/freebsd-10-stable/crypto/openssl/crypto/modes/ |
H A D | ccm128.c | 69 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); 70 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; 78 /* Then you setup per-message nonce and pass the length of the message */ 80 const unsigned char *nonce, size_t nlen, size_t mlen) 82 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ 85 return -1; /* nonce is too short */ 88 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); 89 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); 90 ctx->nonce 79 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) argument [all...] |
/freebsd-10-stable/crypto/openssl/crypto/ts/ |
H A D | ts_req_print.c | 73 const ASN1_INTEGER *nonce; local 91 nonce = TS_REQ_get_nonce(a); 92 if (nonce == NULL) 95 TS_ASN1_INTEGER_print_bio(bio, nonce);
|
H A D | ts_verify_ctx.c | 105 ASN1_INTEGER_free(ctx->nonce); 119 const ASN1_INTEGER *nonce; local 148 /* Setting nonce. */ 149 if ((nonce = TS_REQ_get_nonce(req)) != NULL) { 150 if (!(ret->nonce = ASN1_INTEGER_dup(nonce)))
|
H A D | ts_req_utils.c | 149 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) argument 153 if (a->nonce == nonce) 155 new_nonce = ASN1_INTEGER_dup(nonce); 160 ASN1_INTEGER_free(a->nonce); 161 a->nonce = new_nonce; 167 return a->nonce;
|
H A D | ts_rsp_utils.c | 303 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce) argument 307 if (a->nonce == nonce) 309 new_nonce = ASN1_INTEGER_dup(nonce); 314 ASN1_INTEGER_free(a->nonce); 315 a->nonce = new_nonce; 321 return a->nonce;
|
H A D | ts_rsp_print.c | 184 const ASN1_INTEGER *nonce; local 230 /* Print nonce. */ 232 nonce = TS_TST_INFO_get_nonce(a); 233 if (nonce == NULL) 236 TS_ASN1_INTEGER_print_bio(bio, nonce);
|
/freebsd-10-stable/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 171 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 187 r = CCCryptorUpdate(ref, ctx->nonce, AES_BLOCK_SIZE, ctx->encr_buf, 196 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 279 status = BCryptEncrypt(ctx->hKey, (PUCHAR)ctx->nonce, AES_BLOCK_SIZE, 309 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 320 if (mbedtls_aes_crypt_ecb(&ctx->ctx, MBEDTLS_AES_ENCRYPT, ctx->nonce, 341 memset(ctx->nonce, 487 uint8_t *const nonce = ctx->nonce; local [all...] |
H A D | archive_cryptor_private.h | 60 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon5 80 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon6 97 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon7 121 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon8 136 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon9
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes_wrap.h | 29 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 32 const u8 *nonce, size_t nonce_len, 36 const u8 *nonce, size_t nonce_len, 56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
H A D | aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, argument 40 os_memcpy(&b[1], nonce, 15 - L); 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) argument 88 os_memcpy(&a[1], nonce, 15 - L); 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, argument 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 167 aes_ccm_encr_start(L, nonce, a); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, argument 195 aes_ccm_encr_start(L, nonce, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aa [all...] |
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | umac.h | 68 int umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]); 79 u_char nonce[8]); 122 int umac128_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
|
H A D | mac.c | 179 u_char nonce[8]; local 195 POKE_U64(nonce, seqno); 197 umac_final(mac->umac_ctx, u.m, nonce); 200 put_u64(nonce, seqno); 202 umac128_final(mac->umac_ctx, u.m, nonce);
|
/freebsd-10-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 121 /* If we can, make the nonce with random bytes. If we can't... well, 125 static apr_status_t make_nonce(apr_uint64_t *nonce) 128 return apr_generate_random_bytes((unsigned char *) nonce, sizeof(*nonce)); 130 *nonce = apr_time_now(); 140 apr_uint64_t nonce; 150 status = make_nonce(&nonce); 157 nonce, apr_time_now(), hostbuf); 124 make_nonce(apr_uint64_t *nonce) argument 139 apr_uint64_t nonce; local
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 257 os_memset(nonce, 0, 12); 258 os_memcpy(nonce + 12, pchannel, 4); 268 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 269 nonce, sizeof(nonce)); 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 326 /* nonce++ */ 327 inc_byte_array(nonce, sizeo [all...] |
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey_auth.c | 174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN, 236 kde->nonce, WPA_NONCE_LEN); 249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0); 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce */ 304 os_memcpy(pos, kde.nonce, WPA_NONCE_LEN);
|
/freebsd-10-stable/contrib/serf/auth/ |
H A D | auth_digest.c | 37 /* nonce-count for digest authentication */ 46 const char *nonce; member in struct:digest_authn_info_t 176 " nonce=\"%s\"," 179 digest_info->nonce, 193 MD5 hash of the combined HA1 result, server nonce (nonce), 194 request counter (nc), client nonce (cnonce), 197 digest_info->ha1, digest_info->nonce, 202 MD5 hash of the combined HA1 result, server nonce (nonce) 242 const char *nonce = NULL; local [all...] |
/freebsd-10-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_ocsp.c | 73 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce, 75 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce, 84 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, 214 * OCSP nonce. This is needs special treatment because it doesn't have an 262 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, argument 267 if (i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0)
|
/freebsd-10-stable/contrib/tcpdump/ |
H A D | print-babel.c | 241 u_short nonce, interval; local 247 nonce = EXTRACT_16BITS(message + 4); 249 printf("%04x %d", nonce, interval); 255 u_short nonce; local 261 nonce = EXTRACT_16BITS(message + 2); 262 printf("%04x", nonce);
|
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 96 u8 *buf, *pchannel, nonce[16]; local 135 os_memset(nonce, 0, sizeof(nonce)); 137 os_memcpy(pchannel, nonce + 12, 4); 142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 336 u8 *decrypted, nonce[16]; local 368 os_memset(nonce, 0, 12); 369 os_memcpy(nonce + 12, pos, 4); 381 if (aes_128_eax_decrypt(data->tek, nonce, sizeo [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_tlv_common.h | 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
/freebsd-10-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ie.h | 27 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | get_in_tkt.c | 154 unsigned nonce, 209 a->req_body.nonce = nonce; 390 unsigned nonce; variable 395 krb5_generate_random_block (&nonce, sizeof(nonce)); 396 nonce &= 0xffffffff; 409 nonce, 511 nonce, 145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
|