/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 229 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local 232 if(!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set() 237 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set() 238 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set() 255 if(!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set() 262 if(!(kdf->keylength = M_ASN1_INTEGER_new())) in PKCS5_pbkdf2_set() 264 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set() 271 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set() 272 if (!kdf->prf) in PKCS5_pbkdf2_set() 274 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 146 private final DerivationFunction kdf; field in BaseAgreementSpi 151 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) in BaseAgreementSpi() argument 154 this.kdf = kdf; in BaseAgreementSpi() 226 if (kdf != null) in engineGenerateSecret() 266 if (kdf != null) in engineGenerateSecret() 295 kdf.init(params); in engineGenerateSecret() 298 kdf.generateBytes(keyBytes, 0, keyBytes.length); in engineGenerateSecret()
|
/external/boringssl/src/crypto/ecdh/ |
D | ecdh.c | 79 void *(*kdf)(const void *in, size_t inlen, void *out, in ECDH_compute_key() 132 if (kdf != NULL) { in ECDH_compute_key() 133 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key()
|
/external/srtp/srtp/ |
D | srtp.c | 319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { in srtp_kdf_init() argument 321 aes_icm_context_init(&kdf->c, key); in srtp_kdf_init() 327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, in srtp_kdf_generate() argument 336 aes_icm_set_iv(&kdf->c, &nonce); in srtp_kdf_generate() 339 aes_icm_output(&kdf->c, key, length); in srtp_kdf_generate() 345 srtp_kdf_clear(srtp_kdf_t *kdf) { in srtp_kdf_clear() argument 348 octet_string_set_to_zero((uint8_t *)kdf, sizeof(srtp_kdf_t)); in srtp_kdf_clear() 363 srtp_kdf_t kdf; in srtp_stream_init_keys() local 367 srtp_kdf_init(&kdf, (const uint8_t *)key); in srtp_stream_init_keys() 370 srtp_kdf_generate(&kdf, label_rtp_encryption, in srtp_stream_init_keys() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 54 u16 kdf; member 798 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 803 data->kdf = kdf; in eap_aka_prime_kdf_select() 809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg() 843 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 850 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid() 865 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() 867 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid() 928 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyAgreementSpi.java | 73 DerivationFunction kdf) in KeyAgreementSpi() argument 75 super(kaAlgorithm, kdf); in KeyAgreementSpi()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
D | KeyAgreementSpi.java | 45 DerivationFunction kdf) in KeyAgreementSpi() argument 47 super(kaAlgorithm, kdf); in KeyAgreementSpi()
|
/external/boringssl/src/include/openssl/ |
D | ecdh.h | 90 void *(*kdf)(const void *in, size_t inlen,
|
/external/tpm2/ |
D | CpriDataEcc.h | 26 TPMT_KDF_SCHEME kdf; member
|
D | tpm_types.h | 1082 TPMI_ALG_KDF kdf; member 1296 TPMT_KDF_SCHEME kdf; member 1429 TPMT_KDF_SCHEME kdf; member
|
D | Object_spt.c | 413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL) in SchemeChecks() 472 if(scheme->details.xor_.kdf == TPM_ALG_NULL) in SchemeChecks()
|
D | CryptUtil.c | 1705 parameters->kdf = curve->kdf; in CryptEccGetParameters()
|
D | tpm_generated.c | 3036 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); in TPMS_ECC_PARMS_Marshal() 3056 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size); in TPMS_ECC_PARMS_Unmarshal() 3115 total_size += TPMI_ALG_KDF_Marshal(&source->kdf, buffer, size); in TPMS_SCHEME_XOR_Marshal() 3127 result = TPMI_ALG_KDF_Unmarshal(&target->kdf, buffer, size, FALSE); in TPMS_SCHEME_XOR_Unmarshal() 6014 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); in TPMS_ALGORITHM_DETAIL_ECC_Marshal() 6038 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size); in TPMS_ALGORITHM_DETAIL_ECC_Unmarshal()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_aka.c | 51 u16 kdf; member 479 if (data->kdf) { in eap_aka_build_challenge() 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 932 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
|
/external/tpm2/generator/ |
D | structures.txt | 1269 _NAME kdf 1363 _NAME kdf 1434 _NAME kdf
|
D | raw_structures.txt | 12951 kdf 13976 kdf 14719 kdf 14725 If the kdf
|
D | raw_structures_fixed.txt | 12950 kdf 13978 kdf 14698 kdf
|
/external/bouncycastle/patches/ |
D | bcprov.patch | 2190 -import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 2191 -import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator; 2195 +// import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 2196 +// import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator; 2225 - private DerivationFunction kdf; 2227 + // private DerivationFunction kdf; 2236 - this.kdf = kdf; 2238 + // this.kdf = kdf; 2310 - if (kdf != null) 2316 + // if (kdf != null) [all …]
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 1331 : dh-std-kdf 1332 : dh-cofactor-kdf
|
/external/bouncycastle/ |
D | bouncycastle.config | 23 org/bouncycastle/crypto/agreement/kdf \
|
/external/google-tv-pairing-protocol/java/jar/ |
D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF
META-INF/BCKEY.SF
META-INF/BCKEY ... |
/external/wpa_supplicant_8/hostapd/ |
D | ChangeLog | 531 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 980 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|