| /src/sbin/decryptcore/ |
| H A D | decryptcore.c | 81 struct kerneldumpkey *kdk; in read_key() local 87 kdksize = sizeof(*kdk); in read_key() 88 kdk = calloc(1, kdksize); in read_key() 89 if (kdk == NULL) { in read_key() 94 size = read(kfd, kdk, kdksize); in read_key() 96 kdk->kdk_encryptedkeysize = dtoh32(kdk->kdk_encryptedkeysize); in read_key() 97 kdksize += (size_t)kdk->kdk_encryptedkeysize; in read_key() 98 kdk = realloc(kdk, kdksize); in read_key() 99 if (kdk == NULL) { in read_key() 103 size += read(kfd, &kdk->kdk_encryptedkey, in read_key() [all …]
|
| /src/contrib/wpa/src/eap_common/ |
| H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 24 os_memcpy(kdk, ak, aes_block_size); in eap_psk_key_setup() 26 kdk[aes_block_size - 1] ^= 0x02; in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup() 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys() 45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys() 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys() 60 if (aes_128_encrypt_block(kdk, hash, in eap_psk_derive_keys()
|
| H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk); 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
| /src/contrib/wpa/src/common/ |
| H A D | common_module_tests.c | 641 const u8 kdk[] = { in pasn_test_pasn_auth() local 671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth() 672 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_pasn_auth() 720 const u8 kdk[] = { in pasn_test_no_pasn_auth() local 756 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_no_pasn_auth() 757 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_no_pasn_auth()
|
| H A D | wpa_common.c | 577 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk() 579 wpa_hexdump_key(MSG_DEBUG, "WPA: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_to_ptk() 787 os_memcpy(ptk->kdk, tmp + offset, ptk->kdk_len); in fils_pmk_to_ptk() 788 wpa_hexdump_key(MSG_DEBUG, "FILS: KDK", ptk->kdk, ptk->kdk_len); in fils_pmk_to_ptk() 1546 os_memcpy(ptk->kdk, tmp + WPA_PASN_KCK_LEN + ptk->tk_len, in pasn_pmk_to_ptk() 1549 ptk->kdk, ptk->kdk_len); in pasn_pmk_to_ptk() 1584 const u8 *kdk = ptk->kdk; in wpa_ltf_keyseed() local 1588 if (!kdk || !kdk_len) { in wpa_ltf_keyseed() 1600 if (hmac_sha384(kdk, kdk_len, buf, buf_len, hash)) { in wpa_ltf_keyseed() 1613 if (hmac_sha256(kdk, kdk_len, buf, buf_len, hash)) { in wpa_ltf_keyseed() [all …]
|
| H A D | ptksa_cache.c | 208 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.kdk, in ptksa_cache_list()
|
| H A D | wpa_common.h | 262 u8 kdk[WPA_KDK_MAX_LEN]; /* Key Derivation Key */ member
|
| /src/contrib/wpa/src/pae/ |
| H A D | ieee802_1x_key.c | 34 static int aes_kdf(const u8 *kdk, size_t kdk_bits, in aes_kdf() argument 71 res = omac1_aes_128(kdk, buf, buf_len, ret); in aes_kdf() 73 res = omac1_aes_256(kdk, buf, buf_len, ret); in aes_kdf()
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_pk1.c | 280 const unsigned char *kdk, in ossl_rsa_prf() argument 320 if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) { in ossl_rsa_prf() 390 int num, unsigned char *kdk) in ossl_rsa_padding_check_PKCS1_type_2() argument 430 if (ossl_rsa_prf(ctx, synthetic, flen, "message", 7, kdk, flen * 8) < 0) in ossl_rsa_padding_check_PKCS1_type_2() 435 "length", 6, kdk, in ossl_rsa_padding_check_PKCS1_type_2()
|
| H A D | rsa_ossl.c | 431 unsigned char *buf, int num, unsigned char *kdk) in derive_kdk() argument 503 if (HMAC_Final(hmac, kdk, &md_len) <= 0) { in derive_kdk() 521 unsigned char kdk[SHA256_DIGEST_LENGTH] = { 0 }; in rsa_ossl_private_decrypt() local 655 if (derive_kdk(flen, from, rsa, buf, num, kdk) == 0) in rsa_ossl_private_decrypt() 668 r = ossl_rsa_padding_check_PKCS1_type_2(rsa->libctx, to, num, buf, j, num, kdk); in rsa_ossl_private_decrypt()
|
| /src/sys/kern/ |
| H A D | kern_shutdown.c | 1091 struct kerneldumpkey *kdk; in kerneldumpcrypto_create() local 1094 dumpkeysize = roundup2(sizeof(*kdk) + encryptedkeysize, blocksize); in kerneldumpcrypto_create() 1113 kdk = kdc->kdc_dumpkey; in kerneldumpcrypto_create() 1114 kdk->kdk_encryption = kdc->kdc_encryption; in kerneldumpcrypto_create() 1115 memcpy(kdk->kdk_iv, kdc->kdc_iv, sizeof(kdk->kdk_iv)); in kerneldumpcrypto_create() 1116 kdk->kdk_encryptedkeysize = htod32(encryptedkeysize); in kerneldumpcrypto_create() 1117 memcpy(kdk->kdk_encryptedkey, encryptedkey, encryptedkeysize); in kerneldumpcrypto_create() 1130 struct kerneldumpkey *kdk; in kerneldumpcrypto_init() local 1163 kdk = kdc->kdc_dumpkey; in kerneldumpcrypto_init() 1164 memcpy(kdk->kdk_iv, kdc->kdc_iv, sizeof(kdk->kdk_iv)); in kerneldumpcrypto_init()
|
| /src/contrib/wpa/src/eap_peer/ |
| H A D | eap_psk.c | 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { in eap_psk_init() 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_init() 248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
|
| /src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3() 284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { in eap_psk_process_2() 289 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_process_2()
|
| /src/contrib/wpa/src/wps/ |
| H A D | wps_common.c | 65 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; in wps_derive_keys() local 112 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk); in wps_derive_keys() 113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); in wps_derive_keys() 115 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation", in wps_derive_keys()
|
| /src/crypto/openssl/include/crypto/ |
| H A D | rsa.h | 95 int num, unsigned char *kdk);
|