Searched refs:master_key (Results 1 - 24 of 24) sorted by relevance

/freebsd-13-stable/sys/contrib/libsodium/test/default/
H A Dkdf.c8 unsigned char *master_key; local
16 master_key = (unsigned char *) sodium_malloc(crypto_kdf_KEYBYTES);
20 master_key[i] = i;
25 i, context, master_key);
35 i, context, master_key) == 0) {
45 sodium_free(master_key);
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Dmschapv2.h24 u8 *master_key);
H A Dmschapv2.c42 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 if (get_master_key(password_hash_hash, nt_response, master_key))
106 master_key, MSCHAPV2_MASTER_KEY_LEN);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_mschapv2.c93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
208 data->auth_response, data->master_key)) {
612 /* Likewise, generate master_key here since we have the needed data
617 data->master_key)) {
859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1,
861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_ttls.c53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data
546 data->master_key)) {
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dset_dbinfo.c40 const char *conf, const char *master_key)
58 if (master_key) {
59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key);
39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dms_funcs.h42 u8 *master_key);
43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
H A Dms_funcs.c322 * @master_key: 16-octet MasterKey (OUT)
326 u8 *master_key)
343 os_memcpy(master_key, hash, 16);
350 * @master_key: 16-octet MasterKey (IN)
357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument
400 addr[0] = master_key;
325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
H A Dtls_wolfssl.c2012 byte *master_key; local
2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random,
2037 tls_prf_sha256(master_key, master_key_len,
2042 ret = tls_prf_sha1_md5(master_key, master_key_len,
2047 forced_memzero(master_key, master_key_len);
H A Dtls_openssl.c107 os_memcpy(out, session->master_key, outlen);
4066 unsigned char master_key[64]; local
4102 master_key_len = SSL_SESSION_get_master_key(sess, master_key,
4103 sizeof(master_key));
4109 tls_prf_sha256(master_key, master_key_len,
4113 } else if (tls_prf_sha1_md5(master_key, master_key_len,
4118 forced_memzero(master_key, sizeof(master_key));
H A Dcrypto_module_tests.c2076 u8 master_key[] = { local
2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) {
2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key),
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_asn1.c22 ASN1_OCTET_STRING *master_key; member in struct:__anon7280
53 ASN1_SIMPLE(SSL_SESSION_ASN1, master_key, ASN1_OCTET_STRING),
111 ASN1_OCTET_STRING master_key, session_id, sid_ctx;
153 ssl_session_oinit(&as.master_key, &master_key,
154 in->master_key, in->master_key_length);
292 if (!ssl_session_memcpy(ret->master_key, &tmpl,
293 as->master_key, TLS13_MAX_RESUMPTION_PSK_LENGTH))
H A Dssl_txt.c81 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
194 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
H A Dt1_enc.c79 NULL, 0, NULL, 0, s->session->master_key,
523 printf("%02X%c", s->session->master_key[z],
581 s->session->master_key, s->session->master_key_length,
643 BIO_dump_fp(stderr, (char *)s->session->master_key,
718 s->session->master_key, s->session->master_key_length,
H A Ds3_enc.c52 || !EVP_DigestUpdate(s1, s->session->master_key,
58 || !EVP_DigestUpdate(m5, s->session->master_key,
454 s->session->master_key) <= 0
H A Dssl_sess.c761 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key));
H A Dssl_lib.c4282 memcpy(out, session->master_key, outlen);
4289 if (len > sizeof(sess->master_key))
4292 memcpy(sess->master_key, in, len);
H A Ds3_lib.c4634 s->session->master_key, pskpms, pskpmslen,
4647 s->session->master_key, pms, pmslen,
H A Dssl_local.h516 * For <=TLS1.2 this is the master_key. For TLS1.3 this is the resumption
519 unsigned char master_key[TLS13_MAX_RESUMPTION_PSK_LENGTH]; member in struct:ssl_session_st
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c53 u8 master_key[16]; member in struct:eap_mschapv2_data
435 data->master_key)) {
441 data->master_key, MSCHAPV2_KEY_LEN);
554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0,
556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
/freebsd-13-stable/crypto/openssl/ssl/statem/
H A Dstatem_lib.c300 s->session->master_key)
491 s->session->master_key)) {
584 s->session->master_key,
H A Dstatem_clnt.c1570 master_key_length = sizeof(s->session->master_key);
1571 if (s->ext.session_secret_cb(s, s->session->master_key,
2734 s->session->master_key,
H A Dextensions.c1516 if (!tls13_generate_secret(s, md, NULL, sess->master_key,
H A Dstatem_srvr.c1941 master_key_length = sizeof(s->session->master_key);
1942 if (s->ext.session_secret_cb(s, s->session->master_key,
4117 s->session->master_key,

Completed in 122 milliseconds