/third_party/openssl/crypto/asn1/ |
D | p5_pbev2.c | 153 PBKDF2PARAM *kdf = NULL; in PKCS5_pbkdf2_set() local 156 if ((kdf = PBKDF2PARAM_new()) == NULL) in PKCS5_pbkdf2_set() 161 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set() 162 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set() 179 if (!ASN1_INTEGER_set(kdf->iter, iter)) in PKCS5_pbkdf2_set() 185 if ((kdf->keylength = ASN1_INTEGER_new()) == NULL) in PKCS5_pbkdf2_set() 187 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set() 193 kdf->prf = X509_ALGOR_new(); in PKCS5_pbkdf2_set() 194 if (kdf->prf == NULL) in PKCS5_pbkdf2_set() 196 X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL); in PKCS5_pbkdf2_set() [all …]
|
/third_party/openssl/crypto/evp/ |
D | p5_crpt2.c | 144 EVP_PBE_KEYGEN *kdf; in PKCS5_v2_PBE_keyivgen() local 156 NULL, NULL, &kdf)) { in PKCS5_v2_PBE_keyivgen() 180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); in PKCS5_v2_PBE_keyivgen() 195 PBKDF2PARAM *kdf = NULL; in PKCS5_v2_PBKDF2_keyivgen() local 207 kdf = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(PBKDF2PARAM), param); in PKCS5_v2_PBKDF2_keyivgen() 209 if (kdf == NULL) { in PKCS5_v2_PBKDF2_keyivgen() 218 if (kdf->keylength && (ASN1_INTEGER_get(kdf->keylength) != (int)keylen)) { in PKCS5_v2_PBKDF2_keyivgen() 223 if (kdf->prf) in PKCS5_v2_PBKDF2_keyivgen() 224 prf_nid = OBJ_obj2nid(kdf->prf->algorithm); in PKCS5_v2_PBKDF2_keyivgen() 239 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen() [all …]
|
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/ |
D | ssh-private.js | 38 var kdf = buf.readString(); 58 switch (kdf) { 114 'OpenSSH-format key uses unknown KDF "' + kdf + '"')); 145 var kdf = 'none'; 160 kdf = 'bcrypt'; 179 switch (kdf) { 221 throw (new Error('Unsupported kdf ' + kdf)); 228 buf.writeString(kdf); /* kdf */
|
/third_party/openssl/apps/ |
D | pkcs12.c | 809 PBKDF2PARAM *kdf = NULL; in alg_print() local 812 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(PBKDF2PARAM)); in alg_print() 813 if (kdf == NULL) { in alg_print() 818 if (kdf->prf == NULL) { in alg_print() 821 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf); in alg_print() 825 ASN1_INTEGER_get(kdf->iter), OBJ_nid2sn(prfnid)); in alg_print() 826 PBKDF2PARAM_free(kdf); in alg_print() 829 SCRYPT_PARAMS *kdf = NULL; in alg_print() local 832 kdf = ASN1_item_unpack(aparam, ASN1_ITEM_rptr(SCRYPT_PARAMS)); in alg_print() 833 if (kdf == NULL) { in alg_print() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_aka.c | 56 u16 kdf; member 612 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure() 839 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 844 data->kdf = kdf; in eap_aka_prime_kdf_select() 850 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 861 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg() 862 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg() 894 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 908 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid() 916 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_aka.c | 56 u16 kdf; member 603 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, attr->kdf[i], in eap_aka_synchronization_failure() 825 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument 830 data->kdf = kdf; in eap_aka_prime_kdf_select() 836 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0); in eap_aka_prime_kdf_select() 847 if (attr->kdf[i] == EAP_AKA_PRIME_KDF) { in eap_aka_prime_kdf_neg() 848 os_memcpy(data->last_kdf_attrs, attr->kdf, in eap_aka_prime_kdf_neg() 880 if (attr->kdf[0] != data->kdf) { in eap_aka_prime_kdf_valid() 894 if (attr->kdf[i] != data->last_kdf_attrs[i - 1]) { in eap_aka_prime_kdf_valid() 902 for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) { in eap_aka_prime_kdf_valid() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_aka.c | 52 u16 kdf; member 486 if (data->kdf) { in eap_aka_build_challenge() 489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_aka.c | 52 u16 kdf; member 486 if (data->kdf) { in eap_aka_build_challenge() 489 eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf, in eap_aka_build_challenge() 944 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 953 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() 957 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
|
/third_party/openssl/crypto/err/ |
D | openssl.ec | 34 L KDF include/openssl/kdf.h crypto/kdf/kdf_err.c
|
/third_party/openssl/include/openssl/ |
D | dh.h | 262 # define EVP_PKEY_CTX_set_dh_kdf_type(ctx, kdf) \ argument 265 EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL)
|
D | ec.h | 1402 # define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \ argument 1405 EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_CTX_set1_pbe_pass.pod | 10 #include <openssl/kdf.h>
|
D | EVP_PKEY_CTX_set_scrypt_N.pod | 14 #include <openssl/kdf.h>
|
D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 11 #include <openssl/kdf.h>
|
D | EVP_PKEY_CTX_ctrl.pod | 111 int EVP_PKEY_CTX_set_dh_kdf_type(EVP_PKEY_CTX *ctx, int kdf); 128 int EVP_PKEY_CTX_set_ecdh_kdf_type(EVP_PKEY_CTX *ctx, int kdf); 320 to B<kdf> for DH key derivation. Possible values are B<EVP_PKEY_DH_KDF_NONE> 393 to B<kdf> for ECDH key derivation. Possible values are B<EVP_PKEY_ECDH_KDF_NONE>
|
D | EVP_PKEY_CTX_set_hkdf_md.pod | 12 #include <openssl/kdf.h>
|
/third_party/openssl/doc/man1/ |
D | pkeyutl.pod | 29 [B<-kdf algorithm>] 126 =item B<-kdf algorithm> 324 openssl pkeyutl -kdf TLS1-PRF -kdflen 48 -pkeyopt md:SHA256 \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
D | eap_sim_common.c | 896 attr->kdf[attr->kdf_count] = WPA_GET_BE16(apos); in eap_sim_parse_attr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 200 u16 kdf[EAP_AKA_PRIME_KDF_MAX]; member
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppbe.txt | 15 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others)
|
D | evpkdf.txt | 255 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
|
/third_party/openssl/ |
D | BUILD.gn | 532 "crypto/kdf/hkdf.c", 533 "crypto/kdf/kdf_err.c", 534 "crypto/kdf/scrypt.c", 535 "crypto/kdf/tls1_prf.c",
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/ |
D | CMakeLists.txt | 308 src/crypto/sha256-kdf.c 315 src/crypto/sha384-kdf.c 322 src/crypto/sha512-kdf.c
|
D | BUILD.gn | 237 "$WPA_ROOT_DIR/src/crypto/sha256-kdf.c",
|