Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 25 of 28) sorted by relevance

12

/external/strace/
Dfetch_struct_keyctl_kdf_params.c13 struct_keyctl_kdf_params kdf; in MPERS_PRINTER_DECL() local
16 if ((ret = umove(tcp, addr, &kdf))) in MPERS_PRINTER_DECL()
23 kdf.hashname; in MPERS_PRINTER_DECL()
28 kdf.otherinfo; in MPERS_PRINTER_DECL()
29 p->otherinfolen = kdf.otherinfolen; in MPERS_PRINTER_DECL()
31 memcpy(p->__spare, kdf.__spare, sizeof(kdf.__spare)); in MPERS_PRINTER_DECL()
Dkeyctl.c257 struct strace_keyctl_kdf_params kdf; in keyctl_dh_compute() local
269 if (fetch_keyctl_kdf_params(tcp, kdf_addr, &kdf)) { in keyctl_dh_compute()
274 PRINT_FIELD_STR("{", kdf, hashname, tcp); in keyctl_dh_compute()
280 if (kdf.otherinfolen) in keyctl_dh_compute()
281 PRINT_FIELD_STRN(", ", kdf, otherinfo, in keyctl_dh_compute()
282 kdf.otherinfolen, tcp); in keyctl_dh_compute()
284 PRINT_FIELD_PTR(", ", kdf, otherinfo); in keyctl_dh_compute()
286 PRINT_FIELD_U(", ", kdf, otherinfolen); in keyctl_dh_compute()
289 for (i = 0; i < ARRAY_SIZE(kdf.__spare); i++) { in keyctl_dh_compute()
290 if (kdf.__spare[i]) in keyctl_dh_compute()
[all …]
/external/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c177 CBB algorithm, oid, param, kdf, kdf_oid, kdf_param, salt_cbb, cipher_cbb, in PKCS5_pbe2_encrypt_init() local
183 !CBB_add_asn1(&param, &kdf, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_encrypt_init()
184 !CBB_add_asn1(&kdf, &kdf_oid, CBS_ASN1_OBJECT) || in PKCS5_pbe2_encrypt_init()
186 !CBB_add_asn1(&kdf, &kdf_param, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_encrypt_init()
211 CBS pbe_param, kdf, kdf_obj, enc_scheme, enc_obj; in PKCS5_pbe2_decrypt_init() local
214 !CBS_get_asn1(&pbe_param, &kdf, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_decrypt_init()
217 !CBS_get_asn1(&kdf, &kdf_obj, CBS_ASN1_OBJECT) || in PKCS5_pbe2_decrypt_init()
239 if (!CBS_get_asn1(&kdf, &pbkdf2_params, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_decrypt_init()
240 CBS_len(&kdf) != 0 || in PKCS5_pbe2_decrypt_init()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
DBaseAgreementSpi.java142 private final DerivationFunction kdf; field in BaseAgreementSpi
146 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) in BaseAgreementSpi() argument
149 this.kdf = kdf; in BaseAgreementSpi()
221 if (kdf != null) in engineGenerateSecret()
262 if (kdf != null) in engineGenerateSecret()
293 kdf.init(params); in engineGenerateSecret()
296 kdf.generateBytes(keyBytes, 0, keyBytes.length); in engineGenerateSecret()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
DPBES2AlgorithmParameters.java45 private final AlgorithmIdentifier kdf; field in PBES2AlgorithmParameters.BasePBEWithHmacAlgorithmParameters
54 ASN1ObjectIdentifier kdf, in BasePBEWithHmacAlgorithmParameters() argument
59 this.kdf = new AlgorithmIdentifier(kdf, DERNull.INSTANCE); in BasePBEWithHmacAlgorithmParameters()
137 pbeSpec.getSalt(), pbeSpec.getIterationCount(), keySize, kdf)), in engineInit()
/external/boringssl/src/crypto/ecdh/
Decdh.c82 void *(*kdf)(const void *in, size_t inlen, void *out, in ECDH_compute_key()
135 if (kdf != NULL) { in ECDH_compute_key()
136 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key()
/external/wpa_supplicant_8/src/eap_peer/
Deap_aka.c55 u16 kdf; member
602 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure()
817 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
822 data->kdf = kdf; in eap_aka_prime_kdf_select()
828 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
839 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg()
840 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg()
872 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
886 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid()
894 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
[all …]
/external/strace/tests-m32/
Dkeyctl.c218 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument
230 } else if (!kdf->hashname) { in kckdfp_to_str()
233 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str()
235 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str()
