Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 25 of 33) sorted by relevance

12

/third_party/openssl/crypto/asn1/
Dp5_pbev2.c153 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local
156 if ((kdf = PBKDF2PARAM_new()) == NULL) in PKCS5_pbkdf2_set()
161 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
162 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
179 if (!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set()
185 if ((kdf->keylength = ASN1_INTEGER_new()) == NULL) in PKCS5_pbkdf2_set()
187 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
193 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set()
194 if (kdf->prf == NULL) in PKCS5_pbkdf2_set()
196 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set()
[all …]
/third_party/openssl/crypto/evp/
Dp5_crpt2.c144 EVP_PBE_KEYGEN *kdf; in PKCS5_v2_PBE_keyivgen() local
156 NULL, NULL, &kdf)) { in PKCS5_v2_PBE_keyivgen()
180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); in PKCS5_v2_PBE_keyivgen()
195 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local
207 kdf = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(PBKDF2PARAM), param); in PKCS5_v2_PBKDF2_keyivgen()
209 if (kdf == NULL) { in PKCS5_v2_PBKDF2_keyivgen()
218 if (kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)) { in PKCS5_v2_PBKDF2_keyivgen()
223 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen()
224 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen()
239 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen()
[all …]
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/
Dssh-private.js38 var kdf = buf.readString();
58 switch (kdf) {
114 'OpenSSH-format key uses unknown KDF "' + kdf + '"'));
145 var kdf = 'none';
160 kdf = 'bcrypt';
179 switch (kdf) {
221 throw (new Error('Unsupported kdf ' + kdf));
228 buf.writeString(kdf); /* kdf */
/third_party/openssl/apps/
Dpkcs12.c809 PBKDF2PARAM *kdf = NULL; in alg_print() local
812 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(PBKDF2PARAM)); in alg_print()
813 if (kdf == NULL) { in alg_print()
818 if (kdf->prf == NULL) { in alg_print()
821 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf); in alg_print()
825 ASN1_INTEGER_get(kdf->iter), OBJ_nid2sn(prfnid)); in alg_print()
826 PBKDF2PARAM_free(kdf); in alg_print()
829 SCRYPT_PARAMS *kdf = NULL; in alg_print() local
832 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(SCRYPT_PARAMS)); in alg_print()
833 if (kdf == NULL) { in alg_print()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_aka.c56 u16 kdf; member
612 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure()
839 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
844 data->kdf = kdf; in eap_aka_prime_kdf_select()
850 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
861 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg()
862 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg()
894 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
908 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid()
916 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_aka.c56 u16 kdf; member
603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure()
825 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
830 data->kdf = kdf; in eap_aka_prime_kdf_select()
836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select()
847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg()
848 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg()
880 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid()
894 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid()
902 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_aka.c52 u16 kdf; member
486 if (data->kdf) { in eap_aka_build_challenge()
489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_aka.c52 u16 kdf; member
486 if (data->kdf) { in eap_aka_build_challenge()
489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge()
944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
/third_party/openssl/crypto/err/
Dopenssl.ec34 L KDF include/openssl/kdf.h crypto/kdf/kdf_err.c
/third_party/openssl/include/openssl/
Ddh.h262 # define EVP_PKEY_CTX_set_dh_kdf_type(ctx, kdf) \ argument
265 EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL)
Dec.h1402 # define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \ argument
1405 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
/third_party/openssl/doc/man3/
DEVP_PKEY_CTX_set1_pbe_pass.pod10 #include <openssl/kdf.h>
DEVP_PKEY_CTX_set_scrypt_N.pod14 #include <openssl/kdf.h>
DEVP_PKEY_CTX_set_tls1_prf_md.pod11 #include <openssl/kdf.h>
DEVP_PKEY_CTX_ctrl.pod111 int EVP_PKEY_CTX_set_dh_kdf_type(EVP_PKEY_CTX *ctx, int kdf);
128 int EVP_PKEY_CTX_set_ecdh_kdf_type(EVP_PKEY_CTX *ctx, int kdf);
320 to B<kdf> for DH key derivation. Possible values are B<EVP_PKEY_DH_KDF_NONE>
393 to B<kdf> for ECDH key derivation. Possible values are B<EVP_PKEY_ECDH_KDF_NONE>
DEVP_PKEY_CTX_set_hkdf_md.pod12 #include <openssl/kdf.h>
/third_party/openssl/doc/man1/
Dpkeyutl.pod29 [B<-kdf algorithm>]
126 =item B<-kdf algorithm>
324 openssl pkeyutl -kdf TLS1-PRF -kdflen 48 -pkeyopt md:SHA256 \
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
Deap_sim_common.c896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
/third_party/openssl/test/recipes/30-test_evp_data/
Devppbe.txt15 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others)
Devpkdf.txt255 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
/third_party/openssl/
DBUILD.gn532 "crypto/kdf/hkdf.c",
533 "crypto/kdf/kdf_err.c",
534 "crypto/kdf/scrypt.c",
535 "crypto/kdf/tls1_prf.c",
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/
DCMakeLists.txt308 src/crypto/sha256-kdf.c
315 src/crypto/sha384-kdf.c
322 src/crypto/sha512-kdf.c
DBUILD.gn237 "$WPA_ROOT_DIR/src/crypto/sha256-kdf.c",

12