kdf
PBKDF2PARAM *kdf = NULL;
if (!(kdf = PBKDF2PARAM_new()))
kdf->salt->value.octet_string = osalt;
kdf->salt->type = V_ASN1_OCTET_STRING;
if (!ASN1_INTEGER_set(kdf->iter, iter))
if (!(kdf->keylength = ASN1_INTEGER_new()))
if (!ASN1_INTEGER_set(kdf->keylength, keylen))
kdf->prf = X509_ALGOR_new();
if (!kdf->prf)
X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid),
if (!ASN1_item_pack(kdf, &PBKDF2PARAM_it,
PBKDF2PARAM_free(kdf);
PBKDF2PARAM_free(kdf);
#define EVP_PKEY_CTX_set_ecdh_kdf_type(ctx, kdf) \
EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL)
PBKDF2PARAM *kdf = NULL;
if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
if (kdf->keylength &&
(ASN1_INTEGER_get(kdf->keylength) != (int)keylen)){
if (kdf->prf)
prf_nid = OBJ_obj2nid(kdf->prf->algorithm);
if (kdf->salt->type != V_ASN1_OCTET_STRING) {
salt = kdf->salt->value.octet_string->data;
saltlen = kdf->salt->value.octet_string->length;
if ((iter = ASN1_INTEGER_get(kdf->iter)) <= 0) {
PBKDF2PARAM_free(kdf);
kdf(failure_key, priv.fo_failure_secret, ciphertext, ciphertext_len);
if (kdf(fido_dev_get_pin_protocol(dev), *ecdh, secret) < 0) {
uint16_t kdf; /* TPM_ALG_NULL */
x->param.kdf = htobe16(x->param.kdf);
expected.param.kdf = TPM_ALG_NULL;
void *(*kdf) (const void *in, size_t inlen, void *out, size_t * xoutlen);
kdf = KDF1_SHA1;
kdf = NULL;
ecdh_a[j], kdf);
ecdh_b[j], kdf);
ecdh_a[j], kdf);
kdf(enckey.salt, sizeof(enckey.salt), rounds, 1, 1, xorkey, sizeof(xorkey));
kdf(enckey.salt, sizeof(enckey.salt), rounds, strcmp(msgfile, "-") != 0,
unsigned long kdf;
unsigned long kdf;
struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL;
if ((kdf = sshbuf_new()) == NULL ||
if ((r = sshbuf_put_string(kdf, salt, SALT_LEN)) != 0 ||
(r = sshbuf_put_u32(kdf, rounds)) != 0)
(r = sshbuf_put_stringb(encoded, kdf)) != 0 ||
sshbuf_free(kdf);
struct sshbuf *kdf = NULL, *decrypted = NULL;
(r = sshbuf_froms(decoded, &kdf)) != 0 ||
if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 ||
(r = sshbuf_get_u32(kdf, &rounds)) != 0)
sshbuf_free(kdf);
kdf(buf, prf_key, 0, UMAC_KEY_LEN);
kdf(hc->nh_key, prf_key, 1, sizeof(hc->nh_key));
kdf(buf, prf_key, 2, sizeof(buf)); /* Fill buffer with index 1 key */
kdf(buf, prf_key, 3, sizeof(buf)); /* Fill buffer with index 2 key */
kdf(ahc->ip_trans, prf_key, 4, STREAMS * sizeof(UINT32));