/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | p5_pbev2.c | 301 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local 304 if (!(kdf = PBKDF2PARAM_new())) in PKCS5_pbkdf2_set() 309 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set() 310 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set() 327 if (!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set() 333 if (!(kdf->keylength = ASN1_INTEGER_new())) in PKCS5_pbkdf2_set() 341 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set() 342 if (!kdf->prf) in PKCS5_pbkdf2_set() 361 if (!ASN1_item_pack(kdf, &PBKDF2PARAM_it, in PKCS5_pbkdf2_set() 366 PBKDF2PARAM_free(kdf); in PKCS5_pbkdf2_set() [all …]
|
/dragonfly/crypto/libressl/crypto/evp/ |
H A D | p5_crpt2.c | 232 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local 255 if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { in PKCS5_v2_PBKDF2_keyivgen() 262 if (kdf->keylength && in PKCS5_v2_PBKDF2_keyivgen() 263 (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){ in PKCS5_v2_PBKDF2_keyivgen() 268 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen() 269 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen() 284 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen() 290 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen() 291 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen() 292 if ((iter = ASN1_INTEGER_get(kdf->iter)) <= 0) { in PKCS5_v2_PBKDF2_keyivgen() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 56 u16 kdf; member 603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure() 825 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 830 data->kdf = kdf; in eap_aka_prime_kdf_select() 836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg() 848 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg() 880 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 904 if (attr->kdf[i] == attr->kdf[j]) { in eap_aka_prime_kdf_valid() 973 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) in eap_aka_process_challenge() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 52 u16 kdf; member 486 if (data->kdf) { in eap_aka_build_challenge() 489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/dragonfly/crypto/openssh/ |
H A D | umac.c | 185 static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) in kdf() function 227 kdf(buf, prf_key, 0, UMAC_KEY_LEN); in pdf_init() 605 kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key)); in nh_init() 970 kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */ in uhash_init() 984 kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */ in uhash_init() 995 kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32)); in uhash_init()
|
H A D | sshkey.c | 3946 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local 3960 if ((kdf = sshbuf_new()) == NULL || in sshkey_private_to_blob2() 3981 if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 || in sshkey_private_to_blob2() 3982 (r = sshbuf_put_u32(kdf, rounds)) != 0) in sshkey_private_to_blob2() 3996 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2() 4047 sshbuf_free(kdf); in sshkey_private_to_blob2() 4144 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local 4165 (r = sshbuf_froms(decoded, &kdf)) != 0 || in private2_decrypt() 4214 if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 || in private2_decrypt() 4215 (r = sshbuf_get_u32(kdf, &rounds)) != 0) in private2_decrypt() [all …]
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | speed.c | 1763 void *(*kdf) (const void *in, size_t inlen, void *out, size_t * xoutlen); in speed_main() local 1767 kdf = KDF1_SHA1; in speed_main() 1770 kdf = NULL; in speed_main() 1774 ecdh_a[j], kdf); in speed_main() 1777 ecdh_b[j], kdf); in speed_main() 1807 ecdh_a[j], kdf); in speed_main()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
H A D | eap_sim_common.c | 896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | ec.h | 1047 #define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \ argument 1050 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
|
/dragonfly/lib/librecrypto/ |
H A D | Makefile | 289 ${LCRYPTO_SRC}/kdf \
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | ChangeLog | 1292 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
|