Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 18 of 18) sorted by relevance

/external/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c227 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local
230 if(!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set()
235 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
236 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
253 if(!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set()
260 if(!(kdf->keylength = M_ASN1_INTEGER_new())) in PKCS5_pbkdf2_set()
262 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
269 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
270 if (!kdf->prf) in PKCS5_pbkdf2_set()
272 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
[all …]
/external/srtp/srtp/
Dsrtp.c319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { in srtp_kdf_init() argument
321 aes_icm_context_init(&kdf->c, key); in srtp_kdf_init()
327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, in srtp_kdf_generate() argument
336 aes_icm_set_iv(&kdf->c, &nonce); in srtp_kdf_generate()
339 aes_icm_output(&kdf->c, key, length); in srtp_kdf_generate()
345 srtp_kdf_clear(srtp_kdf_t *kdf) { in srtp_kdf_clear() argument
348 octet_string_set_to_zero((uint8_t *)kdf, sizeof(srtp_kdf_t)); in srtp_kdf_clear()
363 srtp_kdf_t kdf; in srtp_stream_init_keys() local
367 srtp_kdf_init(&kdf, (const uint8_t *)key); in srtp_stream_init_keys()
370 srtp_kdf_generate(&kdf, label_rtp_encryption, in srtp_stream_init_keys()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_aka.c54 u16 kdf; member
798 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
803 data->kdf = kdf; in eap_aka_prime_kdf_select()
809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg()
843 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
850 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid()
865 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
867 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid()
928 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_aka.c51 u16 kdf; member
479 if (data->kdf) { in eap_aka_build_challenge()
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
932 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/external/openssh/
Dumac.c190 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function
230 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init()
607 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init()
972 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init()
986 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init()
997 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
Dsshkey.c3056 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local
3076 if ((kdf = sshbuf_new()) == NULL || in sshkey_private_to_blob2()
3097 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in sshkey_private_to_blob2()
3098 (r = sshbuf_put_u32(kdf, rounds)) != 0) in sshkey_private_to_blob2()
3112 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2()
3175 sshbuf_free(kdf); in sshkey_private_to_blob2()
3206 struct sshbuf *kdf = NULL, *decrypted = NULL; in sshkey_parse_private2() local
3274 (r = sshbuf_froms(decoded, &kdf)) != 0 || in sshkey_parse_private2()
3319 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || in sshkey_parse_private2()
3320 (r = sshbuf_get_u32(kdf, &rounds)) != 0) in sshkey_parse_private2()
[all …]
DChangeLog4305 correct test that kdf name is not "none" or "bcrypt"
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
Deap_sim_common.c898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
DKeyAgreementSpi.java111 DerivationFunction kdf) in KeyAgreementSpi() argument
/external/bouncycastle/patches/
Dbcprov.patch2022 -import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
2023 -import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
2027 +// import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
2028 +// import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
2057 - private DerivationFunction kdf;
2059 + // private DerivationFunction kdf;
2068 - this.kdf = kdf;
2070 + // this.kdf = kdf;
2126 - if (kdf != null)
2132 + // if (kdf != null)
[all …]
/external/wpa_supplicant_8/hostapd/
DMakefile769 OBJS += ../src/crypto/sha256-kdf.o
DChangeLog495 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
/external/boringssl/src/crypto/obj/
Dobjects.txt1331 : dh-std-kdf
1332 : dh-cofactor-kdf
/external/bouncycastle/
Dbouncycastle.config23 org/bouncycastle/crypto/agreement/kdf \
/external/google-tv-pairing-protocol/java/jar/
Dbcprov-jdk15-143.jarMETA-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY ...
/external/wpa_supplicant_8/wpa_supplicant/
DMakefile1266 OBJS += ../src/crypto/sha256-kdf.o
DChangeLog917 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)