/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 208 PBKDF2PARAM *kdf = NULL; 211 if (!(kdf = PBKDF2PARAM_new())) 216 kdf->salt->value.octet_string = osalt; 217 kdf->salt->type = V_ASN1_OCTET_STRING; 234 if (!ASN1_INTEGER_set(kdf->iter, iter)) 240 if (!(kdf->keylength = M_ASN1_INTEGER_new())) 242 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) 248 kdf->prf = X509_ALGOR_new(); 249 if (!kdf->prf) 251 X509_ALGOR_set0(kdf [all...] |
/freebsd-10-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 257 PBKDF2PARAM *kdf = NULL; local 277 if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen))) { 284 /* Now check the parameters of the kdf */ 286 if (kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)) { 291 if (kdf->prf) 292 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 307 if (kdf->salt->type != V_ASN1_OCTET_STRING) { 313 salt = kdf->salt->value.octet_string->data; 314 saltlen = kdf [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 54 u16 kdf; member in struct:eap_aka_data 692 u8 id, u16 kdf) 697 data->kdf = kdf; 703 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 714 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 737 if (attr->kdf[0] != data->kdf) { 744 if (attr->kdf[i] == data->kdf) 691 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_aka.c | 51 u16 kdf; member in struct:eap_aka_data 479 if (data->kdf) { 482 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 923 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 932 data->kdf = attr->kdf[0]; 936 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | umac.c | 179 * mode to supply all random bits needed by UMAC. The kdf function takes 184 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function 224 kdf(buf, prf_key, 0, UMAC_KEY_LEN); 601 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); 949 /* Given a pointer to the internal key needed by kdf() and a uhash context, 966 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ 980 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ 991 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));
|
H A D | sshkey.c | 3035 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local 3055 if ((kdf = sshbuf_new()) == NULL || 3076 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || 3077 (r = sshbuf_put_u32(kdf, rounds)) != 0) 3091 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || 3154 sshbuf_free(kdf); 3185 struct sshbuf *kdf = NULL, *decrypted = NULL; local 3253 (r = sshbuf_froms(decoded, &kdf)) != 0 || 3299 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || 3300 (r = sshbuf_get_u32(kdf, [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 898 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | speed.c | 2273 void *(*kdf) (const void *in, size_t inlen, void *out, 2279 kdf = KDF1_SHA1; 2282 kdf = NULL; 2287 ecdh_a[j], kdf); 2291 ecdh_b[j], kdf); 2316 ecdh_a[j], kdf);
|