/freebsd-11-stable/crypto/openssl/crypto/modes/ |
H A D | ccm128.c | 69 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); 70 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; 78 /* Then you setup per-message nonce and pass the length of the message */ 80 const unsigned char *nonce, size_t nlen, size_t mlen) 82 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ 85 return -1; /* nonce is too short */ 88 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); 89 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); 90 ctx->nonce 79 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ts/ |
H A D | ts_req_print.c | 73 const ASN1_INTEGER *nonce; local 91 nonce = TS_REQ_get_nonce(a); 92 if (nonce == NULL) 95 TS_ASN1_INTEGER_print_bio(bio, nonce);
|
H A D | ts_verify_ctx.c | 105 ASN1_INTEGER_free(ctx->nonce); 119 const ASN1_INTEGER *nonce; local 148 /* Setting nonce. */ 149 if ((nonce = TS_REQ_get_nonce(req)) != NULL) { 150 if (!(ret->nonce = ASN1_INTEGER_dup(nonce)))
|
H A D | ts_req_utils.c | 149 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) argument 153 if (a->nonce == nonce) 155 new_nonce = ASN1_INTEGER_dup(nonce); 160 ASN1_INTEGER_free(a->nonce); 161 a->nonce = new_nonce; 167 return a->nonce;
|
H A D | ts_rsp_utils.c | 303 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce) argument 307 if (a->nonce == nonce) 309 new_nonce = ASN1_INTEGER_dup(nonce); 314 ASN1_INTEGER_free(a->nonce); 315 a->nonce = new_nonce; 321 return a->nonce;
|
H A D | ts_rsp_print.c | 184 const ASN1_INTEGER *nonce; local 230 /* Print nonce. */ 232 nonce = TS_TST_INFO_get_nonce(a); 233 if (nonce == NULL) 236 TS_ASN1_INTEGER_print_bio(bio, nonce);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-ctr.c | 20 * @nonce: Nonce for counter mode (16 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, argument 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 62 * @nonce: Nonce for counter mode (16 bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len);
|
H A D | aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, argument 40 os_memcpy(&b[1], nonce, 15 - L); 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) argument 88 os_memcpy(&a[1], nonce, 15 - L); 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, argument 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 167 aes_ccm_encr_start(L, nonce, a); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, argument 195 aes_ccm_encr_start(L, nonce, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aa [all...] |
H A D | aes_wrap.h | 36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, 38 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 41 const u8 *nonce, size_t nonce_len, 45 const u8 *nonce, size_t nonce_len, 65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 171 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 187 r = CCCryptorUpdate(ref, ctx->nonce, AES_BLOCK_SIZE, ctx->encr_buf, 196 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 279 status = BCryptEncrypt(ctx->hKey, (PUCHAR)ctx->nonce, AES_BLOCK_SIZE, 309 memset(ctx->nonce, 0, sizeof(ctx->nonce)); 320 if (mbedtls_aes_crypt_ecb(&ctx->ctx, MBEDTLS_AES_ENCRYPT, ctx->nonce, 341 memset(ctx->nonce, 487 uint8_t *const nonce = ctx->nonce; local [all...] |
H A D | archive_cryptor_private.h | 60 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon5 80 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon6 97 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon7 121 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon8 136 uint8_t nonce[AES_BLOCK_SIZE]; member in struct:__anon9
|
/freebsd-11-stable/crypto/openssh/ |
H A D | umac.h | 68 int umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]); 79 u_char nonce[8]); 122 int umac128_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
|
H A D | mac.c | 183 u_char nonce[8]; local 199 POKE_U64(nonce, seqno); 201 umac_final(mac->umac_ctx, u.m, nonce); 204 put_u64(nonce, seqno); 206 umac128_final(mac->umac_ctx, u.m, nonce);
|
H A D | umac.c | 210 * xor the appropriate bytes depending on the last bits of nonce. 216 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon6162 228 memset(pc->nonce, 0, sizeof(pc->nonce)); 229 aes_encryption(pc->nonce, pc->cache, pc->prf_key); 232 static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) argument 251 int ndx = nonce[7] & LOW_BIT_MASK; 253 *(UINT32 *)t.tmp_nonce_lo = ((const UINT32 *)nonce)[1]; 256 if ( (((UINT32 *)t.tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) || 257 (((const UINT32 *)nonce)[ 1237 umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]) argument [all...] |
