Home
last modified time | relevance | path

Searched refs:kctx (Results 1 – 25 of 68) sorted by relevance

123

/freebsd/crypto/openssl/test/
H A Devp_kdf_test.c26 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf); in get_kdfbyname_libctx() local
29 return kctx; in get_kdfbyname_libctx()
62 EVP_KDF_CTX *kctx = NULL; in test_kdf_tls1_prf() local
73 && TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_TLS1_PRF)) in test_kdf_tls1_prf()
74 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0) in test_kdf_tls1_prf()
77 EVP_KDF_CTX_free(kctx); in test_kdf_tls1_prf()
85 EVP_KDF_CTX *kctx = NULL; in test_kdf_tls1_prf_invalid_digest() local
91 && TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_TLS1_PRF)) in test_kdf_tls1_prf_invalid_digest()
92 && TEST_false(EVP_KDF_CTX_set_params(kctx, params)); in test_kdf_tls1_prf_invalid_digest()
94 EVP_KDF_CTX_free(kctx); in test_kdf_tls1_prf_invalid_digest()
[all …]
/freebsd/crypto/openssl/providers/implementations/macs/
H A Dkmac_prov.c156 struct kmac_data_st *kctx = vmacctx; in kmac_free() local
158 if (kctx != NULL) { in kmac_free()
159 EVP_MD_CTX_free(kctx->ctx); in kmac_free()
160 ossl_prov_digest_reset(&kctx->digest); in kmac_free()
161 OPENSSL_cleanse(kctx->key, kctx->key_len); in kmac_free()
162 OPENSSL_cleanse(kctx->custom, kctx->custom_len); in kmac_free()
163 OPENSSL_free(kctx); in kmac_free()
174 struct kmac_data_st *kctx; in kmac_new() local
179 if ((kctx = OPENSSL_zalloc(sizeof(*kctx))) == NULL in kmac_new()
180 || (kctx->ctx = EVP_MD_CTX_new()) == NULL) { in kmac_new()
[all …]
/freebsd/crypto/krb5/src/lib/crypto/openssl/
H A Dkdf.c75 EVP_KDF_CTX *kctx = NULL; in k5_sp800_108_counter_hmac() local
91 kctx = EVP_KDF_CTX_new(kdf); in k5_sp800_108_counter_hmac()
92 if (!kctx) { in k5_sp800_108_counter_hmac()
108 if (EVP_KDF_derive(kctx, (uint8_t *)rnd_out->data, rnd_out->length, in k5_sp800_108_counter_hmac()
119 EVP_KDF_CTX_free(kctx); in k5_sp800_108_counter_hmac()
129 EVP_KDF_CTX *kctx = NULL; in k5_sp800_108_feedback_cmac() local
148 kctx = EVP_KDF_CTX_new(kdf); in k5_sp800_108_feedback_cmac()
149 if (!kctx) { in k5_sp800_108_feedback_cmac()
167 if (EVP_KDF_derive(kctx, (uint8_t *)rnd_out->data, rnd_out->length, in k5_sp800_108_feedback_cmac()
178 EVP_KDF_CTX_free(kctx); in k5_sp800_108_feedback_cmac()
[all …]
/freebsd/crypto/openssl/crypto/hpke/
H A Dhpke_util.c247 static int kdf_derive(EVP_KDF_CTX *kctx, in kdf_derive() argument
267 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in kdf_derive()
273 int ossl_hpke_kdf_extract(EVP_KDF_CTX *kctx, in ossl_hpke_kdf_extract() argument
278 return kdf_derive(kctx, prk, prklen, EVP_KDF_HKDF_MODE_EXTRACT_ONLY, in ossl_hpke_kdf_extract()
283 int ossl_hpke_kdf_expand(EVP_KDF_CTX *kctx, in ossl_hpke_kdf_expand() argument
288 return kdf_derive(kctx, okm, okmlen, EVP_KDF_HKDF_MODE_EXPAND_ONLY, in ossl_hpke_kdf_expand()
295 int ossl_hpke_labeled_extract(EVP_KDF_CTX *kctx, in ossl_hpke_labeled_extract() argument
333 ret = ossl_hpke_kdf_extract(kctx, prk, prklen, salt, saltlen, in ossl_hpke_labeled_extract()
345 int ossl_hpke_labeled_expand(EVP_KDF_CTX *kctx, in ossl_hpke_labeled_expand() argument
384 ret = ossl_hpke_kdf_expand(kctx, okm, okmlen, in ossl_hpke_labeled_expand()
[all …]
