Searched refs:nonce (Results 1 - 25 of 54) sorted by relevance

123

/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Daes-ctr.c25 * @nonce: Nonce for counter mode (16 bytes)
30 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
42 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
H A Daes_wrap.h33 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
36 const u8 *nonce, size_t nonce_len,
40 const u8 *nonce, size_t nonce_len,
H A Daes-eax.c25 * @nonce: Nonce for counter mode
34 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
59 os_memcpy(buf + 16, nonce, nonce_len);
89 * @nonce: Nonce for counter mode
98 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
123 os_memcpy(buf + 16, nonce, nonce_len);
/freebsd-9.3-release/crypto/openssh/
H A Dumac.h68 int umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
79 u_char nonce[8]);
122 int umac128_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
H A Dmac.c178 u_char b[4], nonce[8]; local
195 put_u64(nonce, seqno);
197 umac_final(mac->umac_ctx, u.m, nonce);
200 put_u64(nonce, seqno);
202 umac128_final(mac->umac_ctx, u.m, nonce);
H A Dumac.c221 * xor the appropriate bytes depending on the last bits of nonce.
227 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon4742
239 memset(pc->nonce, 0, sizeof(pc->nonce));
240 aes_encryption(pc->nonce, pc->cache, pc->prf_key);
243 static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) argument
262 int ndx = nonce[7] & LOW_BIT_MASK;
264 *(UINT32 *)t.tmp_nonce_lo = ((const UINT32 *)nonce)[1];
267 if ( (((UINT32 *)t.tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) ||
268 (((const UINT32 *)nonce)[
1248 umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-digest.in173 snonce=`grep server-nonce= sdigest-reply | cut -f2- -d=`
183 --server-nonce="$snonce" \
189 #echo server-nonce: $snonce
200 --server-nonce="$snonce" \
221 --server-nonce="$snonce" \
240 snonce=`grep server-nonce= sdigest-reply | cut -f2- -d=`
250 --client-nonce="$cnonce" \
251 --server-nonce="$snonce" \
264 --client-nonce="$cnonce" \
265 --server-nonce
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_psk.c188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
262 os_memset(nonce, 0, 12);
263 os_memcpy(nonce + 12, pchannel, 4);
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
274 nonce, sizeof(nonce));
287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
331 /* nonce++ */
332 inc_byte_array(nonce, sizeo
[all...]
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dwpa_auth_ie.h31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
H A Dpeerkey_auth.c179 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN,
241 kde->nonce, WPA_NONCE_LEN);
254 NULL, kde->nonce, buf, pos - buf, 0, 1, 0);
275 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
282 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce */
309 os_memcpy(pos, kde.nonce, WPA_NONCE_LEN);
H A Dwpa_auth_ft.c337 if (os_get_random(f.nonce, sizeof(f.nonce))) {
339 "nonce");
347 f.nonce, frame.nonce) < 0)
1399 frame->nonce, f.nonce) < 0) {
1405 wpa_hexdump(MSG_DEBUG, "FT: PMK-R1 pull - nonce",
1406 f.nonce, sizeof(f.nonce));
[all...]
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/
H A Dwpa_ie.h31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/
H A Dtkey.h99 dns_name_t *algorithm, isc_buffer_t *nonce,
107 * if 'name' == dns_rootname. If nonce is not NULL, it supplies
168 dst_key_t *key, isc_buffer_t *nonce,
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dv3_ocsp.c73 static int i2r_ocsp_crlid(X509V3_EXT_METHOD *method, void *nonce, BIO *out,
75 static int i2r_ocsp_acutoff(X509V3_EXT_METHOD *method, void *nonce, BIO *out,
84 static int i2r_ocsp_nonce(X509V3_EXT_METHOD *method, void *nonce, BIO *out,
213 * OCSP nonce. This is needs special treatment because it doesn't have an
261 static int i2r_ocsp_nonce(X509V3_EXT_METHOD *method, void *nonce, BIO *out, argument
