/external/strace/ |
D | fetch_struct_keyctl_kdf_params.c | 13 struct_keyctl_kdf_params kdf; in MPERS_PRINTER_DECL() local 16 if ((ret = umove(tcp, addr, &kdf))) in MPERS_PRINTER_DECL() 23 kdf.hashname; in MPERS_PRINTER_DECL() 28 kdf.otherinfo; in MPERS_PRINTER_DECL() 29 p->otherinfolen = kdf.otherinfolen; in MPERS_PRINTER_DECL() 31 memcpy(p->__spare, kdf.__spare, sizeof(kdf.__spare)); in MPERS_PRINTER_DECL()
|
D | keyctl.c | 248 struct strace_keyctl_kdf_params kdf; in keyctl_dh_compute() local 260 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) { in keyctl_dh_compute() 265 PRINT_FIELD_STR("{", kdf, hashname, tcp); in keyctl_dh_compute() 271 if (kdf.otherinfolen) in keyctl_dh_compute() 272 PRINT_FIELD_STRN(", ", kdf, otherinfo, in keyctl_dh_compute() 273 kdf.otherinfolen, tcp); in keyctl_dh_compute() 275 PRINT_FIELD_PTR(", ", kdf, otherinfo); in keyctl_dh_compute() 277 PRINT_FIELD_U(", ", kdf, otherinfolen); in keyctl_dh_compute() 280 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) { in keyctl_dh_compute() 281 if (kdf.__spare[i]) in keyctl_dh_compute() [all …]
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 177 CBB algorithm, oid, param, kdf, kdf_oid, kdf_param, salt_cbb, cipher_cbb, in PKCS5_pbe2_encrypt_init() local 183 !CBB_add_asn1(¶m, &kdf, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_encrypt_init() 184 !CBB_add_asn1(&kdf, &kdf_oid, CBS_ASN1_OBJECT) || in PKCS5_pbe2_encrypt_init() 186 !CBB_add_asn1(&kdf, &kdf_param, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_encrypt_init() 211 CBS pbe_param, kdf, kdf_obj, enc_scheme, enc_obj; in PKCS5_pbe2_decrypt_init() local 214 !CBS_get_asn1(&pbe_param, &kdf, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_decrypt_init() 217 !CBS_get_asn1(&kdf, &kdf_obj, CBS_ASN1_OBJECT) || in PKCS5_pbe2_decrypt_init() 239 if (!CBS_get_asn1(&kdf, &pbkdf2_params, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_decrypt_init() 240 CBS_len(&kdf) != 0 || in PKCS5_pbe2_decrypt_init()
|
/external/boringssl/src/crypto/ecdh_extra/ |
D | ecdh_extra.c | 82 void *(*kdf)(const void *in, size_t inlen, void *out, in ECDH_compute_key() 105 if (kdf != NULL) { in ECDH_compute_key() 106 if (kdf(buf, buf_len, out, &out_len) == NULL) { in ECDH_compute_key()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 148 protected final DerivationFunction kdf; field in BaseAgreementSpi 152 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) in BaseAgreementSpi() argument 155 this.kdf = kdf; in BaseAgreementSpi() 227 if (kdf != null) in engineGenerateSecret() 289 if (kdf != null) in getSharedSecretBytes() 324 kdf.init(params); in getSharedSecretBytes() 327 kdf.generateBytes(keyBytes, 0, keyBytes.length); in getSharedSecretBytes()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 152 protected final DerivationFunction kdf; field in BaseAgreementSpi 156 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) in BaseAgreementSpi() argument 159 this.kdf = kdf; in BaseAgreementSpi() 231 if (kdf != null) in engineGenerateSecret() 293 if (kdf != null) in getSharedSecretBytes() 328 kdf.init(params); in getSharedSecretBytes() 331 kdf.generateBytes(keyBytes, 0, keyBytes.length); in getSharedSecretBytes()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
D | KeyAgreementSpi.java | 76 DerivationFunction kdf) in KeyAgreementSpi() argument 78 super(kaAlgorithm, kdf); in KeyAgreementSpi() 101 DerivationFunction kdf) in KeyAgreementSpi() argument 103 super(kaAlgorithm, kdf); in KeyAgreementSpi() 345 if (kdf == null) in engineInit()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | PBES2AlgorithmParameters.java | 45 private final AlgorithmIdentifier kdf; field in PBES2AlgorithmParameters.BasePBEWithHmacAlgorithmParameters 54 ASN1ObjectIdentifier kdf, in BasePBEWithHmacAlgorithmParameters() argument 59 this.kdf = new AlgorithmIdentifier(kdf, DERNull.INSTANCE); in BasePBEWithHmacAlgorithmParameters() 137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)), in engineInit()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
D | KeyAgreementSpi.java | 78 DerivationFunction kdf) in KeyAgreementSpi() argument 80 super(kaAlgorithm, kdf); in KeyAgreementSpi() 103 DerivationFunction kdf) in KeyAgreementSpi() argument 105 super(kaAlgorithm, kdf); in KeyAgreementSpi() 347 if (kdf == null) in engineInit()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/ |
D | PBES2AlgorithmParameters.java | 49 private final AlgorithmIdentifier kdf; field in PBES2AlgorithmParameters.BasePBEWithHmacAlgorithmParameters 58 ASN1ObjectIdentifier kdf, in BasePBEWithHmacAlgorithmParameters() argument 63 this.kdf = new AlgorithmIdentifier(kdf, DERNull.INSTANCE); in BasePBEWithHmacAlgorithmParameters() 141 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)), in engineInit()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 55 u16 kdf; member 613 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure() 828 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 833 data->kdf = kdf; in eap_aka_prime_kdf_select() 839 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 850 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg() 851 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg() 883 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 897 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid() 905 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() [all …]
