/external/boringssl/include/openssl/ |
H A D | ecdh.h | 83 * If |kdf| is not NULL, then it is called with the bytes of the shared key and 84 * the parameter |out|. When |kdf| returns, the value of |*outlen| becomes the 90 void *(*kdf)(const void *in, size_t inlen,
|
/external/boringssl/src/include/openssl/ |
H A D | ecdh.h | 83 * If |kdf| is not NULL, then it is called with the bytes of the shared key and 84 * the parameter |out|. When |kdf| returns, the value of |*outlen| becomes the 90 void *(*kdf)(const void *in, size_t inlen,
|
/external/tpm2/ |
H A D | CpriDataEcc.h | 26 TPMT_KDF_SCHEME kdf; member in struct:__anon17660
|
H A D | tpm_types.h | 1082 TPMI_ALG_KDF kdf; member in struct:__anon17932 1296 TPMT_KDF_SCHEME kdf; member in struct:__anon17953 1429 TPMT_KDF_SCHEME kdf; member in struct:__anon17965
|
H A D | Object_spt.c | 413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL) 472 if(scheme->details.xor_.kdf == TPM_ALG_NULL)
|
H A D | CryptUtil.c | 1706 parameters->kdf = curve->kdf;
|
H A D | tpm_generated.c | 3036 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); 3056 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size); 3115 total_size += TPMI_ALG_KDF_Marshal(&source->kdf, buffer, size); 3127 result = TPMI_ALG_KDF_Unmarshal(&target->kdf, buffer, size, FALSE); 6014 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size); 6038 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size);
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 79 void *(*kdf)(const void *in, size_t inlen, void *out, 132 if (kdf != NULL) { 133 if (kdf(buf, buflen, out, &outlen) == NULL) {
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbev2.c | 229 PBKDF2PARAM *kdf = NULL; local 232 if(!(kdf = PBKDF2PARAM_new())) 237 kdf->salt->value.octet_string = osalt; 238 kdf->salt->type = V_ASN1_OCTET_STRING; 255 if(!ASN1_INTEGER_set(kdf->iter, iter)) 262 if(!(kdf->keylength = M_ASN1_INTEGER_new())) 264 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) 271 kdf->prf = X509_ALGOR_new(); 272 if (!kdf->prf) 274 X509_ALGOR_set0(kdf [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | BaseAgreementSpi.java | 27 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters; 28 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator; 146 private final DerivationFunction kdf; field in class:BaseAgreementSpi 151 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) argument 154 this.kdf = kdf; 226 if (kdf != null) 266 if (kdf != null) 275 // if (kdf instanceof DHKEKGenerator) 288 // kdf [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
H A D | KeyAgreementSpi.java | 20 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator; 45 DerivationFunction kdf) 47 super(kaAlgorithm, kdf); 43 KeyAgreementSpi( String kaAlgorithm, DerivationFunction kdf) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | KeyAgreementSpi.java | 20 // import org.bouncycastle.crypto.agreement.kdf.ConcatenationKDFGenerator; 73 DerivationFunction kdf) 75 super(kaAlgorithm, kdf); 70 KeyAgreementSpi( String kaAlgorithm, BasicAgreement agreement, DerivationFunction kdf) argument
|
/external/srtp/srtp/ |
H A D | srtp.c | 289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k 291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key 296 * srtp_kdf_clear(&kdf) zeroizes the kdf state 319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { argument 321 aes_icm_context_init(&kdf->c, key); 327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, argument 336 aes_icm_set_iv(&kdf->c, &nonce); 339 aes_icm_output(&kdf 345 srtp_kdf_clear(srtp_kdf_t *kdf) argument 363 srtp_kdf_t kdf; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 798 u8 id, u16 kdf) 803 data->kdf = kdf; 809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 843 if (attr->kdf[0] != data->kdf) { 850 if (attr->kdf[i] == data->kdf) 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 798 u8 id, u16 kdf) 803 data->kdf = kdf; 809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 843 if (attr->kdf[0] != data->kdf) { 850 if (attr->kdf[i] == data->kdf) 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 798 u8 id, u16 kdf) 803 data->kdf = kdf; 809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 843 if (attr->kdf[0] != data->kdf) { 850 if (attr->kdf[i] == data->kdf) 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 932 data->kdf = attr->kdf[0]; 936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 932 data->kdf = attr->kdf[0]; 936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 932 data->kdf = attr->kdf[0]; 936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|