Symbol: kdf
lib/libcrypto/asn1/p5_pbev2.c
289
PBKDF2PARAM *kdf = NULL;
lib/libcrypto/asn1/p5_pbev2.c
292
if (!(kdf = PBKDF2PARAM_new()))
lib/libcrypto/asn1/p5_pbev2.c
297
kdf->salt->value.octet_string = osalt;
lib/libcrypto/asn1/p5_pbev2.c
298
kdf->salt->type = V_ASN1_OCTET_STRING;
lib/libcrypto/asn1/p5_pbev2.c
315
if (!ASN1_INTEGER_set(kdf->iter, iter))
lib/libcrypto/asn1/p5_pbev2.c
321
if (!(kdf->keylength = ASN1_INTEGER_new()))
lib/libcrypto/asn1/p5_pbev2.c
323
if (!ASN1_INTEGER_set(kdf->keylength, keylen))
lib/libcrypto/asn1/p5_pbev2.c
329
kdf->prf = X509_ALGOR_new();
lib/libcrypto/asn1/p5_pbev2.c
330
if (!kdf->prf)
lib/libcrypto/asn1/p5_pbev2.c
332
X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
lib/libcrypto/asn1/p5_pbev2.c
349
if (!ASN1_item_pack(kdf, &PBKDF2PARAM_it,
lib/libcrypto/asn1/p5_pbev2.c
354
PBKDF2PARAM_free(kdf);
lib/libcrypto/asn1/p5_pbev2.c
359
PBKDF2PARAM_free(kdf);
lib/libcrypto/ec/ec.h
390
#define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \
lib/libcrypto/ec/ec.h
393
EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
lib/libcrypto/evp/evp_pbe.c
514
PBKDF2PARAM *kdf = NULL;
lib/libcrypto/evp/evp_pbe.c
538
if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
lib/libcrypto/evp/evp_pbe.c
545
if (kdf->keylength &&
lib/libcrypto/evp/evp_pbe.c
546
(ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
lib/libcrypto/evp/evp_pbe.c
551
if (kdf->prf)
lib/libcrypto/evp/evp_pbe.c
552
prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
lib/libcrypto/evp/evp_pbe.c
567
if (kdf->salt->type != V_ASN1_OCTET_STRING) {
lib/libcrypto/evp/evp_pbe.c
573
salt = kdf->salt->value.octet_string->data;
lib/libcrypto/evp/evp_pbe.c
574
saltlen = kdf->salt->value.octet_string->length;
lib/libcrypto/evp/evp_pbe.c
575
if ((iter = ASN1_INTEGER_get(kdf->iter)) <= 0) {
lib/libcrypto/evp/evp_pbe.c
587
PBKDF2PARAM_free(kdf);
lib/libcrypto/mlkem/mlkem_internal.c
1127
kdf(failure_key, priv.fo_failure_secret, ciphertext, ciphertext_len);
lib/libfido2/src/ecdh.c
145
if (kdf(fido_dev_get_pin_protocol(dev), *ecdh, secret) < 0) {
lib/libfido2/src/tpm.c
120
uint16_t kdf; /* TPM_ALG_NULL */
lib/libfido2/src/tpm.c
208
x->param.kdf = htobe16(x->param.kdf);
lib/libfido2/src/tpm.c
283
expected.param.kdf = TPM_ALG_NULL;
usr.bin/openssl/speed.c
2337
void *(*kdf) (const void *in, size_t inlen, void *out, size_t * xoutlen);
usr.bin/openssl/speed.c
2341
kdf = KDF1_SHA1;
usr.bin/openssl/speed.c
2344
kdf = NULL;
usr.bin/openssl/speed.c
2348
ecdh_a[j], kdf);
usr.bin/openssl/speed.c
2351
ecdh_b[j], kdf);
usr.bin/openssl/speed.c
2379
ecdh_a[j], kdf);
usr.bin/signify/signify.c
327
kdf(enckey.salt, sizeof(enckey.salt), rounds, 1, 1, xorkey, sizeof(xorkey));
usr.bin/signify/signify.c
414
kdf(enckey.salt, sizeof(enckey.salt), rounds, strcmp(msgfile, "-") != 0,
usr.bin/ssh/pkcs11.h
883
unsigned long kdf;
usr.bin/ssh/pkcs11.h
891
unsigned long kdf;
usr.bin/ssh/sshkey.c
2784
struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL;
usr.bin/ssh/sshkey.c
2798
if ((kdf = sshbuf_new()) == NULL ||
usr.bin/ssh/sshkey.c
2819
if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 ||
usr.bin/ssh/sshkey.c
2820
(r = sshbuf_put_u32(kdf, rounds)) != 0)
usr.bin/ssh/sshkey.c
2834
(r = sshbuf_put_stringb(encoded, kdf)) != 0 ||
usr.bin/ssh/sshkey.c
2884
sshbuf_free(kdf);
usr.bin/ssh/sshkey.c
2979
struct sshbuf *kdf = NULL, *decrypted = NULL;
usr.bin/ssh/sshkey.c
3000
(r = sshbuf_froms(decoded, &kdf)) != 0 ||
usr.bin/ssh/sshkey.c
3049
if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 ||
usr.bin/ssh/sshkey.c
3050
(r = sshbuf_get_u32(kdf, &rounds)) != 0)
usr.bin/ssh/sshkey.c
3113
sshbuf_free(kdf);
usr.bin/ssh/umac.c
221
kdf(buf, prf_key, 0, UMAC_KEY_LEN);
usr.bin/ssh/umac.c
600
kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key));
usr.bin/ssh/umac.c
965
kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */
usr.bin/ssh/umac.c
979
kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */
usr.bin/ssh/umac.c
990
kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));