Searched refs:nonce (Results 1 - 25 of 73) sorted by relevance

123

/freebsd-10-stable/crypto/openssl/crypto/modes/
H A Dccm128.c69 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c));
70 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3;
78 /* Then you setup per-message nonce and pass the length of the message */
80 const unsigned char *nonce, size_t nlen, size_t mlen)
82 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */
85 return -1; /* nonce is too short */
88 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8)));
89 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8)));
90 ctx->nonce
79 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) argument
[all...]
/freebsd-10-stable/crypto/openssl/crypto/ts/
H A Dts_req_print.c73 const ASN1_INTEGER *nonce; local
91 nonce = TS_REQ_get_nonce(a);
92 if (nonce == NULL)
95 TS_ASN1_INTEGER_print_bio(bio, nonce);
H A Dts_verify_ctx.c105 ASN1_INTEGER_free(ctx->nonce);
119 const ASN1_INTEGER *nonce; local
148 /* Setting nonce. */
149 if ((nonce = TS_REQ_get_nonce(req)) != NULL) {
150 if (!(ret->nonce = ASN1_INTEGER_dup(nonce)))
H A Dts_req_utils.c149 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) argument
153 if (a->nonce == nonce)
155 new_nonce = ASN1_INTEGER_dup(nonce);
160 ASN1_INTEGER_free(a->nonce);
161 a->nonce = new_nonce;
167 return a->nonce;
H A Dts_rsp_utils.c303 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce) argument
307 if (a->nonce == nonce)
309 new_nonce = ASN1_INTEGER_dup(nonce);
314 ASN1_INTEGER_free(a->nonce);
315 a->nonce = new_nonce;
321 return a->nonce;
H A Dts_rsp_print.c184 const ASN1_INTEGER *nonce; local
230 /* Print nonce. */
232 nonce = TS_TST_INFO_get_nonce(a);
233 if (nonce == NULL)
236 TS_ASN1_INTEGER_print_bio(bio, nonce);
/freebsd-10-stable/contrib/libarchive/libarchive/
H A Darchive_cryptor.c171 memset(ctx->nonce, 0, sizeof(ctx->nonce));
187 r = CCCryptorUpdate(ref, ctx->nonce, AES_BLOCK_SIZE, ctx->encr_buf,
196 memset(ctx->nonce, 0, sizeof(ctx->nonce));
279 status = BCryptEncrypt(ctx->hKey, (PUCHAR)ctx->nonce, AES_BLOCK_SIZE,
309 memset(ctx->nonce, 0, sizeof(ctx->nonce));
320 if (mbedtls_aes_crypt_ecb(&ctx->ctx, MBEDTLS_AES_ENCRYPT, ctx->nonce,
341 memset(ctx->nonce,
487 uint8_t *const nonce = ctx->nonce; local
[all...]
H A Darchive_cryptor_private.h60 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon5
80 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon6
97 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon7
121 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon8
136 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon9
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Daes-ctr.c19 * @nonce: Nonce for counter mode (16 bytes)
24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
H A Daes_wrap.h29 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
32 const u8 *nonce, size_t nonce_len,
36 const u8 *nonce, size_t nonce_len,
56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
H A Daes-ccm.c28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, argument
40 os_memcpy(&b[1], nonce, 15 - L);
84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) argument
88 os_memcpy(&a[1], nonce, 15 - L);
148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, argument
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x);
167 aes_ccm_encr_start(L, nonce, a);
178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, argument
195 aes_ccm_encr_start(L, nonce, a);
201 aes_ccm_auth_start(aes, M, L, nonce, aa
[all...]
H A Daes-eax.c19 * @nonce: Nonce for counter mode
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
117 os_memcpy(buf + 16, nonce, nonce_len);
/freebsd-10-stable/crypto/openssh/
H A Dumac.h68 int umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
79 u_char nonce[8]);
122 int umac128_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
H A Dmac.c179 u_char nonce[8]; local
195 POKE_U64(nonce, seqno);
197 umac_final(mac->umac_ctx, u.m, nonce);
200 put_u64(nonce, seqno);
202 umac128_final(mac->umac_ctx, u.m, nonce);
/freebsd-10-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c121 /* If we can, make the nonce with random bytes. If we can't... well,
125 static apr_status_t make_nonce(apr_uint64_t *nonce)
128 return apr_generate_random_bytes((unsigned char *) nonce, sizeof(*nonce));
130 *nonce = apr_time_now();
140 apr_uint64_t nonce;
150 status = make_nonce(&nonce);
157 nonce, apr_time_now(), hostbuf);
124 make_nonce(apr_uint64_t *nonce) argument
139 apr_uint64_t nonce; local
/freebsd-10-stable/contrib/wpa/src/eap_peer/
H A Deap_psk.c183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
257 os_memset(nonce, 0, 12);
258 os_memcpy(nonce + 12, pchannel, 4);
268 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
269 nonce, sizeof(nonce));
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
326 /* nonce++ */
327 inc_byte_array(nonce, sizeo
[all...]
/freebsd-10-stable/contrib/wpa/src/ap/
H A Dwpa_auth_ie.h25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
H A Dpeerkey_auth.c174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN,
236 kde->nonce, WPA_NONCE_LEN);
249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0);
270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce */
304 os_memcpy(pos, kde.nonce, WPA_NONCE_LEN);
/freebsd-10-stable/contrib/serf/auth/
H A Dauth_digest.c37 /* nonce-count for digest authentication */
46 const char *nonce; member in struct:digest_authn_info_t
176 " nonce=\"%s\","
179 digest_info->nonce,
193 MD5 hash of the combined HA1 result, server nonce (nonce),
194 request counter (nc), client nonce (cnonce),
197 digest_info->ha1, digest_info->nonce,
202 MD5 hash of the combined HA1 result, server nonce (nonce)
242 const char *nonce = NULL; local
[all...]
/freebsd-10-stable/crypto/openssl/crypto/x509v3/
H A Dv3_ocsp.c73 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce,
75 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce,
84 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
214 * OCSP nonce. This is needs special treatment because it doesn't have an
262 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, argument
267 if (i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0)
/freebsd-10-stable/contrib/tcpdump/
H A Dprint-babel.c241 u_short nonce, interval; local
247 nonce = EXTRACT_16BITS(message + 4);
249 printf("%04x %d", nonce, interval);
255 u_short nonce; local
261 nonce = EXTRACT_16BITS(message + 2);
262 printf("%04x", nonce);
/freebsd-10-stable/contrib/wpa/src/eap_server/
H A Deap_server_psk.c96 u8 *buf, *pchannel, nonce[16]; local
135 os_memset(nonce, 0, sizeof(nonce));
137 os_memcpy(pchannel, nonce + 12, 4);
142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
336 u8 *decrypted, nonce[16]; local
368 os_memset(nonce, 0, 12);
369 os_memcpy(nonce + 12, pos, 4);
381 if (aes_128_eax_decrypt(data->tek, nonce, sizeo
[all...]
/freebsd-10-stable/contrib/wpa/src/eap_common/
H A Deap_tlv_common.h76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
/freebsd-10-stable/contrib/wpa/src/rsn_supp/
H A Dwpa_ie.h27 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/freebsd-10-stable/crypto/heimdal/lib/krb5/
H A Dget_in_tkt.c154 unsigned nonce,
209 a->req_body.nonce = nonce;
390 unsigned nonce; variable
395 krb5_generate_random_block (&nonce, sizeof(nonce));
396 nonce &= 0xffffffff;
409 nonce,
511 nonce,
145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument

Completed in 101 milliseconds

123