Lines Matching +full:1 +full:eb

41 		oid->oid[0] == 1 /* iso */ &&  in oid_is_rsadsi()
42 oid->oid[1] == 2 /* member-body */ && in oid_is_rsadsi()
52 oid->oid[4] == 1 /* pkcs */ && in pkcs5_is_oid()
71 oid->oid[4] == 1 /* pkcs */ && in pkcs12_is_pbe_oid()
73 oid->oid[6] == 1 /* pkcs-12PbeIds */ && in pkcs12_is_pbe_oid()
113 return -1; in pkcs5_get_params_pbes2()
122 return -1; in pkcs5_get_params_pbes2()
131 return -1; in pkcs5_get_params_pbes2()
141 return -1; in pkcs5_get_params_pbes2()
152 * iterationCount INTEGER (1..MAX), in pkcs5_get_params_pbes2()
153 * keyLength INTEGER (1..MAX) OPTIONAL, in pkcs5_get_params_pbes2()
163 return -1; in pkcs5_get_params_pbes2()
175 return -1; in pkcs5_get_params_pbes2()
185 return -1; in pkcs5_get_params_pbes2()
187 if (hdr.length == 1) { in pkcs5_get_params_pbes2()
197 return -1; in pkcs5_get_params_pbes2()
204 return -1; in pkcs5_get_params_pbes2()
217 return -1; in pkcs5_get_params_pbes2()
226 return -1; in pkcs5_get_params_pbes2()
238 return -1; in pkcs5_get_params_pbes2()
251 return -1; in pkcs5_get_params_pbes2()
278 return -1; in pkcs5_get_params()
287 return -1; in pkcs5_get_params()
313 return -1; in pkcs5_get_params()
323 return -1; in pkcs5_get_params()
335 return -1; in pkcs5_get_params()
337 if (hdr.length == 1) in pkcs5_get_params()
347 return -1; in pkcs5_get_params()
354 return -1; in pkcs5_get_params()
392 for (i = len - 1; i < len; i--) { in add_byte_array_mod()
406 int res = -1; in pkcs12_key_gen()
419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen()
445 addr[1] = I; in pkcs12_key_gen()
446 len[1] = S_len + P_len; in pkcs12_key_gen()
452 for (i = 1; i < iter; i++) { in pkcs12_key_gen()
453 if (sha1_vector(1, addr, len, hash) < 0) in pkcs12_key_gen()
467 /* I_j = (I_j + B + 1) mod 2^(v*8) */ in pkcs12_key_gen()
484 #define PKCS12_ID_ENC 1
501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1()
507 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1()
548 addr[1] = params->salt; in pkcs5_crypto_init()
549 len[1] = params->salt_len; in pkcs5_crypto_init()
554 for (i = 1; i < params->iter_count; i++) { in pkcs5_crypto_init()
555 if (md5_vector(1, addr, len, hash) < 0) in pkcs5_crypto_init()
571 u8 *eb, pad; in pkcs5_decrypt() local
594 eb = os_malloc(enc_data_len); in pkcs5_decrypt()
595 if (eb == NULL) { in pkcs5_decrypt()
600 if (crypto_cipher_decrypt(ctx, enc_data, eb, enc_data_len) < 0) { in pkcs5_decrypt()
601 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to decrypt EB"); in pkcs5_decrypt()
603 os_free(eb); in pkcs5_decrypt()
608 pad = eb[enc_data_len - 1]; in pkcs5_decrypt()
611 os_free(eb); in pkcs5_decrypt()
615 if (eb[i] != pad) { in pkcs5_decrypt()
617 eb + enc_data_len - pad, pad); in pkcs5_decrypt()
618 os_free(eb); in pkcs5_decrypt()
624 eb, enc_data_len - pad); in pkcs5_decrypt()
627 return eb; in pkcs5_decrypt()