Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 9 of 9) sorted by relevance

/system/keymaster/tests/
Dkdf_test.cpp32 ForTestAbstractKdf kdf; in TEST() local
35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128)); in TEST()
36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128)); in TEST()
37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0)); in TEST()
38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128)); in TEST()
39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128)); in TEST()
40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128)); in TEST()
41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128)); in TEST()
/system/security/mls/mls-rs-crypto-boringssl/src/
Dkdf.rs160 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256() localVariable
161 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha256()
163 assert_eq!(kdf.expand(&prk, &info, 42).unwrap(), expected_okm); in sha256()
176 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512() localVariable
177 let prk = kdf.extract(&salt, &ikm).unwrap(); in sha512()
178 assert_eq!(kdf.expand(&prk, &info, 42).unwrap(), expected_okm); in sha512()
183 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_extract_short_ikm() localVariable
184 assert_matches!(kdf.extract(b"salty", b""), Err(KdfError::TooShortIkm { .. })); in sha256_extract_short_ikm()
192 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_expand_short_prk() localVariable
193 assert_matches!(kdf.expand(&prk_short, &info, 42), Err(KdfError::TooShortPrk { .. })); in sha256_expand_short_prk()
[all …]
Dhpke.rs52 kdf: KDF, field
56 pub fn new(suite_id: Vec<u8>, kdf: KDF) -> Self { in new()
57 Self { suite_id, kdf } in new()
68 self.kdf.extract(salt, &[b"HPKE-v1" as &[u8], &self.suite_id, label, ikm].concat()).await in labeled_extract()
83 self.kdf.expand(key, &labeled_info, len).await in labeled_expand()
91 kdf: KdfWrapper<KDF>, field
98 pub fn new(cipher_suite: CipherSuite, dh: DH, kdf: KDF) -> Option<Self> { in new()
103 let kdf = KdfWrapper::new(suite_id, kdf); in new() localVariable
105 Some(Self { dh, kdf, kem_id, n_secret: kem_id.n_secret() }) in new()
131 let dkp_prk = match self.kdf.labeled_extract(&[], b"dkp_prk", ikm).await { in derive()
[all …]
Dlib.rs22 pub mod kdf; module
41 use kdf::Kdf;
119 let kdf = Kdf::new(cipher_suite)?; in cipher_suite_provider() localVariable
120 let kem = DhKem::new(cipher_suite, ecdh, kdf.clone())?; in cipher_suite_provider()
123 BoringsslCipherSuite::new(cipher_suite, kem, kdf, aead) in cipher_suite_provider()
138 kdf: KDF, field
151 pub fn new(cipher_suite: CipherSuite, kem: KEM, kdf: KDF, aead: AEAD) -> Option<Self> { in new()
156 kdf, in new()
218 self.kdf in kdf_extract()
231 self.kdf in kdf_expand()
[all …]
/system/keymaster/km_openssl/
Decies_kem.cpp45 keymaster_kdf_t kdf; in EciesKem() local
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { in EciesKem()
51 switch (kdf) { in EciesKem()
56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem()
/system/keymint/common/src/
Dkeyblob.rs291 kdf: &dyn crypto::Hkdf, in derive_kek()
305 crypto::OpaqueOr::Explicit(key_material) => kdf.hkdf(&[], &key_material.0, &info, 32)?,
306 key @ crypto::OpaqueOr::Opaque(_) => kdf.expand(key, &info, 32)?,
343 kdf: &dyn crypto::Hkdf, in encrypt()
384 derive_kek(kdf, root_key, &key_derivation_input, characteristics.clone(), hidden, sdd)?; in encrypt()
419 kdf: &dyn crypto::Hkdf, in decrypt()
441 kdf, in decrypt()
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h86 ASN1_INTEGER_SET* kdf; member
136 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()),
/system/keymint/tests/src/
Dlib.rs369 pub fn test_ckdf<T: Ckdf>(kdf: T) { in test_ckdf()
378 let result = kdf.ckdf(&key.into(), label, &[&v0, &v1, &v2, &v3], 32).unwrap(); in test_ckdf()
/system/keymaster/
DAndroid.bp147 "km_openssl/kdf.cpp",