Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 12 of 12) sorted by relevance

/dragonfly/crypto/libressl/crypto/asn1/
H A Dp5_pbev2.c301 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local
304 if (!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set()
309 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
310 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
327 if (!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set()
333 if (!(kdf->keylength = ASN1_INTEGER_new())) in PKCS5_pbkdf2_set()
341 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
342 if (!kdf->prf) in PKCS5_pbkdf2_set()
361 if (!ASN1_item_pack(kdf, &PBKDF2PARAM_it, in PKCS5_pbkdf2_set()
366 PBKDF2PARAM_free(kdf); in PKCS5_pbkdf2_set()
[all …]
/dragonfly/crypto/libressl/crypto/evp/
H A Dp5_crpt2.c232 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local
255 if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { in PKCS5_v2_PBKDF2_keyivgen()
262 if (kdf->keylength && in PKCS5_v2_PBKDF2_keyivgen()
263 (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen()
268 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
269 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
284 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen()
290 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen()
291 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen()
292 if ((iter = ASN1_INTEGER_get(kdf->iter)) <= 0) { in PKCS5_v2_PBKDF2_keyivgen()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_aka.c56 u16 kdf; member
603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure()
825 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
830 data->kdf = kdf; in eap_aka_prime_kdf_select()
836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg()
848 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg()
880 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
904 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid()
973 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c52 u16 kdf; member
486 if (data->kdf) { in eap_aka_build_challenge()
489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/dragonfly/crypto/openssh/
H A Dumac.c185 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function
227 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init()
605 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init()
970 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init()
984 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init()
995 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
H A Dsshkey.c3946 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local
3960 if ((kdf = sshbuf_new()) == NULL || in sshkey_private_to_blob2()
3981 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in sshkey_private_to_blob2()
3982 (r = sshbuf_put_u32(kdf, rounds)) != 0) in sshkey_private_to_blob2()
3996 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2()
4047 sshbuf_free(kdf); in sshkey_private_to_blob2()
4144 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
4165 (r = sshbuf_froms(decoded, &kdf)) != 0 || in private2_decrypt()
4214 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || in private2_decrypt()
4215 (r = sshbuf_get_u32(kdf, &rounds)) != 0) in private2_decrypt()
[all …]
/dragonfly/crypto/libressl/apps/openssl/
H A Dspeed.c1763 void *(*kdf) (const void *in, size_t inlen, void *out, size_t * xoutlen); in speed_main() local
1767 kdf = KDF1_SHA1; in speed_main()
1770 kdf = NULL; in speed_main()
1774 ecdh_a[j], kdf); in speed_main()
1777 ecdh_b[j], kdf); in speed_main()
1807 ecdh_a[j], kdf); in speed_main()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
H A Deap_sim_common.c896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/dragonfly/crypto/libressl/include/openssl/
H A Dec.h1047 #define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \ argument
1050 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
/dragonfly/lib/librecrypto/
H A DMakefile289 ${LCRYPTO_SRC}/kdf \
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A DChangeLog1292 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)