/freebsd-13-stable/sys/contrib/libsodium/test/default/ |
H A D | kdf.c | 8 unsigned char *master_key; local 16 master_key = (unsigned char *) sodium_malloc(crypto_kdf_KEYBYTES); 20 master_key[i] = i; 25 i, context, master_key); 35 i, context, master_key) == 0) { 45 sodium_free(master_key);
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | mschapv2.c | 42 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 106 master_key, MSCHAPV2_MASTER_KEY_LEN); 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 208 data->auth_response, data->master_key)) { 612 /* Likewise, generate master_key here since we have the needed data 617 data->master_key)) { 859 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 861 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data 546 data->master_key)) {
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | set_dbinfo.c | 40 const char *conf, const char *master_key) 58 if (master_key) { 59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key); 39 add_db(krb5_context context, struct krb5_kdc_configuration *c, const char *conf, const char *master_key) argument
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 322 * @master_key: 16-octet MasterKey (OUT) 326 u8 *master_key) 343 os_memcpy(master_key, hash, 16); 350 * @master_key: 16-octet MasterKey (IN) 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 400 addr[0] = master_key; 325 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
H A D | tls_wolfssl.c | 2012 byte *master_key; local 2031 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, 2037 tls_prf_sha256(master_key, master_key_len, 2042 ret = tls_prf_sha1_md5(master_key, master_key_len, 2047 forced_memzero(master_key, master_key_len);
|
H A D | tls_openssl.c | 107 os_memcpy(out, session->master_key, outlen); 4066 unsigned char master_key[64]; local 4102 master_key_len = SSL_SESSION_get_master_key(sess, master_key, 4103 sizeof(master_key)); 4109 tls_prf_sha256(master_key, master_key_len, 4113 } else if (tls_prf_sha1_md5(master_key, master_key_len, 4118 forced_memzero(master_key, sizeof(master_key));
|
H A D | crypto_module_tests.c | 2076 u8 master_key[] = { local 2121 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { 2126 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key),
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 22 ASN1_OCTET_STRING *master_key; member in struct:__anon7280 53 ASN1_SIMPLE(SSL_SESSION_ASN1, master_key, ASN1_OCTET_STRING), 111 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 153 ssl_session_oinit(&as.master_key, &master_key, 154 in->master_key, in->master_key_length); 292 if (!ssl_session_memcpy(ret->master_key, &tmpl, 293 as->master_key, TLS13_MAX_RESUMPTION_PSK_LENGTH))
|
H A D | ssl_txt.c | 81 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) 194 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
H A D | t1_enc.c | 79 NULL, 0, NULL, 0, s->session->master_key, 523 printf("%02X%c", s->session->master_key[z], 581 s->session->master_key, s->session->master_key_length, 643 BIO_dump_fp(stderr, (char *)s->session->master_key, 718 s->session->master_key, s->session->master_key_length,
|
H A D | s3_enc.c | 52 || !EVP_DigestUpdate(s1, s->session->master_key, 58 || !EVP_DigestUpdate(m5, s->session->master_key, 454 s->session->master_key) <= 0
|
H A D | ssl_sess.c | 761 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key));
|
H A D | ssl_lib.c | 4282 memcpy(out, session->master_key, outlen); 4289 if (len > sizeof(sess->master_key)) 4292 memcpy(sess->master_key, in, len);
|
H A D | s3_lib.c | 4634 s->session->master_key, pskpms, pskpmslen, 4647 s->session->master_key, pms, pmslen,
|
H A D | ssl_local.h | 516 * For <=TLS1.2 this is the master_key. For TLS1.3 this is the resumption 519 unsigned char master_key[TLS13_MAX_RESUMPTION_PSK_LENGTH]; member in struct:ssl_session_st
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member in struct:eap_mschapv2_data 435 data->master_key)) { 441 data->master_key, MSCHAPV2_KEY_LEN); 554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 300 s->session->master_key) 491 s->session->master_key)) { 584 s->session->master_key,
|
H A D | statem_clnt.c | 1570 master_key_length = sizeof(s->session->master_key); 1571 if (s->ext.session_secret_cb(s, s->session->master_key, 2734 s->session->master_key,
|
H A D | extensions.c | 1516 if (!tls13_generate_secret(s, md, NULL, sess->master_key,
|
H A D | statem_srvr.c | 1941 master_key_length = sizeof(s->session->master_key); 1942 if (s->ext.session_secret_cb(s, s->session->master_key, 4117 s->session->master_key,
|