/external/strace/ |
fetch_struct_keyctl_kdf_params.c | 13 struct_keyctl_kdf_params kdf; local 16 if ((ret = umove(tcp, addr, &kdf))) 23 kdf.hashname; 28 kdf.otherinfo; 29 p->otherinfolen = kdf.otherinfolen; 31 memcpy(p->__spare, kdf.__spare, sizeof(kdf.__spare));
|
keyctl.c | 257 struct strace_keyctl_kdf_params kdf; local 269 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) { 274 PRINT_FIELD_STR("{", kdf, hashname, tcp); 280 if (kdf.otherinfolen) 281 PRINT_FIELD_STRN(", ", kdf, otherinfo, 282 kdf.otherinfolen, tcp); 284 PRINT_FIELD_PTR(", ", kdf, otherinfo); 286 PRINT_FIELD_U(", ", kdf, otherinfolen); 289 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) { 290 if (kdf.__spare[i] [all...] |
/system/keymaster/km_openssl/ |
ecies_kem.cpp | 45 keymaster_kdf_t kdf; local 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { 47 LOG_E("EciesKem: No KDF specified", 0); 51 switch (kdf) { 56 LOG_E("Kdf %d is unsupported", kdf); 115 LOG_E("EciesKem: KDF failed, can't derived keys", 0); 121 LOG_E("EciesKem: KDF failed, can't derived keys", 0); 170 LOG_E("%s", "EciesKem: KDF failed, can't derived keys"); 177 LOG_E("%s", "EciesKem: KDF failed, can't derived keys") [all...] |
/system/keymaster/tests/ |
kdf_test.cpp | 17 #include <keymaster/km_openssl/kdf.h> 24 class ForTestAbstractKdf : public Kdf { 31 TEST(KdfTest, Kdf) { 32 ForTestAbstractKdf kdf; local 35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128)); 36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128)); 37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0)); 38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128)); 39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128)); 40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128)) [all...] |
/external/tpm2/ |
CpriDataEcc.h | 26 TPMT_KDF_SCHEME kdf; member in struct:__anon40330
|
tpm_types.h | 1082 TPMI_ALG_KDF kdf; member in struct:__anon40602 1299 TPMT_KDF_SCHEME kdf; member in struct:__anon40623 1432 TPMT_KDF_SCHEME kdf; member in struct:__anon40635 [all...] |
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 177 CBB algorithm, oid, param, kdf, kdf_oid, kdf_param, salt_cbb, cipher_cbb, local 183 !CBB_add_asn1(¶m, &kdf, CBS_ASN1_SEQUENCE) || 184 !CBB_add_asn1(&kdf, &kdf_oid, CBS_ASN1_OBJECT) || 186 !CBB_add_asn1(&kdf, &kdf_param, CBS_ASN1_SEQUENCE) || 211 CBS pbe_param, kdf, kdf_obj, enc_scheme, enc_obj; local 214 !CBS_get_asn1(&pbe_param, &kdf, CBS_ASN1_SEQUENCE) || 217 !CBS_get_asn1(&kdf, &kdf_obj, CBS_ASN1_OBJECT) || 236 // Parse the KDF parameters. See RFC 8018, appendix A.2. 239 if (!CBS_get_asn1(&kdf, &pbkdf2_params, CBS_ASN1_SEQUENCE) || 240 CBS_len(&kdf) != 0 | [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
PBES2AlgorithmParameters.java | 45 private final AlgorithmIdentifier kdf; field in class:PBES2AlgorithmParameters.BasePBEWithHmacAlgorithmParameters 54 ASN1ObjectIdentifier kdf, 59 this.kdf = new AlgorithmIdentifier(kdf, DERNull.INSTANCE); 137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)),
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
attestation_record.cpp | 66 ASN1_INTEGER_SET* kdf; member in struct:android::hardware::keymaster::V3_0::km_auth_list 93 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.maskedTag()),
|
/system/keymaster/include/keymaster/ |
attestation_record.h | 64 ASN1_INTEGER_SET* kdf; member in struct:keymaster::km_auth_list 103 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()),
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 480 /* Add the selected KDF into the beginning */ 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 919 /* KDF negotiation; to be enabled only after more than one KDF is 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 925 "unknown KDF"); 932 data->kdf = attr->kdf[0] [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
BaseAgreementSpi.java | 25 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 26 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator; 142 private final DerivationFunction kdf; field in class:BaseAgreementSpi 146 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) 149 this.kdf = kdf; 221 if (kdf != null) 224 "KDF can only be used when algorithm is known"); 262 if (kdf != null) 272 if (kdf instanceof DHKEKGenerator [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 55 u16 kdf; member in struct:eap_aka_data 602 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], 817 u8 id, u16 kdf) 822 data->kdf = kdf; 823 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF " 828 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 839 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { 840 os_memcpy(data->last_kdf_attrs, attr->kdf, 848 /* No matching KDF found - fail authentication as if AUTN had bee [all...] |
/system/vold/ |
cryptfs.cpp | 180 SLOGE("Unknown KDF type %d", ftr->kdf_type); 1408 kdf_func kdf; local [all...] |
/prebuilts/tools/common/m2/repository/org/bitbucket/b_c/jose4j/0.5.0/ |
jose4j-0.5.0.jar | |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
Tpm20.h | 1324 TPMI_ALG_KDF kdf; member in struct:__anon10038 1502 TPMT_KDF_SCHEME kdf; member in struct:__anon10062 1601 TPMT_KDF_SCHEME kdf; member in struct:__anon10074 [all...] |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/ext/ |
sunpkcs11.jar | |
sunjce_provider.jar | |
/prebuilts/jdk/jdk8/linux-x86/jre/lib/ext/ |
sunpkcs11.jar | |
/system/tpm/trunks/ |
tpm_generated.h | 1317 TPMI_ALG_KDF kdf; member in struct:trunks::TPMS_SCHEME_XOR 1447 TPMT_KDF_SCHEME kdf; member in struct:trunks::TPMS_ALGORITHM_DETAIL_ECC 1522 TPMT_KDF_SCHEME kdf; member in struct:trunks::TPMS_ECC_PARMS [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/prebuilts/misc/common/robolectric/3.1.1/lib/ |
bcprov-jdk16-1.46.jar | |
/prebuilts/misc/common/robolectric/3.4.2/lib/ |
bcprov-jdk16-1.46.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk16/1.46/ |
bcprov-jdk16-1.46.jar | |