Searched refs:master_key (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Dmschapv2.h30 u8 *master_key);
H A Dmschapv2.c48 u8 *master_key)
94 /* Generate master_key here since we have the needed data available. */
103 get_master_key(password_hash_hash, nt_response, master_key);
105 master_key, MSCHAPV2_MASTER_KEY_LEN);
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_mschapv2.c98 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member in struct:eap_mschapv2_data
215 data->auth_response, data->master_key)) {
598 /* Likewise, generate master_key here since we have the needed data
602 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
842 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 1, 0);
843 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_tls_common.c288 keys.master_key == NULL)
298 if (tls_prf(keys.master_key, keys.master_key_len,
H A Deap_ttls.c69 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member in struct:eap_ttls_data
627 get_asymetric_start_key(data->master_key, session_key,
629 get_asymetric_start_key(data->master_key,
697 data->master_key)) {
/freebsd-9.3-release/sys/geom/
H A Dgeom_aes.c80 u_char master_key[MASTER_KEY_LENGTH]; member in struct:g_aes_softc
106 rijndael_makeKey(ki, dir, 128, sc->master_key);
113 u %= sizeof sc->master_key;
114 p = sc->master_key + u;
115 if (u + 16 <= sizeof(sc->master_key)) {
118 u1 = sizeof sc->master_key - u;
120 MD5Update(&cx, sc->master_key, 16 - u1);
326 p = sc->master_key;
327 for (i = 0; i < (int)sizeof sc->master_key; i ++)
335 p = sc->master_key;
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h46 u8 *master_key);
47 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
H A Dms_funcs.c277 * @master_key: 16-octet MasterKey (OUT)
281 u8 *master_key)
298 os_memcpy(master_key, hash, 16);
305 * @master_key: 16-octet MasterKey (IN)
312 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, argument
355 addr[0] = master_key;
280 get_master_key(const u8 *password_hash_hash, const u8 *nt_response, u8 *master_key) argument
H A Dtls.h21 const u8 *master_key; /* TLS master secret */ member in struct:tls_keys
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dssl_asn1.c71 ASN1_OCTET_STRING master_key; member in struct:ssl_session_asn1_st
152 a.master_key.length = in->master_key_length;
153 a.master_key.type = V_ASN1_OCTET_STRING;
154 a.master_key.data = in->master_key;
219 M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING);
258 M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING);
373 memcpy(ret->master_key, os.data, ret->master_key_length);
H A Ds2_lib.c413 s->session->master_key_length > (int)sizeof(s->session->master_key)) {
432 <= (int)sizeof(s->session->master_key));
433 EVP_DigestUpdate(&ctx, s->session->master_key,
H A Dssl_txt.c135 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
H A Ds2_clnt.c637 if (i > (int)sizeof(sess->master_key)) {
642 if (RAND_bytes(sess->master_key, i) <= 0) {
662 memcpy(d, sess->master_key, (unsigned int)clear);
666 &(sess->master_key[clear]), d,
679 sess->master_key[clear]++;
H A Dt1_enc.c206 s->session->master_key, s->session->master_key_length,
209 printf("tls1_generate_key_block() ==> %d byte master_key =\n\t",
214 printf("%02X", s->session->master_key[i]);
522 printf("%02X%c", s->session->master_key[z],
706 s->session->master_key, s->session->master_key_length,
854 len, s->session->master_key, buff, sizeof buff);
H A Ds3_enc.c166 EVP_DigestUpdate(&s1, s->session->master_key,
173 EVP_DigestUpdate(&m5, s->session->master_key,
554 EVP_DigestUpdate(&ctx, s->session->master_key,
560 EVP_DigestUpdate(&ctx, s->session->master_key,
H A Dd1_clnt.c858 session->master_key,
983 session->master_key,
1038 session->master_key,
H A Dssl_sess.c676 OPENSSL_cleanse(ss->master_key, sizeof ss->master_key);
H A Ds3_srvr.c1937 session->master_key,
1993 session->master_key,
2162 session->master_key,
2312 session->master_key,
H A Ds3_clnt.c1993 session->master_key,
2120 session->master_key,
2175 session->master_key,
2318 session->master_key,
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c58 u8 master_key[16]; member in struct:eap_mschapv2_data
418 get_master_key(pw_hash_hash, nt_response, data->master_key);
421 data->master_key, MSCHAPV2_KEY_LEN);
534 get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0, 1);
535 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
H A Deap_server_tls_common.c88 keys.master_key == NULL)
98 if (tls_prf(keys.master_key, keys.master_key_len,
H A Deap_server_ttls.c868 u8 pw_hash_buf[16], pw_hash_hash[16], master_key[16]; local
880 get_master_key(pw_hash_hash, nt_response, master_key);
881 get_asymetric_start_key(master_key, session_key,
883 get_asymetric_start_key(master_key,
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Deap_fast_common.c135 "expansion", keys.master_key, keys.master_key_len);
136 if (tls_prf(keys.master_key, keys.master_key_len,
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client.c575 keys->master_key = conn->master_secret;
H A Dtlsv1_server.c516 keys->master_key = conn->master_secret;

Completed in 227 milliseconds

12