/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 30 u8 *master_key);
|
H A D | mschapv2.c | 48 u8 *master_key) 94 /* Generate master_key here since we have the needed data available. */ 103 get_master_key(password_hash_hash, nt_response, master_key); 105 master_key, MSCHAPV2_MASTER_KEY_LEN); 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 98 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data 215 data->auth_response, data->master_key)) { 598 /* Likewise, generate master_key here since we have the needed data 602 get_master_key(password_hash_hash, cp->nt_response, data->master_key); 842 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0); 843 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_tls_common.c | 288 keys.master_key == NULL) 298 if (tls_prf(keys.master_key, keys.master_key_len,
|
H A D | eap_ttls.c | 69 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data 627 get_asymetric_start_key(data->master_key, session_key, 629 get_asymetric_start_key(data->master_key, 697 data->master_key)) {
|
/freebsd-9.3-release/sys/geom/ |
H A D | geom_aes.c | 80 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc 106 rijndael_makeKey(ki, dir, 128, sc->master_key); 113 u %= sizeof sc->master_key; 114 p = sc->master_key + u; 115 if (u + 16 <= sizeof(sc->master_key)) { 118 u1 = sizeof sc->master_key - u; 120 MD5Update(&cx, sc->master_key, 16 - u1); 326 p = sc->master_key; 327 for (i = 0; i < (int)sizeof sc->master_key; i ++) 335 p = sc->master_key; [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 46 u8 *master_key); 47 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | ms_funcs.c | 277 * @master_key: 16-octet MasterKey (OUT) 281 u8 *master_key) 298 os_memcpy(master_key, hash, 16); 305 * @master_key: 16-octet MasterKey (IN) 312 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument 355 addr[0] = master_key; 280 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
|
H A D | tls.h | 21 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 71 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st 152 a.master_key.length = in->master_key_length; 153 a.master_key.type = V_ASN1_OCTET_STRING; 154 a.master_key.data = in->master_key; 219 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); 258 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); 373 memcpy(ret->master_key, os.data, ret->master_key_length);
|
H A D | s2_lib.c | 413 s->session->master_key_length > (int)sizeof(s->session->master_key)) { 432 <= (int)sizeof(s->session->master_key)); 433 EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | ssl_txt.c | 135 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
H A D | s2_clnt.c | 637 if (i > (int)sizeof(sess->master_key)) { 642 if (RAND_bytes(sess->master_key, i) <= 0) { 662 memcpy(d, sess->master_key, (unsigned int)clear); 666 &(sess->master_key[clear]), d, 679 sess->master_key[clear]++;
|
H A D | t1_enc.c | 206 s->session->master_key, s->session->master_key_length, 209 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t", 214 printf("%02X", s->session->master_key[i]); 522 printf("%02X%c", s->session->master_key[z], 706 s->session->master_key, s->session->master_key_length, 854 len, s->session->master_key, buff, sizeof buff);
|
H A D | s3_enc.c | 166 EVP_DigestUpdate(&s1, s->session->master_key, 173 EVP_DigestUpdate(&m5, s->session->master_key, 554 EVP_DigestUpdate(&ctx, s->session->master_key, 560 EVP_DigestUpdate(&ctx, s->session->master_key,
|
H A D | d1_clnt.c | 858 session->master_key, 983 session->master_key, 1038 session->master_key,
|
H A D | ssl_sess.c | 676 OPENSSL_cleanse(ss->master_key, sizeof ss->master_key);
|
H A D | s3_srvr.c | 1937 session->master_key, 1993 session->master_key, 2162 session->master_key, 2312 session->master_key,
|
H A D | s3_clnt.c | 1993 session->master_key, 2120 session->master_key, 2175 session->master_key, 2318 session->master_key,
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_mschapv2.c | 58 u8 master_key[16]; member in struct:eap_mschapv2_data 418 get_master_key(pw_hash_hash, nt_response, data->master_key); 421 data->master_key, MSCHAPV2_KEY_LEN); 534 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1); 535 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
|
H A D | eap_server_tls_common.c | 88 keys.master_key == NULL) 98 if (tls_prf(keys.master_key, keys.master_key_len,
|
H A D | eap_server_ttls.c | 868 u8 pw_hash_buf[16], pw_hash_hash[16], master_key[16]; local 880 get_master_key(pw_hash_hash, nt_response, master_key); 881 get_asymetric_start_key(master_key, session_key, 883 get_asymetric_start_key(master_key,
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.c | 135 "expansion", keys.master_key, keys.master_key_len); 136 if (tls_prf(keys.master_key, keys.master_key_len,
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 575 keys->master_key = conn->master_secret;
|
H A D | tlsv1_server.c | 516 keys->master_key = conn->master_secret;
|