Searched refs:master_key (Results 1 - 24 of 24) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dmschapv2.h24 u8 *master_key);
H A Dmschapv2.c42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_mschapv2.c93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
208 data->auth_response, data->master_key)) {
612 /* Likewise, generate master_key here since we have the needed data
617 data->master_key)) {
859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1,
861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_ttls.c53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data
546 data->master_key)) {
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dset_dbinfo.c40 const char *conf, const char *master_key)
58 if (master_key) {
59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key);
39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
/freebsd-11-stable/sys/geom/
H A Dgeom_aes.c81 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc
107 rijndael_makeKey(ki, dir, 128, sc->master_key);
114 u %= sizeof sc->master_key;
115 p = sc->master_key + u;
116 if (u + 16 <= sizeof(sc->master_key)) {
119 u1 = sizeof sc->master_key - u;
121 MD5Update(&cx, sc->master_key, 16 - u1);
327 p = sc->master_key;
328 for (i = 0; i < (int)sizeof sc->master_key; i ++)
336 p = sc->master_key;
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dms_funcs.h42 u8 *master_key);
43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
H A Dms_funcs.c322 * @master_key: 16-octet MasterKey (OUT)
326 u8 *master_key)
343 os_memcpy(master_key, hash, 16);
350 * @master_key: 16-octet MasterKey (IN)
357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument
400 addr[0] = master_key;
325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
H A Dtls_wolfssl.c2012 byte *master_key; local
2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random,
2037 tls_prf_sha256(master_key, master_key_len,
2042 ret = tls_prf_sha1_md5(master_key, master_key_len,
2047 forced_memzero(master_key, master_key_len);
H A Dtls_openssl.c107 os_memcpy(out, session->master_key, outlen);
4066 unsigned char master_key[64]; local
4102 master_key_len = SSL_SESSION_get_master_key(sess, master_key,
4103 sizeof(master_key));
4109 tls_prf_sha256(master_key, master_key_len,
4113 } else if (tls_prf_sha1_md5(master_key, master_key_len,
4118 forced_memzero(master_key, sizeof(master_key));
H A Dcrypto_module_tests.c2076 u8 master_key[] = { local
2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) {
2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key),
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_asn1.c97 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
191 a.master_key.length = in->master_key_length;
192 a.master_key.type = V_ASN1_OCTET_STRING;
193 a.master_key.data = in->master_key;
278 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
331 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
466 memcpy(ret->master_key, os.data, ret->master_key_length);
H A Ds2_lib.c481 s->session->master_key_length > (int)sizeof(s->session->master_key)) {
502 <= (int)sizeof(s->session->master_key));
503 EVP_DigestUpdate(&ctx, s->session->master_key,
H A Dssl_txt.c167 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
H A Dtls_srp.c337 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key) argument
358 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
371 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key) argument
405 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
H A Dt1_enc.c303 NULL, 0, NULL, 0, s->session->master_key,
306 fprintf(stderr, "tls1_generate_key_block() ==> %d byte master_key =\n\t",
311 fprintf(stderr, "%02X", s->session->master_key[i]);
697 printf("%02X%c", s->session->master_key[z],
992 s->session->master_key, s->session->master_key_length,
1168 so, sol, p, len, s->session->master_key, buff, sizeof(buff));
1178 BIO_dump_fp(stderr, (char *)s->session->master_key,
1193 s->session->master_key,
1278 s->session->master_key, s->session->master_key_length,
H A Ds2_clnt.c639 if (i > (int)sizeof(sess->master_key)) {
644 if (RAND_bytes(sess->master_key, i) <= 0) {
664 memcpy(d, sess->master_key, (unsigned int)clear);
668 &(sess->master_key[clear]), d,
681 sess->master_key[clear]++;
H A Ds3_enc.c189 !EVP_DigestUpdate(&s1, s->session->master_key,
197 !EVP_DigestUpdate(&m5, s->session->master_key,
731 || EVP_DigestUpdate(&ctx, s->session->master_key,
737 || EVP_DigestUpdate(&ctx, s->session->master_key,
H A Ds3_srvr.c1271 s->session->master_key_length = sizeof(s->session->master_key);
1272 if (s->tls_session_secret_cb(s, s->session->master_key,
2373 session->master_key,
2469 session->master_key,
2641 session->master_key,
2794 session->master_key,
2879 session->master_key,
2922 s->session->master_key)) < 0) {
2989 session->master_key,
H A Ds3_clnt.c1008 s->session->master_key_length = sizeof(s->session->master_key);
1009 if (s->tls_session_secret_cb(s, s->session->master_key,
2596 session->master_key,
2724 session->master_key,
2795 session->master_key,
2940 session->master_key,
3094 session->master_key,
3124 s->session->master_key)) <
3206 session->master_key,
H A Dssl_sess.c874 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key));
H A Dssl.h505 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st
874 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key);
876 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key);
H A Ds2_srvr.c551 memcpy(s->session->master_key, p, key_length);
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c53 u8 master_key[16]; member in struct:eap_mschapv2_data
435 data->master_key)) {
441 data->master_key, MSCHAPV2_KEY_LEN);
554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0,
556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,

Completed in 453 milliseconds