/freebsd/sys/dev/cxgbe/crypto/
H A Dt4_keyctx.c530 struct tls_keyctx *kctx) in t4_tls_key_ctx() argument
538 kctx->u.txhdr.ctxlen = t4_tls_key_info_size(tls) / 16; in t4_tls_key_ctx()
539 kctx->u.txhdr.dualck_to_txvalid = in t4_tls_key_ctx()
545 kctx->u.txhdr.dualck_to_txvalid |= in t4_tls_key_ctx()
547 kctx->u.txhdr.dualck_to_txvalid = in t4_tls_key_ctx()
548 htobe16(kctx->u.txhdr.dualck_to_txvalid); in t4_tls_key_ctx()
550 kctx->u.rxhdr.flitcnt_hmacctrl = in t4_tls_key_ctx()
554 kctx->u.rxhdr.protover_ciphmode = in t4_tls_key_ctx()
558 kctx->u.rxhdr.authmode_to_rxvalid = in t4_tls_key_ctx()
563 kctx->u.rxhdr.ivpresent_to_rxmk_size = in t4_tls_key_ctx()
[all …]
/freebsd/crypto/openssl/demos/kdf/
H A Dpbkdf2.c62 EVP_KDF_CTX *kctx = NULL; in main() local
81 kctx = EVP_KDF_CTX_new(kdf); in main()
82 if (kctx == NULL) { in main()
101 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
115 EVP_KDF_CTX_free(kctx); in main()
H A Dhkdf.c48 EVP_KDF_CTX *kctx = NULL; in main() local
67 kctx = EVP_KDF_CTX_new(kdf); in main()
68 if (kctx == NULL) { in main()
88 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
102 EVP_KDF_CTX_free(kctx); in main()
H A Dscrypt.c64 EVP_KDF_CTX *kctx = NULL; in main() local
83 kctx = EVP_KDF_CTX_new(kdf); in main()
84 if (kctx == NULL) { in main()
104 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
118 EVP_KDF_CTX_free(kctx); in main()
H A Dargon2.c79 EVP_KDF_CTX *kctx = NULL; in main() local
99 kctx = EVP_KDF_CTX_new(kdf); in main()
100 if (kctx == NULL) { in main()
138 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
152 EVP_KDF_CTX_free(kctx); in main()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-SS.pod95 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf);
106 EVP_KDF_CTX *kctx;
111 kctx = EVP_KDF_CTX_new(kdf);
121 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
125 EVP_KDF_CTX_free(kctx);
131 EVP_KDF_CTX *kctx;
136 kctx = EVP_KDF_CTX_new(kdf);
150 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
154 EVP_KDF_CTX_free(kctx);
160 EVP_KDF_CTX *kctx;
[all …]
H A DEVP_KDF-KB.pod109 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf);
123 EVP_KDF_CTX *kctx;
128 kctx = EVP_KDF_CTX_new(kdf);
142 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0)
145 EVP_KDF_CTX_free(kctx);
151 EVP_KDF_CTX *kctx;
157 kctx = EVP_KDF_CTX_new(kdf);
172 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0)
175 EVP_KDF_CTX_free(kctx);
H A DEVP_KDF-X942-ASN1.pod109 EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf);
119 EVP_KDF_CTX *kctx;
120 EVP_KDF_CTX *kctx;
129 if (kctx == NULL)
131 kctx = EVP_KDF_CTX_new(kdf);
133 if (kctx == NULL)
142 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0)
145 EVP_KDF_CTX_free(kctx);
H A Dprovider-kdf.pod22 void OSSL_FUNC_kdf_freectx(void *kctx);
26 int OSSL_FUNC_kdf_reset(void *kctx);
27 int OSSL_FUNC_kdf_derive(void *kctx, unsigned char *key, size_t keylen,
37 int OSSL_FUNC_kdf_get_ctx_params(void *kctx, OSSL_PARAM params[]);
38 int OSSL_FUNC_kdf_set_ctx_params(void *kctx, const OSSL_PARAM params[]);
99 the I<kctx> parameter.
100 If it receives NULL as I<kctx> value, it should not do anything other than
105 I<kctx> parameter and return the duplicate copy.
110 side KDF context in the I<kctx> parameter.
