/netbsd-current/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, 56 derived_key, derived_key_len); 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, 124 salt_len, salt, derived_key_len, derived_key); 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, 136 derived_key_len, derived_key); 50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument [all...] |
H A D | archive_cryptor_private.h | 173 size_t salt_len, unsigned rounds, uint8_t *derived_key,
|
H A D | archive_write_set_format_zip.c | 1641 uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE]; local 1664 salt, salt_len, 1000, derived_key, key_len * 2 + 2); 1666 ret = archive_encrypto_aes_ctr_init(&zip->cctx, derived_key, key_len); 1672 ret = archive_hmac_sha1_init(&zip->hctx, derived_key + key_len, 1682 salt[salt_len] = derived_key[key_len * 2]; 1683 salt[salt_len + 1] = derived_key[key_len * 2 + 1]; 1700 uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE]; local 1716 derived_key, key_len * 2 + 2); 1720 ret = archive_encrypto_aes_ctr_init(&cctx, derived_key, key_len); 1723 ret = archive_hmac_sha1_init(&hctx, derived_key [all...] |
H A D | archive_read_support_format_zip.c | 3010 uint8_t derived_key[MAX_DERIVED_KEY_BUF_SIZE]; local 3038 memset(derived_key, 0, sizeof(derived_key)); 3040 p, salt_len, 1000, derived_key, key_len * 2 + 2); 3050 if (derived_key[key_len * 2] == pv[0] && 3051 derived_key[key_len * 2 + 1] == pv[1]) 3061 r = archive_decrypto_aes_ctr_init(&zip->cctx, derived_key, key_len); 3067 r = archive_hmac_sha1_init(&zip->hctx, derived_key + key_len, key_len);
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
H A D | sskdf.c | 98 unsigned char *derived_key, size_t derived_key_len) 104 unsigned char *out = derived_key; 218 unsigned char *derived_key, size_t derived_key_len) 224 unsigned char *out = derived_key; 94 SSKDF_hash_kdm(const EVP_MD *kdf_md, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned int append_ctr, unsigned char *derived_key, size_t derived_key_len) argument 212 SSKDF_mac_kdm(EVP_MAC_CTX *ctx_init, const unsigned char *kmac_custom, size_t kmac_custom_len, size_t kmac_out_len, const unsigned char *salt, size_t salt_len, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned char *derived_key, size_t derived_key_len) argument
|
H A D | x942kdf.c | 268 unsigned char *derived_key, size_t derived_key_len) 273 unsigned char *out = derived_key; 264 x942kdf_hash_kdm(const EVP_MD *kdf_md, const unsigned char *z, size_t z_len, const unsigned char *other, size_t other_len, unsigned char *ctr, unsigned char *derived_key, size_t derived_key_len) argument
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | crypto.c | 2311 krb5_keyblock **derived_key) 2317 *derived_key = NULL; 2331 ret = krb5_copy_keyblock(context, d.key, derived_key); 2306 krb5_derive_key(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, const void *constant, size_t constant_len, krb5_keyblock **derived_key) argument
|