/freebsd-10.3-release/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 595 /* Likewise, generate master_key here since we have the needed data 599 get_master_key(password_hash_hash, cp->nt_response, data->master_key); 839 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 840 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_tls_common.c | 316 keys.master_key == NULL) 326 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|
/freebsd-10.3-release/crypto/heimdal/kdc/ |
H A D | set_dbinfo.c | 40 const char *conf, const char *master_key) 58 if (master_key) { 59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key); 39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
|
/freebsd-10.3-release/sys/geom/ |
H A D | geom_aes.c | 80 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc 106 rijndael_makeKey(ki, dir, 128, sc->master_key); 113 u %= sizeof sc->master_key; 114 p = sc->master_key + u; 115 if (u + 16 <= sizeof(sc->master_key)) { 118 u1 = sizeof sc->master_key - u; 120 MD5Update(&cx, sc->master_key, 16 - u1); 326 p = sc->master_key; 327 for (i = 0; i < (int)sizeof sc->master_key; i ++) 335 p = sc->master_key; [all...] |
/freebsd-10.3-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 40 u8 *master_key); 41 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 322 * @master_key: 16-octet MasterKey (OUT) 326 u8 *master_key) 343 os_memcpy(master_key, hash, 16); 350 * @master_key: 16-octet MasterKey (IN) 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 400 addr[0] = master_key; 325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
H A D | tls.h | 15 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
|
/freebsd-10.3-release/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 97 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 191 a.master_key.length = in->master_key_length; 192 a.master_key.type = V_ASN1_OCTET_STRING; 193 a.master_key.data = in->master_key; 278 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 331 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 466 memcpy(ret->master_key, os.data, ret->master_key_length);
|
H A D | s2_lib.c | 484 s->session->master_key_length > (int)sizeof(s->session->master_key)) { 505 <= (int)sizeof(s->session->master_key)); 506 EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | ssl_txt.c | 165 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
H A D | tls_srp.c | 337 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key) argument 358 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp, 371 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key) argument 405 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
|
H A D | t1_enc.c | 304 NULL, 0, NULL, 0, s->session->master_key, 307 fprintf(stderr, "tls1_generate_key_block() ==> %d byte master_key =\n\t", 312 fprintf(stderr, "%02X", s->session->master_key[i]); 680 printf("%02X%c", s->session->master_key[z], 975 s->session->master_key, s->session->master_key_length, 1151 so, sol, p, len, s->session->master_key, buff, sizeof buff); 1161 BIO_dump_fp(stderr, (char *)s->session->master_key, 1245 s->session->master_key, s->session->master_key_length,
|
H A D | s2_clnt.c | 639 if (i > (int)sizeof(sess->master_key)) { 644 if (RAND_bytes(sess->master_key, i) <= 0) { 664 memcpy(d, sess->master_key, (unsigned int)clear); 668 &(sess->master_key[clear]), d, 681 sess->master_key[clear]++;
|
H A D | s3_enc.c | 191 EVP_DigestUpdate(&s1, s->session->master_key, 198 EVP_DigestUpdate(&m5, s->session->master_key, 684 || EVP_DigestUpdate(&ctx, s->session->master_key, 690 || EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | d1_clnt.c | 1068 session->master_key, 1193 session->master_key, 1248 session->master_key, 1383 session->master_key, 1497 session->master_key,
|
H A D | s3_srvr.c | 1300 s->session->master_key_length = sizeof(s->session->master_key); 1301 if (s->tls_session_secret_cb(s, s->session->master_key, 2350 session->master_key, 2408 session->master_key, 2578 session->master_key, 2729 session->master_key, 2814 session->master_key, 2857 s->session->master_key)) < 0) { 2924 session->master_key,
|
H A D | s3_clnt.c | 918 s->session->master_key_length = sizeof(s->session->master_key); 919 if (s->tls_session_secret_cb(s, s->session->master_key, 2449 session->master_key, 2577 session->master_key, 2634 session->master_key, 2775 session->master_key, 2948 session->master_key, 2978 s->session->master_key)) < 3060 session->master_key,
|
H A D | ssl_sess.c | 892 OPENSSL_cleanse(ss->master_key, sizeof ss->master_key);
|
H A D | ssl.h | 482 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st 773 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key); 775 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key);
|
/freebsd-10.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 416 get_master_key(pw_hash_hash, nt_response, data->master_key); 419 data->master_key, MSCHAPV2_KEY_LEN); 532 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 533 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_server_tls_common.c | 93 keys.master_key == NULL) 103 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|
/freebsd-10.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.c | 129 "expansion", keys.master_key, keys.master_key_len); 130 if (tls_prf_sha1_md5(keys.master_key, keys.master_key_len,
|
/freebsd-10.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_server.c | 548 keys->master_key = conn->master_secret;
|