/freebsd-11-stable/contrib/unbound/dnscrypt/ |
H A D | dnscrypt.c | 36 // 12 bytes: the client's nonce 37 // 12 bytes: server nonce extension 65 /** the nonce used by the client */ 66 uint8_t nonce[crypto_box_HALF_NONCEBYTES]; member in struct:nonce_cache_key 151 * Generate a key hash suitable to find a nonce in slabhash. 152 * \param[in] nonce: a uint8_t pointer of size crypto_box_HALF_NONCEBYTES 159 dnsc_nonce_cache_key_hash(const uint8_t nonce[crypto_box_HALF_NONCEBYTES], argument 164 h = hashlittle(nonce, crypto_box_HALF_NONCEBYTES, h); 170 * Inserts a nonce, magic_query, pk tuple into the nonces_cache slabhash. 172 * \param[in] nonce 179 dnsc_nonce_cache_insert(struct slabhash *cache, const uint8_t nonce[crypto_box_HALF_NONCEBYTES], const uint8_t magic_query[DNSCRYPT_MAGIC_HEADER_LEN], const uint8_t pk[crypto_box_PUBLICKEYBYTES], uint32_t hash) argument 215 dnsc_nonces_lookup(struct slabhash* cache, const uint8_t nonce[crypto_box_HALF_NONCEBYTES], const uint8_t magic_query[DNSCRYPT_MAGIC_HEADER_LEN], const uint8_t pk[crypto_box_PUBLICKEYBYTES], uint32_t hash) argument 252 uint8_t nonce[crypto_box_NONCEBYTES]; local 392 dnscrypt_pad(uint8_t *buf, const size_t len, const size_t max_len, const uint8_t *nonce, const uint8_t *secretkey) argument 443 add_server_nonce(uint8_t *nonce) argument 472 uint8_t nonce[crypto_box_NONCEBYTES]; local [all...] |
H A D | dnscrypt.h | 76 /** slabhash keeping track of nonce/cient pk/server sk pairs. */ 87 uint8_t nonce[crypto_box_HALF_NONCEBYTES]; member in struct:dnscrypt_query_header 154 * Computes the size of the nonce cache entry. 159 * Compares two nonce cache keys. 164 * Function to delete a nonce cache key. 169 * Function to delete a nonce cache value.
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 121 /* If we can, make the nonce with random bytes. If we can't... well, 125 static apr_status_t make_nonce(apr_uint64_t *nonce) 128 return apr_generate_random_bytes((unsigned char *) nonce, sizeof(*nonce)); 130 *nonce = apr_time_now(); 140 apr_uint64_t nonce; 150 status = make_nonce(&nonce); 157 nonce, apr_time_now(), hostbuf); 124 make_nonce(apr_uint64_t *nonce) argument 139 apr_uint64_t nonce; local
|
/freebsd-11-stable/contrib/serf/auth/ |
H A D | auth_digest.c | 42 /* nonce-count for digest authentication */ 51 const char *nonce; member in struct:digest_authn_info_t 181 " nonce=\"%s\"," 184 digest_info->nonce, 198 MD5 hash of the combined HA1 result, server nonce (nonce), 199 request counter (nc), client nonce (cnonce), 202 digest_info->ha1, digest_info->nonce, 207 MD5 hash of the combined HA1 result, server nonce (nonce) 247 const char *nonce = NULL; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_ocsp.c | 73 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce, 75 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce, 84 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, 214 * OCSP nonce. This is needs special treatment because it doesn't have an 262 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, argument 267 if (i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0)
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local 258 os_memset(nonce, 0, 12); 259 os_memcpy(nonce + 12, pchannel, 4); 269 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 270 nonce, sizeof(nonce)); 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 326 /* nonce++ */ 327 inc_byte_array(nonce, sizeo [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 94 u8 *buf, *pchannel, nonce[16]; local 133 os_memset(nonce, 0, sizeof(nonce)); 135 os_memcpy(pchannel, nonce + 12, 4); 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 333 u8 *decrypted, nonce[16]; local 365 os_memset(nonce, 0, 12); 366 os_memcpy(nonce + 12, pos, 4); 377 if (aes_128_eax_decrypt(data->tek, nonce, sizeo [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_tlv_common.h | 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | get_in_tkt.c | 154 unsigned nonce, 209 a->req_body.nonce = nonce; 390 unsigned nonce; variable 395 krb5_generate_random_block (&nonce, sizeof(nonce)); 396 nonce &= 0xffffffff; 409 nonce, 511 nonce, 145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-mptcp.c | 89 uint8_t nonce[4]; member in struct:mp_join::__anon4105::__anon4106 93 uint8_t nonce[4]; member in struct:mp_join::__anon4105::__anon4107 218 ND_PRINT((ndo, " token 0x%x" " nonce 0x%x", 220 EXTRACT_32BITS(mpj->u.syn.nonce))); 223 ND_PRINT((ndo, " hmac 0x%" PRIx64 " nonce 0x%x", 225 EXTRACT_32BITS(mpj->u.synack.nonce)));
|