Searched refs:kdf (Results 1 - 20 of 20) sorted by relevance

/freebsd-12-stable/crypto/openssl/crypto/asn1/
H A Dp5_pbev2.c153 PBKDF2PARAM *kdf = NULL;
156 if ((kdf = PBKDF2PARAM_new()) == NULL)
161 kdf->salt->value.octet_string = osalt;
162 kdf->salt->type = V_ASN1_OCTET_STRING;
179 if (!ASN1_INTEGER_set(kdf->iter, iter))
185 if ((kdf->keylength = ASN1_INTEGER_new()) == NULL)
187 if (!ASN1_INTEGER_set(kdf->keylength, keylen))
193 kdf->prf = X509_ALGOR_new();
194 if (kdf->prf == NULL)
196 X509_ALGOR_set0(kdf
[all...]
/freebsd-12-stable/crypto/openssl/crypto/evp/
H A Dp5_crpt2.c144 EVP_PBE_KEYGEN *kdf; local
156 NULL, NULL, &kdf)) {
180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de);
195 PBKDF2PARAM *kdf = NULL; local
207 kdf = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(PBKDF2PARAM), param);
209 if (kdf == NULL) {
216 /* Now check the parameters of the kdf */
218 if (kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)) {
223 if (kdf
[all...]
/freebsd-12-stable/crypto/openssl/apps/
H A Dpkcs12.c809 PBKDF2PARAM *kdf = NULL; local
812 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(PBKDF2PARAM));
813 if (kdf == NULL) {
818 if (kdf->prf == NULL) {
821 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf);
825 ASN1_INTEGER_get(kdf->iter), OBJ_nid2sn(prfnid));
826 PBKDF2PARAM_free(kdf);
829 SCRYPT_PARAMS *kdf = NULL; local
832 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(SCRYPT_PARAMS));
833 if (kdf
[all...]
/freebsd-12-stable/sys/contrib/libsodium/test/default/
H A DMakefile.am39 kdf.exp \
114 kdf.res \
190 kdf.final \
261 kdf.nexe \
343 kdf \
488 kdf_SOURCE = cmptest.h kdf.c
/freebsd-12-stable/contrib/wpa/src/eap_peer/
H A Deap_aka.c56 u16 kdf; member in struct:eap_aka_data
603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i],
825 u8 id, u16 kdf)
830 data->kdf = kdf;
836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) {
848 os_memcpy(data->last_kdf_attrs, attr->kdf,
880 if (attr->kdf[0] != data->kdf) {
824 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument
[all...]
/freebsd-12-stable/crypto/openssl/crypto/kdf/
H A Dscrypt.c13 #include <openssl/kdf.h>
H A Dtls1_prf.c12 #include <openssl/kdf.h>
H A Dhkdf.c13 #include <openssl/kdf.h>
/freebsd-12-stable/contrib/wpa/src/eap_server/
H A Deap_server_aka.c52 u16 kdf; member in struct:eap_aka_data
486 if (data->kdf) {
489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
953 data->kdf = attr->kdf[0];
957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
/freebsd-12-stable/crypto/openssh/
H A Dumac.c179 * mode to supply all random bits needed by UMAC. The kdf function takes
184 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function
226 kdf(buf, prf_key, 0, UMAC_KEY_LEN);
604 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key));
952 /* Given a pointer to the internal key needed by kdf() and a uhash context,
969 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */
983 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */
994 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));
H A Dsshkey.c3409 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local
3423 if ((kdf = sshbuf_new()) == NULL ||
3444 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 ||
3445 (r = sshbuf_put_u32(kdf, rounds)) != 0)
3459 (r = sshbuf_put_stringb(encoded, kdf)) != 0 ||
3523 sshbuf_free(kdf);
3554 struct sshbuf *kdf = NULL, *decrypted = NULL; local
3621 (r = sshbuf_froms(decoded, &kdf)) != 0 ||
3667 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 ||
3668 (r = sshbuf_get_u32(kdf,
[all...]
/freebsd-12-stable/lib/libbearssl/
H A DMakefile96 kdf/hkdf.c \
97 kdf/shake.c \
/freebsd-12-stable/crypto/openssl/include/openssl/
H A Ddh.h262 # define EVP_PKEY_CTX_set_dh_kdf_type(ctx, kdf) \
265 EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL)
H A Dec.h1399 # define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \
1402 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
/freebsd-12-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
H A Deap_sim_common.c896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
/freebsd-12-stable/crypto/openssl/ssl/
H A Dt1_enc.c15 #include <openssl/kdf.h>
H A Dtls13_enc.c14 #include <openssl/kdf.h>
/freebsd-12-stable/secure/lib/libcrypto/
H A DMakefile219 # kdf
402 INCS+= engine.h engineerr.h err.h evp.h evperr.h hmac.h idea.h kdf.h
498 ${LCRYPTO_SRC}/crypto/kdf \
/freebsd-12-stable/contrib/wpa/wpa_supplicant/
H A DAndroid.mk1371 SHA256OBJS += src/crypto/sha256-kdf.c
1375 SHA256OBJS += src/crypto/sha384-kdf.c
1379 SHA256OBJS += src/crypto/sha512-kdf.c

Completed in 373 milliseconds