114 The I<kctx> parameter contains a pointer to the provider side context.
[all …]
/freebsd/crypto/krb5/src/tests/gssapi/
H A Dt_enctypes.c81 krb5_context kctx = NULL; in main() local
97 ret = krb5_init_context(&kctx); in main()
98 check_k5err(kctx, "krb5_init_context", ret); in main()
104 ret = krb5int_parse_enctype_list(kctx, "", optarg, &zero, &ienc); in main()
105 check_k5err(kctx, "krb5_parse_enctype_list(initiator)", ret); in main()
108 ret = krb5int_parse_enctype_list(kctx, "", optarg, &zero, &aenc); in main()
109 check_k5err(kctx, "krb5_parse_enctype_list(acceptor)", ret); in main()
194 krb5_free_context(kctx); in main()
/freebsd/crypto/krb5/src/lib/krad/
H A Dt_remote.c60 remote_new(krb5_context kctx, krad_remote **remote) in remote_new() argument
69 noerror(kr_remote_new(kctx, vctx, ai, "foo", remote)); in remote_new()
108 krb5_context kctx = NULL; in main() local
117 noerror(krb5_init_context(&kctx)); in main()
120 remote_new(kctx, &rr); in main()
123 noerror(krad_attrset_new(kctx, &set)); in main()
166 krb5_free_context(kctx); in main()
H A Dt_client.c62 krb5_context kctx; in main() local
70 noerror(krb5_init_context(&kctx)); in main()
73 noerror(krad_client_new(kctx, vctx, &rc)); in main()
76 noerror(krad_attrset_new(kctx, &attrs)); in main()
120 krb5_free_context(kctx); in main()
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_kdf.c35 EVP_KDF_CTX *kctx = NULL; in ossl_dh_kdf_X9_42_asn1() local
43 kctx = EVP_KDF_CTX_new(kdf); in ossl_dh_kdf_X9_42_asn1()
44 if (kctx == NULL) in ossl_dh_kdf_X9_42_asn1()
57 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_dh_kdf_X9_42_asn1()
59 EVP_KDF_CTX_free(kctx); in ossl_dh_kdf_X9_42_asn1()
/freebsd/crypto/openssl/crypto/evp/
H A Dpbe_scrypt.c46 EVP_KDF_CTX *kctx; in EVP_PBE_scrypt_ex() local
68 kctx = EVP_KDF_CTX_new(kdf); in EVP_PBE_scrypt_ex()
70 if (kctx == NULL) in EVP_PBE_scrypt_ex()
83 if (EVP_KDF_derive(kctx, key, keylen, params) != 1) in EVP_PBE_scrypt_ex()
86 EVP_KDF_CTX_free(kctx); in EVP_PBE_scrypt_ex()
H A Dp5_crpt.c40 EVP_KDF_CTX *kctx = NULL; in PKCS5_PBE_keyivgen_ex() local
85 kctx = EVP_KDF_CTX_new(kdf); in PKCS5_PBE_keyivgen_ex()
87 if (kctx == NULL) in PKCS5_PBE_keyivgen_ex()
97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex()
108 EVP_KDF_CTX_free(kctx); in PKCS5_PBE_keyivgen_ex()
/freebsd/crypto/openssl/crypto/ec/
H A Decdh_kdf.c31 EVP_KDF_CTX *kctx = NULL; in ossl_ecdh_kdf_X9_63() local
36 if ((kctx = EVP_KDF_CTX_new(kdf)) != NULL) { in ossl_ecdh_kdf_X9_63()
45 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_ecdh_kdf_X9_63()
46 EVP_KDF_CTX_free(kctx); in ossl_ecdh_kdf_X9_63()
/freebsd/sys/contrib/openzfs/module/icp/core/
H A Dkcf_sched.c114 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_constructor() local
116 kctx->kc_refcnt = 0; in kcf_context_cache_constructor()
125 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_destructor() local
127 ASSERT0(kctx->kc_refcnt); in kcf_context_cache_destructor()
/freebsd/crypto/openssl/include/internal/
H A Dhpke_util.h71 int ossl_hpke_kdf_extract(EVP_KDF_CTX *kctx,
76 int ossl_hpke_kdf_expand(EVP_KDF_CTX *kctx,
81 int ossl_hpke_labeled_extract(EVP_KDF_CTX *kctx,
88 int ossl_hpke_labeled_expand(EVP_KDF_CTX *kctx,
/freebsd/crypto/krb5/src/kadmin/server/
H A Dkadm_rpc_svc.c284 krb5_context kctx; in check_rpcsec_auth() local
312 kctx = handle->context; in check_rpcsec_auth()
313 ret = gss_to_krb5_name_1(rqstp, kctx, name, &princ, &gss_str); in check_rpcsec_auth()
324 if (krb5_princ_size(kctx, princ) != 2) in check_rpcsec_auth()
327 c1 = krb5_princ_component(kctx, princ, 0); in check_rpcsec_auth()
328 c2 = krb5_princ_component(kctx, princ, 1); in check_rpcsec_auth()
329 realm = krb5_princ_realm(kctx, princ); in check_rpcsec_auth()
339 krb5_free_principal(kctx, princ); in check_rpcsec_auth()
/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dkrb5_gss_glue.c157 void **kctx) in gss_krb5_export_lucid_sec_context() argument
164 if (kctx == NULL) in gss_krb5_export_lucid_sec_context()
167 *kctx = NULL; in gss_krb5_export_lucid_sec_context()
194 *kctx = *((void **)data_set->elements[0].value); in gss_krb5_export_lucid_sec_context()
261 gss_krb5_free_lucid_sec_context(OM_uint32 *minor_status, void *kctx) in gss_krb5_free_lucid_sec_context() argument
269 req_buffer.length = sizeof(kctx); in gss_krb5_free_lucid_sec_context()
270 req_buffer.value = kctx; in gss_krb5_free_lucid_sec_context()
H A Dlucid_context.c132 void *kctx; in gss_krb5int_free_lucid_sec_context() local
138 kctx = value->value; in gss_krb5int_free_lucid_sec_context()
139 if (!kctx) { in gss_krb5int_free_lucid_sec_context()
145 version = ((gss_krb5_lucid_context_version_t *)kctx)->version; in gss_krb5int_free_lucid_sec_context()
148 free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx); in gss_krb5int_free_lucid_sec_context()

123