Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 19 of 19) sorted by relevance

/external/openssl/crypto/asn1/
Dp5_pbev2.c204 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local
207 if(!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set()
212 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
213 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
230 if(!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set()
237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) in PKCS5_pbkdf2_set()
239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
247 if (!kdf->prf) in PKCS5_pbkdf2_set()
249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set()
[all …]
/external/openssl/crypto/evp/
Dp5_crpt2.c240 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { in PKCS5_v2_PBKDF2_keyivgen()
271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen()
277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen()
302 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen()
303 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen()
304 iter = ASN1_INTEGER_get(kdf->iter); in PKCS5_v2_PBKDF2_keyivgen()
311 PBKDF2PARAM_free(kdf); in PKCS5_v2_PBKDF2_keyivgen()
/external/srtp/srtp/
Dsrtp.c319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { in srtp_kdf_init() argument
321 aes_icm_context_init(&kdf->c, key); in srtp_kdf_init()
327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, in srtp_kdf_generate() argument
336 aes_icm_set_iv(&kdf->c, &nonce); in srtp_kdf_generate()
339 aes_icm_output(&kdf->c, key, length); in srtp_kdf_generate()
345 srtp_kdf_clear(srtp_kdf_t *kdf) { in srtp_kdf_clear() argument
348 octet_string_set_to_zero((uint8_t *)kdf, sizeof(srtp_kdf_t)); in srtp_kdf_clear()
363 srtp_kdf_t kdf; in srtp_stream_init_keys() local
367 srtp_kdf_init(&kdf, (const uint8_t *)key); in srtp_stream_init_keys()
370 srtp_kdf_generate(&kdf, label_rtp_encryption, in srtp_stream_init_keys()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_aka.c54 u16 kdf; member
677 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
682 data->kdf = kdf; in eap_aka_prime_kdf_select()
688 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
699 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg()
722 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
729 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid()
744 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
746 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid()
807 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_aka.c62 u16 kdf; member
665 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
670 data->kdf = kdf; in eap_aka_prime_kdf_select()
676 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
687 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg()
710 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
717 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid()
732 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
734 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid()
795 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_aka.c57 u16 kdf; member
375 if (data->kdf) { in eap_aka_build_challenge()
378 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
816 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
825 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
829 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_aka.c51 u16 kdf; member
368 if (data->kdf) { in eap_aka_build_challenge()
371 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
809 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
818 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
822 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/external/openssh/
Dumac.c187 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function
227 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init()
602 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init()
967 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init()
981 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init()
992 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/
DKeyAgreement.java94 DerivationFunction kdf) in KeyAgreement() argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Deap_sim_common.h206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
Deap_sim_common.c903 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
Deap_sim_common.c898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/external/openssl/apps/
Dspeed.c2326 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *xoutlen); in MAIN() local
2331 kdf = KDF1_SHA1; in MAIN()
2336 kdf = NULL; in MAIN()
2340 ecdh_a[j], kdf); in MAIN()
2343 ecdh_b[j], kdf); in MAIN()
2374 ecdh_a[j], kdf); in MAIN()
/external/bouncycastle/patches/
Dandroid.patch9493 -import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
9494 -import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
9498 +// import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
9499 +// import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator;
9541 - private DerivationFunction kdf;
9543 + // private DerivationFunction kdf;
9552 - this.kdf = kdf;
9554 + // this.kdf = kdf;
9610 - if (kdf != null)
9616 + // if (kdf != null)
[all …]
/external/bouncycastle/
Dbouncycastle.config24 org/bouncycastle/crypto/agreement/kdf \
/external/wpa_supplicant_8/hostapd/
DChangeLog107 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
/external/wpa_supplicant_6/wpa_supplicant/
DChangeLog42 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog141 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)