/freebsd-12-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 153 PBKDF2PARAM *kdf = NULL; 156 if ((kdf = PBKDF2PARAM_new()) == NULL) 161 kdf->salt->value.octet_string = osalt; 162 kdf->salt->type = V_ASN1_OCTET_STRING; 179 if (!ASN1_INTEGER_set(kdf->iter, iter)) 185 if ((kdf->keylength = ASN1_INTEGER_new()) == NULL) 187 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) 193 kdf->prf = X509_ALGOR_new(); 194 if (kdf->prf == NULL) 196 X509_ALGOR_set0(kdf [all...] |
/freebsd-12-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 144 EVP_PBE_KEYGEN *kdf; local 156 NULL, NULL, &kdf)) { 180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); 195 PBKDF2PARAM *kdf = NULL; local 207 kdf = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(PBKDF2PARAM), param); 209 if (kdf == NULL) { 216 /* Now check the parameters of the kdf */ 218 if (kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)) { 223 if (kdf [all...] |
/freebsd-12-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 809 PBKDF2PARAM *kdf = NULL; local 812 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(PBKDF2PARAM)); 813 if (kdf == NULL) { 818 if (kdf->prf == NULL) { 821 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf); 825 ASN1_INTEGER_get(kdf->iter), OBJ_nid2sn(prfnid)); 826 PBKDF2PARAM_free(kdf); 829 SCRYPT_PARAMS *kdf = NULL; local 832 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(SCRYPT_PARAMS)); 833 if (kdf [all...] |
/freebsd-12-stable/sys/contrib/libsodium/test/default/ |
H A D | Makefile.am | 39 kdf.exp \ 114 kdf.res \ 190 kdf.final \ 261 kdf.nexe \ 343 kdf \ 488 kdf_SOURCE = cmptest.h kdf.c
|
/freebsd-12-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 56 u16 kdf; member in struct:eap_aka_data 603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], 825 u8 id, u16 kdf) 830 data->kdf = kdf; 836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { 848 os_memcpy(data->last_kdf_attrs, attr->kdf, 880 if (attr->kdf[0] != data->kdf) { 824 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/freebsd-12-stable/crypto/openssl/crypto/kdf/ |
H A D | scrypt.c | 13 #include <openssl/kdf.h>
|
H A D | tls1_prf.c | 12 #include <openssl/kdf.h>
|
H A D | hkdf.c | 13 #include <openssl/kdf.h>
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_aka.c | 52 u16 kdf; member in struct:eap_aka_data 486 if (data->kdf) { 489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 953 data->kdf = attr->kdf[0]; 957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/freebsd-12-stable/crypto/openssh/ |
H A D | umac.c | 179 * mode to supply all random bits needed by UMAC. The kdf function takes 184 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) function 226 kdf(buf, prf_key, 0, UMAC_KEY_LEN); 604 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); 952 /* Given a pointer to the internal key needed by kdf() and a uhash context, 969 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ 983 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ 994 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));
|
H A D | sshkey.c | 3409 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local 3423 if ((kdf = sshbuf_new()) == NULL || 3444 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || 3445 (r = sshbuf_put_u32(kdf, rounds)) != 0) 3459 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || 3523 sshbuf_free(kdf); 3554 struct sshbuf *kdf = NULL, *decrypted = NULL; local 3621 (r = sshbuf_froms(decoded, &kdf)) != 0 || 3667 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || 3668 (r = sshbuf_get_u32(kdf, [all...] |
/freebsd-12-stable/lib/libbearssl/ |
H A D | Makefile | 96 kdf/hkdf.c \ 97 kdf/shake.c \
|
/freebsd-12-stable/crypto/openssl/include/openssl/ |
H A D | dh.h | 262 # define EVP_PKEY_CTX_set_dh_kdf_type(ctx, kdf) \ 265 EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL)
|
H A D | ec.h | 1399 # define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \ 1402 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
|
/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|
/freebsd-12-stable/crypto/openssl/ssl/ |
H A D | t1_enc.c | 15 #include <openssl/kdf.h>
|
H A D | tls13_enc.c | 14 #include <openssl/kdf.h>
|
/freebsd-12-stable/secure/lib/libcrypto/ |
H A D | Makefile | 219 # kdf 402 INCS+= engine.h engineerr.h err.h evp.h evperr.h hmac.h idea.h kdf.h 498 ${LCRYPTO_SRC}/crypto/kdf \
|
/freebsd-12-stable/contrib/wpa/wpa_supplicant/ |
H A D | Android.mk | 1371 SHA256OBJS += src/crypto/sha256-kdf.c 1375 SHA256OBJS += src/crypto/sha384-kdf.c 1379 SHA256OBJS += src/crypto/sha512-kdf.c
|