Searched refs:master_key (Results 1 - 25 of 30) sorted by relevance

12

/freebsd-10.3-release/contrib/wpa/src/eap_peer/
H A Dmschapv2.h24 u8 *master_key);
H A Dmschapv2.c42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_mschapv2.c93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
210 data->auth_response, data->master_key)) {
595 /* Likewise, generate master_key here since we have the needed data
599 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
839 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
840 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_tls_common.c316 keys.master_key == NULL)
326 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
/freebsd-10.3-release/crypto/heimdal/kdc/
H A Dset_dbinfo.c40 const char *conf, const char *master_key)
58 if (master_key) {
59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key);
39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
/freebsd-10.3-release/sys/geom/
H A Dgeom_aes.c80 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc
106 rijndael_makeKey(ki, dir, 128, sc->master_key);
113 u %= sizeof sc->master_key;
114 p = sc->master_key + u;
115 if (u + 16 <= sizeof(sc->master_key)) {
118 u1 = sizeof sc->master_key - u;
120 MD5Update(&cx, sc->master_key, 16 - u1);
326 p = sc->master_key;
327 for (i = 0; i < (int)sizeof sc->master_key; i ++)
335 p = sc->master_key;
[all...]
/freebsd-10.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h40 u8 *master_key);
41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
H A Dms_funcs.c322 * @master_key: 16-octet MasterKey (OUT)
326 u8 *master_key)
343 os_memcpy(master_key, hash, 16);
350 * @master_key: 16-octet MasterKey (IN)
357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument
400 addr[0] = master_key;
325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
H A Dtls.h15 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
/freebsd-10.3-release/crypto/openssl/ssl/
H A Dssl_asn1.c97 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
191 a.master_key.length = in->master_key_length;
192 a.master_key.type = V_ASN1_OCTET_STRING;
193 a.master_key.data = in->master_key;
278 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
331 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
466 memcpy(ret->master_key, os.data, ret->master_key_length);
H A Ds2_lib.c484 s->session->master_key_length > (int)sizeof(s->session->master_key)) {
505 <= (int)sizeof(s->session->master_key));
506 EVP_DigestUpdate(&ctx, s->session->master_key,
H A Dssl_txt.c165 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
H A Dtls_srp.c337 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key) argument
358 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
371 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key) argument
405 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
H A Dt1_enc.c304 NULL, 0, NULL, 0, s->session->master_key,
307 fprintf(stderr, "tls1_generate_key_block() ==> %d byte master_key =\n\t",
312 fprintf(stderr, "%02X", s->session->master_key[i]);
680 printf("%02X%c", s->session->master_key[z],
975 s->session->master_key, s->session->master_key_length,
1151 so, sol, p, len, s->session->master_key, buff, sizeof buff);
1161 BIO_dump_fp(stderr, (char *)s->session->master_key,
1245 s->session->master_key, s->session->master_key_length,
H A Ds2_clnt.c639 if (i > (int)sizeof(sess->master_key)) {
644 if (RAND_bytes(sess->master_key, i) <= 0) {
664 memcpy(d, sess->master_key, (unsigned int)clear);
668 &(sess->master_key[clear]), d,
681 sess->master_key[clear]++;
H A Ds3_enc.c191 EVP_DigestUpdate(&s1, s->session->master_key,
198 EVP_DigestUpdate(&m5, s->session->master_key,
684 || EVP_DigestUpdate(&ctx, s->session->master_key,
690 || EVP_DigestUpdate(&ctx, s->session->master_key,
H A Dd1_clnt.c1068 session->master_key,
1193 session->master_key,
1248 session->master_key,
1383 session->master_key,
1497 session->master_key,
H A Ds3_srvr.c1300 s->session->master_key_length = sizeof(s->session->master_key);
1301 if (s->tls_session_secret_cb(s, s->session->master_key,
2350 session->master_key,
2408 session->master_key,
2578 session->master_key,
2729 session->master_key,
2814 session->master_key,
2857 s->session->master_key)) < 0) {
2924 session->master_key,
H A Ds3_clnt.c918 s->session->master_key_length = sizeof(s->session->master_key);
919 if (s->tls_session_secret_cb(s, s->session->master_key,
2449 session->master_key,
2577 session->master_key,
2634 session->master_key,
2775 session->master_key,
2948 session->master_key,
2978 s->session->master_key)) <
3060 session->master_key,
H A Dssl_sess.c892 OPENSSL_cleanse(ss->master_key, sizeof ss->master_key);
H A Dssl.h482 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
773 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key);
775 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key);
/freebsd-10.3-release/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c53 u8 master_key[16]; member in struct:eap_mschapv2_data
416 get_master_key(pw_hash_hash, nt_response, data->master_key);
419 data->master_key, MSCHAPV2_KEY_LEN);
532 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
533 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_server_tls_common.c93 keys.master_key == NULL)
103 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
/freebsd-10.3-release/contrib/wpa/src/eap_common/
H A Deap_fast_common.c129 "expansion", keys.master_key, keys.master_key_len);
130 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
/freebsd-10.3-release/contrib/wpa/src/tls/
H A Dtlsv1_server.c548 keys->master_key = conn->master_secret;

Completed in 304 milliseconds

12