/external/openssl/crypto/asn1/ |
D | p5_pbev2.c | 204 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local 207 if(!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set() 212 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set() 213 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set() 230 if(!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set() 237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) in PKCS5_pbkdf2_set() 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) in PKCS5_pbkdf2_set() 246 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set() 247 if (!kdf->prf) in PKCS5_pbkdf2_set() 249 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), in PKCS5_pbkdf2_set() [all …]
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 240 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { in PKCS5_v2_PBKDF2_keyivgen() 271 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen() 277 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen() 278 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen() 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen() 302 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen() 303 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen() 304 iter = ASN1_INTEGER_get(kdf->iter); in PKCS5_v2_PBKDF2_keyivgen() 311 PBKDF2PARAM_free(kdf); in PKCS5_v2_PBKDF2_keyivgen()
|
/external/srtp/srtp/ |
D | srtp.c | 319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { in srtp_kdf_init() argument 321 aes_icm_context_init(&kdf->c, key); in srtp_kdf_init() 327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, in srtp_kdf_generate() argument 336 aes_icm_set_iv(&kdf->c, &nonce); in srtp_kdf_generate() 339 aes_icm_output(&kdf->c, key, length); in srtp_kdf_generate() 345 srtp_kdf_clear(srtp_kdf_t *kdf) { in srtp_kdf_clear() argument 348 octet_string_set_to_zero((uint8_t *)kdf, sizeof(srtp_kdf_t)); in srtp_kdf_clear() 363 srtp_kdf_t kdf; in srtp_stream_init_keys() local 367 srtp_kdf_init(&kdf, (const uint8_t *)key); in srtp_stream_init_keys() 370 srtp_kdf_generate(&kdf, label_rtp_encryption, in srtp_stream_init_keys() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 54 u16 kdf; member 677 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 682 data->kdf = kdf; in eap_aka_prime_kdf_select() 688 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 699 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg() 722 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 729 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid() 744 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() 746 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid() 807 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_aka.c | 62 u16 kdf; member 665 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 670 data->kdf = kdf; in eap_aka_prime_kdf_select() 676 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 687 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) in eap_aka_prime_kdf_neg() 710 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 717 if (attr->kdf[i] == data->kdf) in eap_aka_prime_kdf_valid() 732 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() 734 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid() 795 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_aka.c | 57 u16 kdf; member 375 if (data->kdf) { in eap_aka_build_challenge() 378 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 816 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 825 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 829 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_aka.c | 51 u16 kdf; member 368 if (data->kdf) { in eap_aka_build_challenge() 371 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 809 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 818 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 822 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/external/openssh/ |
D | umac.c | 187 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function 227 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init() 602 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init() 967 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init() 981 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init() 992 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
D | KeyAgreement.java | 94 DerivationFunction kdf) in KeyAgreement() argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.h | 206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
D | eap_sim_common.c | 903 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
|
/external/openssl/apps/ |
D | speed.c | 2326 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *xoutlen); in MAIN() local 2331 kdf = KDF1_SHA1; in MAIN() 2336 kdf = NULL; in MAIN() 2340 ecdh_a[j], kdf); in MAIN() 2343 ecdh_b[j], kdf); in MAIN() 2374 ecdh_a[j], kdf); in MAIN()
|
/external/bouncycastle/patches/ |
D | android.patch | 9493 -import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 9494 -import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator; 9498 +// import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 9499 +// import org.bouncycastle.crypto.agreement.kdf.ECDHKEKGenerator; 9541 - private DerivationFunction kdf; 9543 + // private DerivationFunction kdf; 9552 - this.kdf = kdf; 9554 + // this.kdf = kdf; 9610 - if (kdf != null) 9616 + // if (kdf != null) [all …]
|
/external/bouncycastle/ |
D | bouncycastle.config | 24 org/bouncycastle/crypto/agreement/kdf \
|
/external/wpa_supplicant_8/hostapd/ |
D | ChangeLog | 107 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | ChangeLog | 42 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 141 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|