/freebsd/crypto/openssl/test/ |
H A D | evp_kdf_test.c | 26 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf); in get_kdfbyname_libctx() local 29 return kctx; in get_kdfbyname_libctx() 62 EVP_KDF_CTX *kctx = NULL; in test_kdf_tls1_prf() local 73 && TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_TLS1_PRF)) in test_kdf_tls1_prf() 74 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0) in test_kdf_tls1_prf() 77 EVP_KDF_CTX_free(kctx); in test_kdf_tls1_prf() 85 EVP_KDF_CTX *kctx = NULL; in test_kdf_tls1_prf_invalid_digest() local 91 && TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_TLS1_PRF)) in test_kdf_tls1_prf_invalid_digest() 92 && TEST_false(EVP_KDF_CTX_set_params(kctx, params)); in test_kdf_tls1_prf_invalid_digest() 94 EVP_KDF_CTX_free(kctx); in test_kdf_tls1_prf_invalid_digest() [all …]
|
/freebsd/crypto/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 156 struct kmac_data_st *kctx = vmacctx; in kmac_free() local 158 if (kctx != NULL) { in kmac_free() 159 EVP_MD_CTX_free(kctx->ctx); in kmac_free() 160 ossl_prov_digest_reset(&kctx->digest); in kmac_free() 161 OPENSSL_cleanse(kctx->key, kctx->key_len); in kmac_free() 162 OPENSSL_cleanse(kctx->custom, kctx->custom_len); in kmac_free() 163 OPENSSL_free(kctx); in kmac_free() 174 struct kmac_data_st *kctx; in kmac_new() local 179 if ((kctx = OPENSSL_zalloc(sizeof(*kctx))) == NULL in kmac_new() 180 || (kctx->ctx = EVP_MD_CTX_new()) == NULL) { in kmac_new() [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/openssl/ |
H A D | kdf.c | 75 EVP_KDF_CTX *kctx = NULL; in k5_sp800_108_counter_hmac() local 91 kctx = EVP_KDF_CTX_new(kdf); in k5_sp800_108_counter_hmac() 92 if (!kctx) { in k5_sp800_108_counter_hmac() 108 if (EVP_KDF_derive(kctx, (uint8_t *)rnd_out->data, rnd_out->length, in k5_sp800_108_counter_hmac() 119 EVP_KDF_CTX_free(kctx); in k5_sp800_108_counter_hmac() 129 EVP_KDF_CTX *kctx = NULL; in k5_sp800_108_feedback_cmac() local 148 kctx = EVP_KDF_CTX_new(kdf); in k5_sp800_108_feedback_cmac() 149 if (!kctx) { in k5_sp800_108_feedback_cmac() 167 if (EVP_KDF_derive(kctx, (uint8_t *)rnd_out->data, rnd_out->length, in k5_sp800_108_feedback_cmac() 178 EVP_KDF_CTX_free(kctx); in k5_sp800_108_feedback_cmac() [all …]
|
/freebsd/crypto/openssl/crypto/hpke/ |
H A D | hpke_util.c | 247 static int kdf_derive(EVP_KDF_CTX *kctx, in kdf_derive() argument 267 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in kdf_derive() 273 int ossl_hpke_kdf_extract(EVP_KDF_CTX *kctx, in ossl_hpke_kdf_extract() argument 278 return kdf_derive(kctx, prk, prklen, EVP_KDF_HKDF_MODE_EXTRACT_ONLY, in ossl_hpke_kdf_extract() 283 int ossl_hpke_kdf_expand(EVP_KDF_CTX *kctx, in ossl_hpke_kdf_expand() argument 288 return kdf_derive(kctx, okm, okmlen, EVP_KDF_HKDF_MODE_EXPAND_ONLY, in ossl_hpke_kdf_expand() 295 int ossl_hpke_labeled_extract(EVP_KDF_CTX *kctx, in ossl_hpke_labeled_extract() argument 333 ret = ossl_hpke_kdf_extract(kctx, prk, prklen, salt, saltlen, in ossl_hpke_labeled_extract() 345 int ossl_hpke_labeled_expand(EVP_KDF_CTX *kctx, in ossl_hpke_labeled_expand() argument 384 ret = ossl_hpke_kdf_expand(kctx, okm, okmlen, in ossl_hpke_labeled_expand() [all …]
|
/freebsd/sys/dev/cxgbe/crypto/ |
H A D | t4_keyctx.c | 530 struct tls_keyctx *kctx) in t4_tls_key_ctx() argument 538 kctx->u.txhdr.ctxlen = t4_tls_key_info_size(tls) / 16; in t4_tls_key_ctx() 539 kctx->u.txhdr.dualck_to_txvalid = in t4_tls_key_ctx() 545 kctx->u.txhdr.dualck_to_txvalid |= in t4_tls_key_ctx() 547 kctx->u.txhdr.dualck_to_txvalid = in t4_tls_key_ctx() 548 htobe16(kctx->u.txhdr.dualck_to_txvalid); in t4_tls_key_ctx() 550 kctx->u.rxhdr.flitcnt_hmacctrl = in t4_tls_key_ctx() 554 kctx->u.rxhdr.protover_ciphmode = in t4_tls_key_ctx() 558 kctx->u.rxhdr.authmode_to_rxvalid = in t4_tls_key_ctx() 563 kctx->u.rxhdr.ivpresent_to_rxmk_size = in t4_tls_key_ctx() [all …]