266 if (i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0)
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-babel.c241 u_short nonce, interval; local
247 nonce = EXTRACT_16BITS(message + 4);
249 printf("%04x %d", nonce, interval);
255 u_short nonce; local
261 nonce = EXTRACT_16BITS(message + 2);
262 printf("%04x", nonce);
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_psk.c101 u8 *buf, *pchannel, nonce[16]; local
138 os_memset(nonce, 0, sizeof(nonce));
140 os_memcpy(pchannel, nonce + 12, 4);
145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
339 u8 *decrypted, nonce[16]; local
371 os_memset(nonce, 0, 12);
372 os_memcpy(nonce + 12, pos, 4);
384 if (aes_128_eax_decrypt(data->tek, nonce, sizeo
[all...]
H A Deap_server_fast.c645 if (os_get_random(binding->nonce, sizeof(binding->nonce)) < 0) {
652 * The nonce in a request MUST have its least significant bit set to 0.
654 binding->nonce[sizeof(binding->nonce) - 1] &= ~0x01;
656 os_memcpy(data->crypto_binding_nonce, binding->nonce,
657 sizeof(binding->nonce));
674 binding->nonce, sizeof(binding->nonce));
1185 b->nonce, sizeo
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Deap_tlv_common.h82 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
H A Dikev2_common.h300 const u8 *nonce, size_t nonce_len,
318 const u8 *nonce; member in struct:ikev2_payloads
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dget_in_tkt.c127 unsigned nonce,
219 if (nonce != rep->enc_part.nonce) {
429 unsigned nonce,
484 a->req_body.nonce = nonce;
663 unsigned nonce; local
668 krb5_generate_random_block (&nonce, sizeof(nonce));
669 nonce
120 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_const_pointer keyseed, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument
420 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
[all...]
H A Dpkinit.c295 unsigned nonce,
314 a->pkAuthenticator.nonce = nonce;
471 unsigned nonce,
509 ap.pkAuthenticator.nonce = nonce;
527 ret = build_auth_pack(context, nonce, ctx, ctx->dh, req_body, &ap);
635 unsigned nonce,
691 return pk_mk_padata(context, ctx, req_body, nonce, md);
753 unsigned nonce,
294 build_auth_pack(krb5_context context, unsigned nonce, krb5_pk_init_ctx ctx, DH *dh, const KDC_REQ_BODY *body, AuthPack *a) argument
468 pk_mk_padata(krb5_context context, krb5_pk_init_ctx ctx, const KDC_REQ_BODY *req_body, unsigned nonce, METHOD_DATA *md) argument
632 _krb5_pk_mk_padata(krb5_context context, void *c, const KDC_REQ_BODY *req_body, unsigned nonce, METHOD_DATA *md) argument
751 get_reply_key_win(krb5_context context, const krb5_data *content, unsigned nonce, krb5_keyblock **key) argument
939 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
1075 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument
1248 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
[all...]
H A Drd_cred.c236 if(enc_krb_cred_part.nonce)
237 outdata->seq = *enc_krb_cred_part.nonce;
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/
H A Dinit_sec_context.c352 unsigned char nonce[8]; local
354 if (RAND_bytes(nonce, sizeof(nonce)) != 1) {
361 ret = heim_ntlm_calculate_ntlm2_sess(nonce,
/freebsd-9.3-release/contrib/bind9/bin/named/
H A Dcontrolconf.c86 isc_uint32_t nonce; member in struct:controlconnection
340 isc_uint32_t nonce; local
435 if (conn->nonce != 0 &&
436 (isccc_cc_lookupuint32(_ctrl, "_nonce", &nonce) != ISC_R_SUCCESS ||
437 conn->nonce != nonce)) {
443 * Establish nonce.
445 while (conn->nonce == 0)
446 isc_random_get(&conn->nonce);
478 isccc_cc_defineuint32(_ctrl, "_nonce", conn->nonce)
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dpkinit.c67 unsigned nonce; member in struct:pk_client_params
580 client_params->nonce = ap.pkAuthenticator.nonce;
611 client_params->nonce = ap.pkAuthenticator.nonce;
730 kp.nonce = client_params->nonce;
888 dh_info.nonce = client_params->nonce;

Completed in 181 milliseconds

123