/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_cred.c | 144 unsigned nonce, 200 t->req_body.nonce = nonce; 410 unsigned nonce; local 421 krb5_generate_random_block(&nonce, sizeof(nonce)); 422 nonce &= 0xffffffff; 492 nonce, 550 nonce, 137 init_tgs_req(krb5_context context, krb5_ccache ccache, krb5_addresses *addresses, krb5_kdc_flags flags, Ticket *second_ticket, krb5_creds *in_creds, krb5_creds *krbtgt, unsigned nonce, const METHOD_DATA *padata, krb5_keyblock **subkey, TGS_REQ *t, krb5_key_usage usage) argument
|
H A D | init_creds_pw.c | 45 unsigned nonce; member in struct:krb5_get_init_creds_ctx 606 a->req_body.nonce = 0; 1246 /* Set a new nonce. */ 1247 krb5_generate_random_block (&ctx->nonce, sizeof(ctx->nonce)); 1248 ctx->nonce &= 0xffffffff; 1250 ctx->pk_nonce = ctx->nonce; 1269 /* Set a new nonce. */ 1270 ctx->as_req.req_body.nonce = ctx->nonce; [all...] |
H A D | digest.c | 156 return digest->initReply.nonce; 162 const char *nonce) 165 krb5_set_error_string(context, "nonce already set"); 168 digest->request.serverNonce = strdup(nonce); 458 const char *nonce) 470 *digest->request.clientNonce = strdup(nonce); 160 krb5_digest_set_server_nonce(krb5_context context, krb5_digest digest, const char *nonce) argument 456 krb5_digest_set_client_nonce(krb5_context context, krb5_digest digest, const char *nonce) argument
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.h | 58 u8 nonce[16]; member in struct:ft_r0kh_r1kh_pull_frame 72 u8 nonce[16]; /* copied from pull */ member in struct:ft_r0kh_r1kh_resp_frame
|
H A D | wpa_auth_i.h | 195 const u8 *key_rsc, const u8 *nonce,
|
H A D | wpa_auth.c | 1033 const u8 *key_rsc, const u8 *nonce, 1128 if (nonce) 1129 os_memcpy(key->key_nonce, nonce, WPA_NONCE_LEN); 1197 const u8 *key_rsc, const u8 *nonce, 1208 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len, 1031 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1195 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
|
H A D | wpa_auth_ie.c | 775 ie->nonce = pos + 2 + RSN_SELECTOR_LEN;
|
/freebsd-9.3-release/contrib/bind9/bin/rndc/ |
H A D | rndc.c | 290 isc_uint32_t nonce; local 321 nonce = 0; 322 if (isccc_cc_lookupuint32(_ctrl, "_nonce", &nonce) != ISC_R_SUCCESS) 323 nonce = 0; 334 if (nonce != 0) { 338 if (isccc_cc_defineuint32(_ctrl, "_nonce", nonce) == NULL)
|
/freebsd-9.3-release/sbin/ping6/ |
H A D | ping6.c | 151 /* FQDN case, 64 bits of nonce + 32 bits ttl */ 222 u_int8_t nonce[8]; /* nonce field for node information */ variable 741 memset(nonce, 0, sizeof(nonce)); 742 for (i = 0; i < sizeof(nonce); i += sizeof(int)) 743 *((int *)&nonce[i]) = rand(); 745 memset(nonce, 0, sizeof(nonce)); 746 for (i = 0; i < sizeof(nonce); [all...] |
/freebsd-9.3-release/contrib/ntp/ntpq/ |
H A D | ntpq-subs.c | 2342 char * nonce, 2346 const char nonce_eq[] = "nonce="; 2354 * Retrieve a nonce specific to this client to demonstrate to 2361 fprintf(stderr, "nonce request failed\n"); 2367 fprintf(stderr, "unexpected nonce response format: %.*s\n", 2374 memcpy(nonce, rdata + sizeof(nonce_eq) - 1, chars); 2375 nonce[chars] = '\0'; 2377 ('\r' == nonce[chars - 1] || '\n' == nonce[chars - 1])) { 2379 nonce[char 2341 fetch_nonce( char * nonce, size_t cb_nonce ) argument 2475 char nonce[128]; local [all...] |
/freebsd-9.3-release/lib/libfetch/ |
H A D | http.c | 632 char *nonce; member in struct:__anon5216 643 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 654 if (b->nonce) 655 free(b->nonce); 815 else if (!strcasecmp(key, "nonce")) 816 cs->challenges[cs->count]->nonce = 1175 IN char * pszNonce, /* nonce from server */ 1177 IN char * pszCNonce, /* client nonce */ 1229 * digest-response = 1#( username | realm | nonce | digest-uri 1232 * [nonce [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_fast.c | 588 _bind->nonce, sizeof(_bind->nonce)); 618 os_memcpy(rbind->nonce, _bind->nonce, sizeof(_bind->nonce)); 619 inc_byte_array(rbind->nonce, sizeof(rbind->nonce)); 627 rbind->nonce, sizeof(rbind->nonce));