238 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str()
245 } else if (!kdf->otherinfo) { in kckdfp_to_str()
248 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str()
250 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str()
253 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str()
256 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str()
[all …]
/external/strace/tests/
Dkeyctl.c218 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument
230 } else if (!kdf->hashname) { in kckdfp_to_str()
233 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str()
235 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str()
238 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str()
245 } else if (!kdf->otherinfo) { in kckdfp_to_str()
248 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str()
250 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str()
253 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str()
256 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str()
[all …]
/external/strace/tests-mx32/
Dkeyctl.c218 kckdfp_to_str(struct keyctl_kdf_params *kdf, bool deref_hash, bool deref_oi, in kckdfp_to_str() argument
230 } else if (!kdf->hashname) { in kckdfp_to_str()
233 append_str(&pos, &left, "\"%.*s\"", limit, kdf->hashname); in kckdfp_to_str()
235 if (strnlen(kdf->hashname, limit + 1) > limit) in kckdfp_to_str()
238 append_str(&pos, &left, "%p", kdf->hashname); in kckdfp_to_str()
245 } else if (!kdf->otherinfo) { in kckdfp_to_str()
248 append_str(&pos, &left, "\"%.*s\"", limit, kdf->otherinfo); in kckdfp_to_str()
250 if (strnlen(kdf->otherinfo, limit + 1) > limit) in kckdfp_to_str()
253 append_str(&pos, &left, "%p", kdf->otherinfo); in kckdfp_to_str()
256 append_str(&pos, &left, ", otherinfolen=%u", kdf->otherinfolen); in kckdfp_to_str()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
DKeyAgreementSpi.java67 DerivationFunction kdf) in KeyAgreementSpi() argument
69 super(kaAlgorithm, kdf); in KeyAgreementSpi()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/
DKeyAgreementSpi.java49 DerivationFunction kdf) in KeyAgreementSpi() argument
51 super(kaAlgorithm, kdf); in KeyAgreementSpi()
/external/boringssl/src/include/openssl/
Decdh.h90 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *outlen));
/external/tpm2/
DCpriDataEcc.h26 TPMT_KDF_SCHEME kdf; member
Dtpm_types.h1082 TPMI_ALG_KDF kdf; member
1299 TPMT_KDF_SCHEME kdf; member
1432 TPMT_KDF_SCHEME kdf; member
DObject_spt.c413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL) in SchemeChecks()
472 if(scheme->details.xor_.kdf == TPM_ALG_NULL) in SchemeChecks()
DCryptUtil.c1711 parameters->kdf = curve->kdf; in CryptEccGetParameters()
Dtpm_generated.c3040 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); in TPMS_ECC_PARMS_Marshal()
3060 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size); in TPMS_ECC_PARMS_Unmarshal()
3119 total_size += TPMI_ALG_KDF_Marshal(&source->kdf, buffer, size); in TPMS_SCHEME_XOR_Marshal()
3131 result = TPMI_ALG_KDF_Unmarshal(&target->kdf, buffer, size, FALSE); in TPMS_SCHEME_XOR_Unmarshal()
6018 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); in TPMS_ALGORITHM_DETAIL_ECC_Marshal()
6042 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size); in TPMS_ALGORITHM_DETAIL_ECC_Unmarshal()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_aka.c51 u16 kdf; member
479 if (data->kdf) { in eap_aka_build_challenge()
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
932 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/external/scapy/scapy/layers/tls/crypto/
Dhkdf.py16 from cryptography.hazmat.primitives.kdf.hkdf import HKDF, HKDFExpand
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
Deap_sim_common.c896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/external/scapy/scapy/modules/krack/
Dautomaton.py8 from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
/external/boringssl/src/crypto/obj/
Dobjects.txt1331 : dh-std-kdf
1332 : dh-cofactor-kdf
/external/wpa_supplicant_8/hostapd/
DChangeLog604 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)

12