|
/freebsd/crypto/openssl/demos/kdf/ |
H A D | pbkdf2.c | 62 EVP_KDF_CTX *kctx = NULL; in main() local 81 kctx = EVP_KDF_CTX_new(kdf); in main() 82 if (kctx == NULL) { in main() 101 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main() 115 EVP_KDF_CTX_free(kctx); in main()
|
H A D | hkdf.c | 48 EVP_KDF_CTX *kctx = NULL; in main() local 67 kctx = EVP_KDF_CTX_new(kdf); in main() 68 if (kctx == NULL) { in main() 88 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main() 102 EVP_KDF_CTX_free(kctx); in main()
|
H A D | scrypt.c | 64 EVP_KDF_CTX *kctx = NULL; in main() local 83 kctx = EVP_KDF_CTX_new(kdf); in main() 84 if (kctx == NULL) { in main() 104 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main() 118 EVP_KDF_CTX_free(kctx); in main()
|
H A D | argon2.c | 79 EVP_KDF_CTX *kctx = NULL; in main() local 99 kctx = EVP_KDF_CTX_new(kdf); in main() 100 if (kctx == NULL) { in main() 138 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main() 152 EVP_KDF_CTX_free(kctx); in main()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 95 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf); 106 EVP_KDF_CTX *kctx; 111 kctx = EVP_KDF_CTX_new(kdf); 121 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 125 EVP_KDF_CTX_free(kctx); 131 EVP_KDF_CTX *kctx; 136 kctx = EVP_KDF_CTX_new(kdf); 150 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 154 EVP_KDF_CTX_free(kctx); 160 EVP_KDF_CTX *kctx; [all …]
|
H A D | EVP_KDF-KB.pod | 109 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf); 123 EVP_KDF_CTX *kctx; 128 kctx = EVP_KDF_CTX_new(kdf); 142 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 145 EVP_KDF_CTX_free(kctx); 151 EVP_KDF_CTX *kctx; 157 kctx = EVP_KDF_CTX_new(kdf); 172 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 175 EVP_KDF_CTX_free(kctx);
|
H A D | EVP_KDF-X942-ASN1.pod | 109 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf); 119 EVP_KDF_CTX *kctx; 120 EVP_KDF_CTX *kctx; 129 if (kctx == NULL) 131 kctx = EVP_KDF_CTX_new(kdf); 133 if (kctx == NULL) 142 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 145 EVP_KDF_CTX_free(kctx);
|
H A D | provider-kdf.pod | 22 void OSSL_FUNC_kdf_freectx(void *kctx); 26 int OSSL_FUNC_kdf_reset(void *kctx); 27 int OSSL_FUNC_kdf_derive(void *kctx, unsigned char *key, size_t keylen, 37 int OSSL_FUNC_kdf_get_ctx_params(void *kctx, OSSL_PARAM params[]); 38 int OSSL_FUNC_kdf_set_ctx_params(void *kctx, const OSSL_PARAM params[]); 99 the I<kctx> parameter. 100 If it receives NULL as I<kctx> value, it should not do anything other than 105 I<kctx> parameter and return the duplicate copy. 110 side KDF context in the I<kctx> parameter. 114 The I<kctx> parameter contains a pointer to the provider side context. [all …]
|
/freebsd/crypto/krb5/src/tests/gssapi/ |
H A D | t_enctypes.c | 81 krb5_context kctx = NULL; in main() local 97 ret = krb5_init_context(&kctx); in main() 98 check_k5err(kctx, "krb5_init_context", ret); in main() 104 ret = krb5int_parse_enctype_list(kctx, "", optarg, &zero, &ienc); in main() 105 check_k5err(kctx, "krb5_parse_enctype_list(initiator)", ret); in main() 108 ret = krb5int_parse_enctype_list(kctx, "", optarg, &zero, &aenc); in main() 109 check_k5err(kctx, "krb5_parse_enctype_list(acceptor)", ret); in main() 194 krb5_free_context(kctx); in main()
|
/freebsd/crypto/krb5/src/lib/krad/ |
H A D | t_remote.c | 60 remote_new(krb5_context kctx, krad_remote **remote) in remote_new() argument 69 noerror(kr_remote_new(kctx, vctx, ai, "foo", remote)); in remote_new() 108 krb5_context kctx = NULL; in main() local 117 noerror(krb5_init_context(&kctx)); in main() 120 remote_new(kctx, &rr); in main() 123 noerror(krad_attrset_new(kctx, &set)); in main() 166 krb5_free_context(kctx); in main()
|
