enc_obj; local
214 !CBS_get_asn1(&pbe_param, &kdf, CBS_ASN1_SEQUENCE) ||
217 !CBS_get_asn1(&kdf, &kdf_obj, CBS_ASN1_OBJECT) ||
236 /* Parse the KDF parameters. See RFC 8018, appendix A.2. */
239 if (!CBS_get_asn1(&kdf, &pbkdf2_params, CBS_ASN1_SEQUENCE) ||
240 CBS_len(&kdf) != 0 |
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
PBES2AlgorithmParameters.java 45 private final AlgorithmIdentifier kdf; field in class:PBES2AlgorithmParameters.BasePBEWithHmacAlgorithmParameters
54 ASN1ObjectIdentifier kdf,
59 this.kdf = new AlgorithmIdentifier(kdf, DERNull.INSTANCE);
137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)),
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
BaseAgreementSpi.java 26 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
27 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator;
145 private final DerivationFunction kdf; field in class:BaseAgreementSpi
149 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf)
152 this.kdf = kdf;
224 if (kdf != null)
227 "KDF can only be used when algorithm is known");
264 if (kdf != null)
273 // if (kdf instanceof DHKEKGenerator
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/
KeyAgreementSpi.java 20 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator;
50 DerivationFunction kdf)
52 super(kaAlgorithm, kdf);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyAgreementSpi.java 20 // import org.bouncycastle.crypto.agreement.kdf.ConcatenationKDFGenerator;
68 DerivationFunction kdf)
70 super(kaAlgorithm, kdf);
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 55 u16 kdf; member in struct:eap_aka_data
803 u8 id, u16 kdf)
808 data->kdf = kdf;
809 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
814 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
825 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
830 /* No matching KDF found - fail authentication as if AUTN had been
844 /* The only allowed (and required) duplication of a KDF is the addition
845 * of the selected KDF into the beginning of the list. *
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2Capability.c 565 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.keyedHashDetail.scheme.details.xor.kdf));
690 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.kdf.scheme));
692 switch (Parameters->parameters.eccDetail.kdf.scheme) {
694 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.kdf.details.mgf1.hashAlg));
698 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.kdf.details.kdf1_sp800_108.hashAlg));
702 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.kdf.details.kdf1_SP800_56a.hashAlg));
706 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.kdf.details.kdf2.hashAlg));
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 51 u16 kdf; member in struct:eap_aka_data
479 if (data->kdf) {
480 /* Add the selected KDF into the beginning */
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
919 /* KDF negotiation; to be enabled only after more than one KDF is
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
925 "unknown KDF");
932 data->kdf = attr->kdf[0]
    [all...]
  /system/vold/
cryptfs.cpp 170 SLOGE("Unknown KDF type %d", ftr->kdf_type);
1005 SLOGI("Using pbkdf2 for cryptfs KDF");
1016 SLOGI("Using scrypt for cryptfs KDF");
1036 SLOGI("Using scrypt with keymaster for cryptfs KDF");
1229 kdf_func kdf; local
    [all...]
  /external/openssh/
umac.c 149 /* ----- Begin KDF & PDF Section ---------------------------------------- */
179 * mode to supply all random bits needed by UMAC. The kdf function takes
184 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function
224 kdf(buf, prf_key, 0, UMAC_KEY_LEN);
601 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key));
    [all...]
sshkey.c 3051 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local
3199 struct sshbuf *kdf = NULL, *decrypted = NULL; local
    [all...]
  /hardware/interfaces/keymaster/3.0/vts/functional/
attestation_record.cpp 66 ASN1_INTEGER_SET* kdf; member in struct:android::hardware::keymaster::V3_0::km_auth_list
93 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.maskedTag()),
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
  /prebuilts/tools/common/m2/repository/org/bitbucket/b_c/jose4j/0.5.0/
jose4j-0.5.0.jar 
  /device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
Tpm20.h 1324 TPMI_ALG_KDF kdf; member in struct:__anon10317
1502 TPMT_KDF_SCHEME kdf; member in struct:__anon10341
1601 TPMT_KDF_SCHEME kdf; member in struct:__anon10353
    [all...]
  /prebuilts/jdk/jdk8/darwin-x86/jre/lib/ext/
sunpkcs11.jar 

Completed in 629 milliseconds

1 2