/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | p5_pbev2.c | 204 PBKDF2PARAM *kdf = NULL; 207 if(!(kdf = PBKDF2PARAM_new())) 212 kdf->salt->value.octet_string = osalt; 213 kdf->salt->type = V_ASN1_OCTET_STRING; 230 if(!ASN1_INTEGER_set(kdf->iter, iter)) 237 if(!(kdf->keylength = M_ASN1_INTEGER_new())) 239 if(!ASN1_INTEGER_set (kdf->keylength, keylen)) 246 kdf->prf = X509_ALGOR_new(); 247 if (!kdf->prf) 249 X509_ALGOR_set0(kdf [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | p5_crpt2.c | 262 PBKDF2PARAM *kdf = NULL; local 284 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 291 /* Now check the parameters of the kdf */ 293 if(kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ 299 if (kdf->prf) 300 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); 317 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 324 salt = kdf->salt->value.octet_string->data; 325 saltlen = kdf [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 60 u16 kdf; member in struct:eap_aka_data 663 u8 id, u16 kdf) 668 data->kdf = kdf; 674 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); 685 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) 708 if (attr->kdf[0] != data->kdf) { 715 if (attr->kdf[ 662 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_aka.c | 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 56 u16 kdf; member in struct:eap_aka_data 374 if (data->kdf) { 377 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, 815 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { 824 data->kdf = attr->kdf[0]; 828 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | umac.c | 195 * mode to supply all random bits needed by UMAC. The kdf function takes 200 static void kdf(void *buffer_ptr, aes_int_key key, UINT8 ndx, int nbytes) function 240 kdf(buf, prf_key, 0, UMAC_KEY_LEN); 617 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); 965 /* Given a pointer to the internal key needed by kdf() and a uhash context, 982 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ 996 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ 1007 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/pkcs11/include/ |
H A D | pkcs11t.h | 1343 CK_EC_KDF_TYPE kdf; member in struct:CK_ECDH1_DERIVE_PARAMS 1357 CK_EC_KDF_TYPE kdf; member in struct:CK_ECDH2_DERIVE_PARAMS 1371 CK_EC_KDF_TYPE kdf; member in struct:CK_ECMQV_DERIVE_PARAMS 1400 CK_X9_42_DH_KDF_TYPE kdf; member in struct:CK_X9_42_DH1_DERIVE_PARAMS 1414 CK_X9_42_DH_KDF_TYPE kdf; member in struct:CK_X9_42_DH2_DERIVE_PARAMS 1428 CK_X9_42_DH_KDF_TYPE kdf; member in struct:CK_X9_42_MQV_DERIVE_PARAMS
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_sim_common.h | 206 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member in struct:eap_sim_attrs
|
H A D | eap_sim_common.c | 903 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | speed.c | 2324 void *(*kdf)(const void *in, size_t inlen, void *out, size_t *xoutlen); 2329 kdf = KDF1_SHA1; 2334 kdf = NULL; 2338 ecdh_a[j], kdf); 2341 ecdh_b[j], kdf); 2372 ecdh_a[j], kdf);
|