H A D | t_client.c | 62 krb5_context kctx; in main() local 70 noerror(krb5_init_context(&kctx)); in main() 73 noerror(krad_client_new(kctx, vctx, &rc)); in main() 76 noerror(krad_attrset_new(kctx, &attrs)); in main() 120 krb5_free_context(kctx); in main()
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_kdf.c | 35 EVP_KDF_CTX *kctx = NULL; in ossl_dh_kdf_X9_42_asn1() local 43 kctx = EVP_KDF_CTX_new(kdf); in ossl_dh_kdf_X9_42_asn1() 44 if (kctx == NULL) in ossl_dh_kdf_X9_42_asn1() 57 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_dh_kdf_X9_42_asn1() 59 EVP_KDF_CTX_free(kctx); in ossl_dh_kdf_X9_42_asn1()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 46 EVP_KDF_CTX *kctx; in EVP_PBE_scrypt_ex() local 68 kctx = EVP_KDF_CTX_new(kdf); in EVP_PBE_scrypt_ex() 70 if (kctx == NULL) in EVP_PBE_scrypt_ex() 83 if (EVP_KDF_derive(kctx, key, keylen, params) != 1) in EVP_PBE_scrypt_ex() 86 EVP_KDF_CTX_free(kctx); in EVP_PBE_scrypt_ex()
|
H A D | p5_crpt.c | 40 EVP_KDF_CTX *kctx = NULL; in PKCS5_PBE_keyivgen_ex() local 85 kctx = EVP_KDF_CTX_new(kdf); in PKCS5_PBE_keyivgen_ex() 87 if (kctx == NULL) in PKCS5_PBE_keyivgen_ex() 97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex() 108 EVP_KDF_CTX_free(kctx); in PKCS5_PBE_keyivgen_ex()
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 31 EVP_KDF_CTX *kctx = NULL; in ossl_ecdh_kdf_X9_63() local 36 if ((kctx = EVP_KDF_CTX_new(kdf)) != NULL) { in ossl_ecdh_kdf_X9_63() 45 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_ecdh_kdf_X9_63() 46 EVP_KDF_CTX_free(kctx); in ossl_ecdh_kdf_X9_63()
|
/freebsd/sys/contrib/openzfs/module/icp/core/ |
H A D | kcf_sched.c | 114 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_constructor() local 116 kctx->kc_refcnt = 0; in kcf_context_cache_constructor() 125 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_destructor() local 127 ASSERT0(kctx->kc_refcnt); in kcf_context_cache_destructor()
|
/freebsd/crypto/openssl/include/internal/ |
H A D | hpke_util.h | 71 int ossl_hpke_kdf_extract(EVP_KDF_CTX *kctx, 76 int ossl_hpke_kdf_expand(EVP_KDF_CTX *kctx, 81 int ossl_hpke_labeled_extract(EVP_KDF_CTX *kctx, 88 int ossl_hpke_labeled_expand(EVP_KDF_CTX *kctx,
|
/freebsd/crypto/krb5/src/kadmin/server/ |
H A D | kadm_rpc_svc.c | 284 krb5_context kctx; in check_rpcsec_auth() local 312 kctx = handle->context; in check_rpcsec_auth() 313 ret = gss_to_krb5_name_1(rqstp, kctx, name, &princ, &gss_str); in check_rpcsec_auth() 324 if (krb5_princ_size(kctx, princ) != 2) in check_rpcsec_auth() 327 c1 = krb5_princ_component(kctx, princ, 0); in check_rpcsec_auth() 328 c2 = krb5_princ_component(kctx, princ, 1); in check_rpcsec_auth() 329 realm = krb5_princ_realm(kctx, princ); in check_rpcsec_auth() 339 krb5_free_principal(kctx, princ); in check_rpcsec_auth()
|
/freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
H A D | krb5_gss_glue.c | 157 void **kctx) in gss_krb5_export_lucid_sec_context() argument 164 if (kctx == NULL) in gss_krb5_export_lucid_sec_context() 167 *kctx = NULL; in gss_krb5_export_lucid_sec_context() 194 *kctx = *((void **)data_set->elements[0].value); in gss_krb5_export_lucid_sec_context() 261 gss_krb5_free_lucid_sec_context(OM_uint32 *minor_status, void *kctx) in gss_krb5_free_lucid_sec_context() argument 269 req_buffer.length = sizeof(kctx); in gss_krb5_free_lucid_sec_context() 270 req_buffer.value = kctx; in gss_krb5_free_lucid_sec_context()
|
H A D | lucid_context.c | 132 void *kctx; in gss_krb5int_free_lucid_sec_context() local 138 kctx = value->value; in gss_krb5int_free_lucid_sec_context() 139 if (!kctx) { in gss_krb5int_free_lucid_sec_context() 145 version = ((gss_krb5_lucid_context_version_t *)kctx)->version; in gss_krb5int_free_lucid_sec_context() 148 free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx); in gss_krb5int_free_lucid_sec_context()
|