Home
last modified time | relevance | path

Searched refs:kdf_params (Results 1 – 13 of 13) sorted by relevance

/dports/security/gnutls/gnutls-3.6.16/lib/x509/
H A Dpkcs7-crypt.c824 kdf_params->salt, kdf_params->salt_size); in write_pkcs12_kdf_params()
1083 kdf_params->salt, in _gnutls_read_pkcs_schema_params()
1164 kdf_params, in _gnutls_pkcs_raw_decrypt_data()
1189 kdf_params, in _gnutls_pkcs_raw_decrypt_data()
1199 kdf_params->salt, in _gnutls_pkcs_raw_decrypt_data()
1344 kdf_params->salt, kdf_params->salt_size); in write_pbkdf2_params()
1532 kdf_params->salt_size = in _gnutls_pkcs_generate_key()
1541 kdf_params->salt_size = 8; in _gnutls_pkcs_generate_key()
1581 kdf_params, in _gnutls_pkcs_generate_key()
1601 kdf_params->salt, in _gnutls_pkcs_generate_key()
[all …]
H A Dprivkey_pkcs8_pbes1.c41 struct pbkdf2_params *kdf_params, in _gnutls_read_pbkdf1_params() argument
48 memset(kdf_params, 0, sizeof(*kdf_params)); in _gnutls_read_pbkdf1_params()
71 &kdf_params->iter_count); in _gnutls_read_pbkdf1_params()
77 if (kdf_params->iter_count >= MAX_ITER_COUNT || kdf_params->iter_count == 0) { in _gnutls_read_pbkdf1_params()
82 len = sizeof(kdf_params->salt); in _gnutls_read_pbkdf1_params()
85 kdf_params->salt, &len); in _gnutls_read_pbkdf1_params()
136 const struct pbkdf2_params *kdf_params, in _gnutls_decrypt_pbes1_des_md5_data() argument
155 pbkdf1_md5(password, password_len, kdf_params->salt, kdf_params->iter_count, sizeof(key), key); in _gnutls_decrypt_pbes1_des_md5_data()
H A Dpkcs7_int.h81 const struct pbkdf2_params *kdf_params,
91 const struct pbkdf2_params *kdf_params,
104 struct pbkdf2_params *kdf_params,
110 struct pbkdf2_params *kdf_params,
116 const struct pbkdf2_params *kdf_params,
122 struct pbkdf2_params *kdf_params,
132 struct pbkdf2_params *kdf_params, char **oid);
H A Dprivkey_pkcs8.c47 struct pbkdf2_params *kdf_params,
322 struct pbkdf2_params kdf_params; in encode_to_pkcs8_key() local
355 _gnutls_pkcs_generate_key(schema, password, &kdf_params, &enc_params, &key); in encode_to_pkcs8_key()
364 &kdf_params, &enc_params); in encode_to_pkcs8_key()
725 struct pbkdf2_params kdf_params; in pkcs8_key_decrypt() local
764 params_len, &kdf_params, &enc_params); in pkcs8_key_decrypt()
776 &kdf_params, &enc_params, &tmp); in pkcs8_key_decrypt()
828 struct pbkdf2_params *kdf_params, in pkcs8_key_info() argument
901 params_len, kdf_params, &enc_params); in pkcs8_key_info()
/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/
H A Dpbe.py264 if (len(kdf_params) != 1 or not isinstance(kdf_params[0], tuple) or
265 len(kdf_params[0]) < 2):
268 kdf_params = list(kdf_params[0])
274 salt = kdf_params.pop(0)
275 count = kdf_params.pop(0)
277 if kdf_params and isinstance(kdf_params[0], int):
282 if kdf_params:
283 if (isinstance(kdf_params[0], tuple) and len(kdf_params[0]) == 2 and
285 prf_alg = kdf_params[0][0]
318 kdf_params = list(params[0])
[all …]
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in jpake_mapStatus()
73 kdf_params->pDataParams = feedback_params->pDataParams; in jpake_mapStatus()
86 (*kdf_params) = *in_params; in jpake_mapStatus()
1114 const CK_SP800_108_KDF_PARAMS *kdf_params,
1159 ret = kbkdf_ValidateParameters(mech, kdf_params, ret_key_size);
1166 ret = sftk_MAC_Init(&ctx, kdf_params->prfType, prf_key);
1168 ret = sftk_MAC_InitRaw(&ctx, kdf_params->prfType, prf_key_bytes,
1249 CK_SP800_108_KDF_PARAMS kdf_params = { 0 };
1263 ret = kbkdf_RawDispatch(mech, &kdf_params, initial_value,
1285 CK_SP800_108_KDF_PARAMS kdf_params;
[all …]
/dports/www/firefox/firefox-99.0/security/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in kbkdf_LoadParameters()
73 kdf_params->pDataParams = feedback_params->pDataParams; in kbkdf_LoadParameters()
86 (*kdf_params) = *in_params; in kbkdf_LoadParameters()
1120 const CK_SP800_108_KDF_PARAMS *kdf_params, in kbkdf_RawDispatch() argument
1165 ret = kbkdf_ValidateParameters(mech, kdf_params, ret_key_size); in kbkdf_RawDispatch()
1172 ret = sftk_MAC_Init(&ctx, kdf_params->prfType, prf_key); in kbkdf_RawDispatch()
1174 ret = sftk_MAC_InitRaw(&ctx, kdf_params->prfType, prf_key_bytes, in kbkdf_RawDispatch()
1255 CK_SP800_108_KDF_PARAMS kdf_params = { 0 }; in kbkdf_Dispatch() local
1269 ret = kbkdf_RawDispatch(mech, &kdf_params, initial_value, in kbkdf_Dispatch()
1291 CK_SP800_108_KDF_PARAMS kdf_params; member
[all …]