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | tkey.c | 936 dns_name_t *algorithm, isc_buffer_t *nonce, 965 if (nonce != NULL) 966 isc_buffer_usedregion(nonce, &r); 979 if (nonce == NULL) 1119 dst_key_t *key, isc_buffer_t *nonce, 1214 if (nonce != NULL) 1215 isc_buffer_usedregion(nonce, &r2); 1221 if (nonce == NULL) 935 dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, isc_uint32_t lifetime) argument 1118 dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, dst_key_t *key, isc_buffer_t *nonce, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 384 payloads->nonce = pdata; 440 const u8 *nonce, size_t nonce_len, 451 shared_secret == NULL || nonce == NULL || prf == NULL) 476 os_memcpy(pos, nonce, nonce_len); 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa_i.h | 246 int ver, const u8 *nonce,
|
H A D | peerkey.c | 458 if (os_memcmp(kde->nonce, peerkey->inonce, WPA_NONCE_LEN) != 0) { 502 os_memcpy(peerkey->pnonce, kde->nonce, WPA_NONCE_LEN); 547 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN ||
|
H A D | wpa_ie.c | 463 ie->nonce = pos + 2 + RSN_SELECTOR_LEN;
|
H A D | wpa.c | 250 * @nonce: Nonce value for the EAPOL-Key frame 258 int ver, const u8 *nonce, 329 os_memcpy(reply->key_nonce, nonce, WPA_NONCE_LEN); 256 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | hxtool.c | 919 heim_octet_string req, nonce_data, *nonce = &nonce_data; local 925 memset(&nonce, 0, sizeof(nonce)); 930 /* no nonce */ 932 nonce = NULL; 951 ret = hx509_ocsp_request(context, reqcerts, pool, NULL, NULL, &req, nonce); 973 if (nonce) 974 der_free_octet_string(nonce);
|
H A D | revoke.c | 952 * @param nonce nonce in the request, free with free_heim_octet_string(). 966 heim_octet_string *nonce) 989 if (nonce) { 1025 ret = der_copy_octet_string(nonce, &es->val[0].extnValue); 960 hx509_ocsp_request(hx509_context context, hx509_certs reqcerts, hx509_certs pool, hx509_cert signer, const AlgorithmIdentifier *digest, heim_octet_string *request, heim_octet_string *nonce) argument
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | digest.c | 387 hex_encode(server_nonce, sizeof(server_nonce), &r.u.initReply.nonce); 388 if (r.u.initReply.nonce == NULL) { 389 krb5_set_error_string(context, "Failed to decode server nonce"); 409 asprintf(&s, "%s-%s:%s", r.u.initReply.nonce, 418 free(r.u.initReply.nonce); 419 r.u.initReply.nonce = s; 422 ret = krb5_store_stringz(sp, r.u.initReply.nonce); 562 * CHAP does the checksum of the raw nonce, but do it for all 596 krb5_set_error_string(context, "server nonce too short"); 603 krb5_set_error_string(context, "time screw in server nonce "); [all...] |
H A D | kerberos5.c | 1586 ek.nonce = b->nonce;
|
H A D | krb5tgs.c | 848 ek.nonce = b->nonce;
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | key.c | 1427 (v00 && buffer_get_string_ptr_ret(b, NULL) == NULL) || /* nonce */ 1560 (void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */ 1578 (void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */ 1596 (void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */ 1632 (void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */ 1978 u_char *ca_blob, *sig_blob, nonce[32]; local 2003 /* -v01 certs put nonce first */ 2004 arc4random_buf(&nonce, sizeof(nonce)); 2006 buffer_put_string(&k->cert->certblob, nonce, sizeo [all...] |
/freebsd-9.3-release/sys/mips/rmi/dev/sec/ |
H A D | rmilib.h | 575 unsigned int nonce; member in struct:xlr_sec_io_s
|