|
/external/strace/tests-mx32/ |
D | keyctl.c | 231 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument 243 } else if (!kdf->hashname) { in kckdfp_to_str() 246 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str() 248 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str() 251 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str() 258 } else if (!kdf->otherinfo) { in kckdfp_to_str() 261 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str() 263 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str() 266 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str() 269 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str() [all …]
|
/external/strace/tests/ |
D | keyctl.c | 231 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument 243 } else if (!kdf->hashname) { in kckdfp_to_str() 246 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str() 248 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str() 251 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str() 258 } else if (!kdf->otherinfo) { in kckdfp_to_str() 261 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str() 263 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str() 266 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str() 269 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str() [all …]
|
/external/strace/tests-m32/ |
D | keyctl.c | 231 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument 243 } else if (!kdf->hashname) { in kckdfp_to_str() 246 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str() 248 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str() 251 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str() 258 } else if (!kdf->otherinfo) { in kckdfp_to_str() 261 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str() 263 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str() 266 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str() 269 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyAgreementSpi.java | 74 DerivationFunction kdf) in KeyAgreementSpi() argument 76 super(kaAlgorithm, kdf); in KeyAgreementSpi() 329 if (kdf == null && parameterSpec instanceof UserKeyingMaterialSpec) in initFromKey()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyAgreementSpi.java | 76 DerivationFunction kdf) in KeyAgreementSpi() argument 78 super(kaAlgorithm, kdf); in KeyAgreementSpi() 331 if (kdf == null && parameterSpec instanceof UserKeyingMaterialSpec) in initFromKey()
|
/external/boringssl/src/include/openssl/ |
D | ecdh.h | 90 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_aka.c | 51 u16 kdf; member 479 if (data->kdf) { in eap_aka_build_challenge() 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 927 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 936 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 940 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/external/openssh/ |
D | umac.c | 184 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function 224 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init() 601 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init() 966 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init() 980 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init() 991 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
|
D | sshkey.c | 3051 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local 3069 if ((kdf = sshbuf_new()) == NULL || in sshkey_private_to_blob2() 3090 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in sshkey_private_to_blob2() 3091 (r = sshbuf_put_u32(kdf, rounds)) != 0) in sshkey_private_to_blob2() 3105 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2() 3168 sshbuf_free(kdf); in sshkey_private_to_blob2() 3199 struct sshbuf *kdf = NULL, *decrypted = NULL; in sshkey_parse_private2() local 3266 (r = sshbuf_froms(decoded, &kdf)) != 0 || in sshkey_parse_private2() 3312 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || in sshkey_parse_private2() 3313 (r = sshbuf_get_u32(kdf, &rounds)) != 0) in sshkey_parse_private2() [all …]
|
/external/scapy/scapy/layers/tls/crypto/ |
D | hkdf.py | 16 from cryptography.hazmat.primitives.kdf.hkdf import HKDF, HKDFExpand
|
/external/epid-sdk/epid/member/tpm2/ibm_tss/ |
D | createprimary.c | 69 in.inPublic.publicArea.parameters.eccDetail.kdf.scheme = TPM_ALG_NULL; in Tpm2CreatePrimary()
|
D | load_external.c | 102 ecc_details->kdf.scheme = TPM_ALG_NULL; in Tpm2LoadExternal()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
/external/syzkaller/sys/linux/ |
D | key.txt | 46 … params ptr[in, keyctl_dh_params], buffer buffer[out], buflen len[buffer], kdf ptr[in, keyctl_kdf_…
|