/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 208 data->auth_response, data->master_key)) { 612 /* Likewise, generate master_key here since we have the needed data 617 data->master_key)) { 859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data 546 data->master_key)) {
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | set_dbinfo.c | 40 const char *conf, const char *master_key) 58 if (master_key) { 59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key); 39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
|
/freebsd-11-stable/sys/geom/ |
H A D | geom_aes.c | 81 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc 107 rijndael_makeKey(ki, dir, 128, sc->master_key); 114 u %= sizeof sc->master_key; 115 p = sc->master_key + u; 116 if (u + 16 <= sizeof(sc->master_key)) { 119 u1 = sizeof sc->master_key - u; 121 MD5Update(&cx, sc->master_key, 16 - u1); 327 p = sc->master_key; 328 for (i = 0; i < (int)sizeof sc->master_key; i ++) 336 p = sc->master_key; [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 322 * @master_key: 16-octet MasterKey (OUT) 326 u8 *master_key) 343 os_memcpy(master_key, hash, 16); 350 * @master_key: 16-octet MasterKey (IN) 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 400 addr[0] = master_key; 325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
H A D | tls_wolfssl.c | 2012 byte *master_key; local 2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, 2037 tls_prf_sha256(master_key, master_key_len, 2042 ret = tls_prf_sha1_md5(master_key, master_key_len, 2047 forced_memzero(master_key, master_key_len);
|
H A D | tls_openssl.c | 107 os_memcpy(out, session->master_key, outlen); 4066 unsigned char master_key[64]; local 4102 master_key_len = SSL_SESSION_get_master_key(sess, master_key, 4103 sizeof(master_key)); 4109 tls_prf_sha256(master_key, master_key_len, 4113 } else if (tls_prf_sha1_md5(master_key, master_key_len, 4118 forced_memzero(master_key, sizeof(master_key));
|
H A D | crypto_module_tests.c | 2076 u8 master_key[] = { local 2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { 2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key),
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 97 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 191 a.master_key.length = in->master_key_length; 192 a.master_key.type = V_ASN1_OCTET_STRING; 193 a.master_key.data = in->master_key; 278 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 331 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 466 memcpy(ret->master_key, os.data, ret->master_key_length);
|
H A D | s2_lib.c | 481 s->session->master_key_length > (int)sizeof(s->session->master_key)) { 502 <= (int)sizeof(s->session->master_key)); 503 EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | ssl_txt.c | 167 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
H A D | tls_srp.c | 337 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key) argument 358 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp, 371 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key) argument 405 s->method->ssl3_enc->generate_master_secret(s, master_key, tmp,
|
H A D | t1_enc.c | 303 NULL, 0, NULL, 0, s->session->master_key, 306 fprintf(stderr, "tls1_generate_key_block() ==> %d byte master_key =\n\t", 311 fprintf(stderr, "%02X", s->session->master_key[i]); 697 printf("%02X%c", s->session->master_key[z], 992 s->session->master_key, s->session->master_key_length, 1168 so, sol, p, len, s->session->master_key, buff, sizeof(buff)); 1178 BIO_dump_fp(stderr, (char *)s->session->master_key, 1193 s->session->master_key, 1278 s->session->master_key, s->session->master_key_length,
|
H A D | s2_clnt.c | 639 if (i > (int)sizeof(sess->master_key)) { 644 if (RAND_bytes(sess->master_key, i) <= 0) { 664 memcpy(d, sess->master_key, (unsigned int)clear); 668 &(sess->master_key[clear]), d, 681 sess->master_key[clear]++;
|
H A D | s3_enc.c | 189 !EVP_DigestUpdate(&s1, s->session->master_key, 197 !EVP_DigestUpdate(&m5, s->session->master_key, 731 || EVP_DigestUpdate(&ctx, s->session->master_key, 737 || EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | s3_srvr.c | 1271 s->session->master_key_length = sizeof(s->session->master_key); 1272 if (s->tls_session_secret_cb(s, s->session->master_key, 2373 session->master_key, 2469 session->master_key, 2641 session->master_key, 2794 session->master_key, 2879 session->master_key, 2922 s->session->master_key)) < 0) { 2989 session->master_key,
|
H A D | s3_clnt.c | 1008 s->session->master_key_length = sizeof(s->session->master_key); 1009 if (s->tls_session_secret_cb(s, s->session->master_key, 2596 session->master_key, 2724 session->master_key, 2795 session->master_key, 2940 session->master_key, 3094 session->master_key, 3124 s->session->master_key)) < 3206 session->master_key,
|
H A D | ssl_sess.c | 874 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key));
|
H A D | ssl.h | 505 unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; member in struct:ssl_session_st 874 int SRP_generate_server_master_secret(SSL *s, unsigned char *master_key); 876 int SRP_generate_client_master_secret(SSL *s, unsigned char *master_key);
|
H A D | s2_srvr.c | 551 memcpy(s->session->master_key, p, key_length);
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 435 data->master_key)) { 441 data->master_key, MSCHAPV2_KEY_LEN); 554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|