/dports/security/ca_root_nss/nss-3.71/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in kbkdf_LoadParameters()
73 kdf_params->pDataParams = feedback_params->pDataParams; in kbkdf_LoadParameters()
86 (*kdf_params) = *in_params; in kbkdf_LoadParameters()
1120 const CK_SP800_108_KDF_PARAMS *kdf_params, in kbkdf_RawDispatch() argument
1165 ret = kbkdf_ValidateParameters(mech, kdf_params, ret_key_size); in kbkdf_RawDispatch()
1172 ret = sftk_MAC_Init(&ctx, kdf_params->prfType, prf_key); in kbkdf_RawDispatch()
1174 ret = sftk_MAC_InitRaw(&ctx, kdf_params->prfType, prf_key_bytes, in kbkdf_RawDispatch()
1255 CK_SP800_108_KDF_PARAMS kdf_params = { 0 }; in kbkdf_Dispatch() local
1269 ret = kbkdf_RawDispatch(mech, &kdf_params, initial_value, in kbkdf_Dispatch()
1291 CK_SP800_108_KDF_PARAMS kdf_params; member
[all …]
/dports/security/nss/nss-3.76.1/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in kbkdf_LoadParameters()
73 kdf_params->pDataParams = feedback_params->pDataParams; in kbkdf_LoadParameters()
86 (*kdf_params) = *in_params; in kbkdf_LoadParameters()
1120 const CK_SP800_108_KDF_PARAMS *kdf_params, in kbkdf_RawDispatch() argument
1165 ret = kbkdf_ValidateParameters(mech, kdf_params, ret_key_size); in kbkdf_RawDispatch()
1172 ret = sftk_MAC_Init(&ctx, kdf_params->prfType, prf_key); in kbkdf_RawDispatch()
1174 ret = sftk_MAC_InitRaw(&ctx, kdf_params->prfType, prf_key_bytes, in kbkdf_RawDispatch()
1255 CK_SP800_108_KDF_PARAMS kdf_params = { 0 }; in kbkdf_Dispatch() local
1269 ret = kbkdf_RawDispatch(mech, &kdf_params, initial_value, in kbkdf_Dispatch()
1291 CK_SP800_108_KDF_PARAMS kdf_params; member
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in kbkdf_LoadParameters()
73 kdf_params->pDataParams = feedback_params->pDataParams; in kbkdf_LoadParameters()
86 (*kdf_params) = *in_params; in kbkdf_LoadParameters()
1114 const CK_SP800_108_KDF_PARAMS *kdf_params, in kbkdf_RawDispatch() argument
1159 ret = kbkdf_ValidateParameters(mech, kdf_params, ret_key_size); in kbkdf_RawDispatch()
1166 ret = sftk_MAC_Init(&ctx, kdf_params->prfType, prf_key); in kbkdf_RawDispatch()
1168 ret = sftk_MAC_InitRaw(&ctx, kdf_params->prfType, prf_key_bytes, in kbkdf_RawDispatch()
1249 CK_SP800_108_KDF_PARAMS kdf_params = { 0 }; in kbkdf_Dispatch() local
1263 ret = kbkdf_RawDispatch(mech, &kdf_params, initial_value, in kbkdf_Dispatch()
1285 CK_SP800_108_KDF_PARAMS kdf_params; member
[all …]
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/softoken/
H A Dkbkdf.c71 kdf_params->prfType = feedback_params->prfType; in kbkdf_LoadParameters()
72 kdf_params->ulNumberOfDataParams = feedback_params->ulNumberOfDataParams; in kbkdf_LoadParameters()
73 kdf_params->pDataParams = feedback_params->pDataParams; in kbkdf_LoadParameters()
74 kdf_params->ulAdditionalDerivedKeys = feedback_params->ulAdditionalDerivedKeys; in kbkdf_LoadParameters()
75 kdf_params->pAdditionalDerivedKeys = feedback_params->pAdditionalDerivedKeys; in kbkdf_LoadParameters()
86 (*kdf_params) = *in_params; in kbkdf_LoadParameters()
1133 CK_SP800_108_KDF_PARAMS kdf_params = { 0 }; in kbkdf_Dispatch() local
1179 ret = kbkdf_ValidateParameters(mech, &kdf_params, ret_key_size); in kbkdf_Dispatch()
1185 ret = sftk_MAC_Init(&ctx, kdf_params.prfType, prf_key); in kbkdf_Dispatch()
1192 ret = kbkdf_CalculateLength(&kdf_params, &ctx, ret_key_size, &output_bitlen, &buffer_length); in kbkdf_Dispatch()
[all …]
/dports/security/gnupg/gnupg-2.3.3/g10/
H A Decdh.c149 build_kdf_params (unsigned char kdf_params[256], size_t *r_size, in build_kdf_params()
173 *r_size = iobuf_temp_to_buffer (obuf, kdf_params, 256); in build_kdf_params()
180 log_printhex (kdf_params, *r_size, "ecdh KDF message params are:"); in build_kdf_params()
192 const unsigned char *kdf_params, size_t kdf_params_size) in derive_kek() argument
208 gcry_md_write(h, kdf_params, kdf_params_size); /* KDF parameters */ in derive_kek()
236 unsigned char kdf_params[256]; in prepare_ecdh_with_shared_point() local
279 err = build_kdf_params (kdf_params, &kdf_params_size, pkey, pk_fp); in prepare_ecdh_with_shared_point()
309 secret_x_size, kdf_params, kdf_params_size); in prepare_ecdh_with_shared_point()
/dports/security/john/john-1.9.0-jumbo-1/run/
H A Dpem2john.py82 kdf_params = kdf["parameters"]
83 salt = kdf_params["salt"]
84 iterations = kdf_params["iteration_count"]