Searched defs:kdf (Results 1 - 5 of 5) sorted by relevance

/system/keymaster/tests/
H A Dkdf_test.cpp17 #include <keymaster/km_openssl/kdf.h>
32 ForTestAbstractKdf kdf; local
35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128));
36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128));
37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0));
38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128));
39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128));
40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128));
41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128));
/system/keymaster/km_openssl/
H A Decies_kem.cpp45 keymaster_kdf_t kdf; local
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) {
51 switch (kdf) {
56 LOG_E("Kdf %d is unsupported", kdf);
/system/keymaster/include/keymaster/
H A Dattestation_record.h64 ASN1_INTEGER_SET* kdf; member in struct:keymaster::km_auth_list
103 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()),
/system/vold/
H A Dcryptfs.cpp1341 kdf_func kdf, void *kdf_params,
1351 if (kdf(passwd, salt, ikey, kdf_params)) {
1352 SLOGE("kdf failed");
1389 static void get_kdf_func(struct crypt_mnt_ftr *ftr, kdf_func *kdf, void** kdf_params) argument
1392 *kdf = scrypt_keymaster;
1395 *kdf = scrypt;
1398 *kdf = pbkdf2;
1408 kdf_func kdf; local
1412 get_kdf_func(crypt_ftr, &kdf, &kdf_params);
1415 decrypted_master_key, kdf, kdf_param
1337 decrypt_master_key_aux(const char *passwd, unsigned char *salt, const unsigned char *encrypted_master_key, size_t keysize, unsigned char *decrypted_master_key, kdf_func kdf, void *kdf_params, unsigned char** intermediate_key, size_t* intermediate_key_size) argument
[all...]
/system/tpm/trunks/
H A Dtpm_generated.h1317 TPMI_ALG_KDF kdf; member in struct:trunks::TPMS_SCHEME_XOR
1447 TPMT_KDF_SCHEME kdf; member in struct:trunks::TPMS_ALGORITHM_DETAIL_ECC
1522 TPMT_KDF_SCHEME kdf; member in struct:trunks::TPMS_ECC_PARMS

Completed in 5792 milliseconds