Searched refs:kdf (Results 1 - 25 of 26) sorted by relevance

12

/external/boringssl/include/openssl/
H A Decdh.h83 * If |kdf| is not NULL, then it is called with the bytes of the shared key and
84 * the parameter |out|. When |kdf| returns, the value of |*outlen| becomes the
90 void *(*kdf)(const void *in, size_t inlen,
/external/boringssl/src/include/openssl/
H A Decdh.h83 * If |kdf| is not NULL, then it is called with the bytes of the shared key and
84 * the parameter |out|. When |kdf| returns, the value of |*outlen| becomes the
90 void *(*kdf)(const void *in, size_t inlen,
/external/tpm2/
H A DCpriDataEcc.h26 TPMT_KDF_SCHEME kdf; member in struct:__anon17660
H A Dtpm_types.h1082 TPMI_ALG_KDF kdf; member in struct:__anon17932
1296 TPMT_KDF_SCHEME kdf; member in struct:__anon17953
1429 TPMT_KDF_SCHEME kdf; member in struct:__anon17965
H A DObject_spt.c413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL)
472 if(scheme->details.xor_.kdf == TPM_ALG_NULL)
H A DCryptUtil.c1706 parameters->kdf = curve->kdf;
H A Dtpm_generated.c3036 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size);
3056 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size);
3115 total_size += TPMI_ALG_KDF_Marshal(&source->kdf, buffer, size);
3127 result = TPMI_ALG_KDF_Unmarshal(&target->kdf, buffer, size, FALSE);
6014 total_size += TPMT_KDF_SCHEME_Marshal(&source->kdf, buffer, size);
6038 result = TPMT_KDF_SCHEME_Unmarshal(&target->kdf, buffer, size);
/external/boringssl/src/crypto/ecdh/
H A Decdh.c79 void *(*kdf)(const void *in, size_t inlen, void *out,
132 if (kdf != NULL) {
133 if (kdf(buf, buflen, out, &outlen) == NULL) {
/external/boringssl/src/crypto/pkcs8/
H A Dp5_pbev2.c229 PBKDF2PARAM *kdf = NULL; local
232 if(!(kdf = PBKDF2PARAM_new()))
237 kdf->salt->value.octet_string = osalt;
238 kdf->salt->type = V_ASN1_OCTET_STRING;
255 if(!ASN1_INTEGER_set(kdf->iter, iter))
262 if(!(kdf->keylength = M_ASN1_INTEGER_new()))
264 if(!ASN1_INTEGER_set (kdf->keylength, keylen))
271 kdf->prf = X509_ALGOR_new();
272 if (!kdf->prf)
274 X509_ALGOR_set0(kdf
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
H A DBaseAgreementSpi.java27 // import org.bouncycastle.crypto.agreement.kdf.DHKDFParameters;
28 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator;
146 private final DerivationFunction kdf; field in class:BaseAgreementSpi
151 public BaseAgreementSpi(String kaAlgorithm, DerivationFunction kdf) argument
154 this.kdf = kdf;
226 if (kdf != null)
266 if (kdf != null)
275 // if (kdf instanceof DHKEKGenerator)
288 // kdf
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/
H A DKeyAgreementSpi.java20 // import org.bouncycastle.crypto.agreement.kdf.DHKEKGenerator;
45 DerivationFunction kdf)
47 super(kaAlgorithm, kdf);
43 KeyAgreementSpi( String kaAlgorithm, DerivationFunction kdf) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
H A DKeyAgreementSpi.java20 // import org.bouncycastle.crypto.agreement.kdf.ConcatenationKDFGenerator;
73 DerivationFunction kdf)
75 super(kaAlgorithm, kdf);
70 KeyAgreementSpi( String kaAlgorithm, BasicAgreement agreement, DerivationFunction kdf) argument
/external/srtp/srtp/
H A Dsrtp.c289 * srtp_kdf_init(&kdf, k) initializes kdf with the key k
291 * srtp_kdf_generate(&kdf, l, kl, keylen) derives the key
296 * srtp_kdf_clear(&kdf) zeroizes the kdf state
319 srtp_kdf_init(srtp_kdf_t *kdf, const uint8_t key[30]) { argument
321 aes_icm_context_init(&kdf->c, key);
327 srtp_kdf_generate(srtp_kdf_t *kdf, srtp_prf_label label, argument
336 aes_icm_set_iv(&kdf->c, &nonce);
339 aes_icm_output(&kdf
345 srtp_kdf_clear(srtp_kdf_t *kdf) argument
363 srtp_kdf_t kdf; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c54 u16 kdf; member in struct:eap_aka_data
798 u8 id, u16 kdf)
803 data->kdf = kdf;
809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
843 if (attr->kdf[0] != data->kdf) {
850 if (attr->kdf[i] == data->kdf)
797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c54 u16 kdf; member in struct:eap_aka_data
798 u8 id, u16 kdf)
803 data->kdf = kdf;
809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
843 if (attr->kdf[0] != data->kdf) {
850 if (attr->kdf[i] == data->kdf)
797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c54 u16 kdf; member in struct:eap_aka_data
798 u8 id, u16 kdf)
803 data->kdf = kdf;
809 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
820 if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
843 if (attr->kdf[0] != data->kdf) {
850 if (attr->kdf[i] == data->kdf)
797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c51 u16 kdf; member in struct:eap_aka_data
479 if (data->kdf) {
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
932 data->kdf = attr->kdf[0];
936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_aka.c51 u16 kdf; member in struct:eap_aka_data
479 if (data->kdf) {
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
932 data->kdf = attr->kdf[0];
936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c51 u16 kdf; member in struct:eap_aka_data
479 if (data->kdf) {
482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
932 data->kdf = attr->kdf[0];
936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
H A Deap_sim_common.c898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
H A Deap_sim_common.c898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
H A Deap_sim_common.c898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);

Completed in 755 milliseconds

12