/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | aes-ctr.c | 25 * @nonce: Nonce for counter mode (16 bytes) 30 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 42 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes_wrap.h | 33 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 36 const u8 *nonce, size_t nonce_len, 40 const u8 *nonce, size_t nonce_len,
|
H A D | aes-eax.c | 25 * @nonce: Nonce for counter mode 34 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 59 os_memcpy(buf + 16, nonce, nonce_len); 89 * @nonce: Nonce for counter mode 98 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 123 os_memcpy(buf + 16, nonce, nonce_len);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | umac.h | 68 int umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]); 79 u_char nonce[8]); 122 int umac128_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]);
|
H A D | mac.c | 178 u_char b[4], nonce[8]; local 195 put_u64(nonce, seqno); 197 umac_final(mac->umac_ctx, u.m, nonce); 200 put_u64(nonce, seqno); 202 umac128_final(mac->umac_ctx, u.m, nonce);
|
H A D | umac.c | 221 * xor the appropriate bytes depending on the last bits of nonce. 227 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon4742 239 memset(pc->nonce, 0, sizeof(pc->nonce)); 240 aes_encryption(pc->nonce, pc->cache, pc->prf_key); 243 static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) argument 262 int ndx = nonce[7] & LOW_BIT_MASK; 264 *(UINT32 *)t.tmp_nonce_lo = ((const UINT32 *)nonce)[1]; 267 if ( (((UINT32 *)t.tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) || 268 (((const UINT32 *)nonce)[ 1248 umac_final(struct umac_ctx *ctx, u_char tag[], const u_char nonce[8]) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-digest.in | 173 snonce=`grep server-nonce= sdigest-reply | cut -f2- -d=` 183 --server-nonce="$snonce" \ 189 #echo server-nonce: $snonce 200 --server-nonce="$snonce" \ 221 --server-nonce="$snonce" \ 240 snonce=`grep server-nonce= sdigest-reply | cut -f2- -d=` 250 --client-nonce="$cnonce" \ 251 --server-nonce="$snonce" \ 264 --client-nonce="$cnonce" \ 265 --server-nonce [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 262 os_memset(nonce, 0, 12); 263 os_memcpy(nonce + 12, pchannel, 4); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 274 nonce, sizeof(nonce)); 287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 331 /* nonce++ */ 332 inc_byte_array(nonce, sizeo [all...] |
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_ie.h | 31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
H A D | peerkey_auth.c | 179 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN, 241 kde->nonce, WPA_NONCE_LEN); 254 NULL, kde->nonce, buf, pos - buf, 0, 1, 0); 275 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { 282 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce */ 309 os_memcpy(pos, kde.nonce, WPA_NONCE_LEN);
|
H A D | wpa_auth_ft.c | 337 if (os_get_random(f.nonce, sizeof(f.nonce))) { 339 "nonce"); 347 f.nonce, frame.nonce) < 0) 1399 frame->nonce, f.nonce) < 0) { 1405 wpa_hexdump(MSG_DEBUG, "FT: PMK-R1 pull - nonce", 1406 f.nonce, sizeof(f.nonce)); [all...] |
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ie.h | 31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | tkey.h | 99 dns_name_t *algorithm, isc_buffer_t *nonce, 107 * if 'name' == dns_rootname. If nonce is not NULL, it supplies 168 dst_key_t *key, isc_buffer_t *nonce,
|
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_ocsp.c | 73 static int i2r_ocsp_crlid(X509V3_EXT_METHOD *method, void *nonce, BIO *out, 75 static int i2r_ocsp_acutoff(X509V3_EXT_METHOD *method, void *nonce, BIO *out, 84 static int i2r_ocsp_nonce(X509V3_EXT_METHOD *method, void *nonce, BIO *out, 213 * OCSP nonce. This is needs special treatment because it doesn't have an 261 static int i2r_ocsp_nonce(X509V3_EXT_METHOD *method, void *nonce, BIO *out, argument 266 if (i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0)
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-babel.c | 241 u_short nonce, interval; local 247 nonce = EXTRACT_16BITS(message + 4); 249 printf("%04x %d", nonce, interval); 255 u_short nonce; local 261 nonce = EXTRACT_16BITS(message + 2); 262 printf("%04x", nonce);
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 101 u8 *buf, *pchannel, nonce[16]; local 138 os_memset(nonce, 0, sizeof(nonce)); 140 os_memcpy(pchannel, nonce + 12, 4); 145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 339 u8 *decrypted, nonce[16]; local 371 os_memset(nonce, 0, 12); 372 os_memcpy(nonce + 12, pos, 4); 384 if (aes_128_eax_decrypt(data->tek, nonce, sizeo [all...] |
H A D | eap_server_fast.c | 645 if (os_get_random(binding->nonce, sizeof(binding->nonce)) < 0) { 652 * The nonce in a request MUST have its least significant bit set to 0. 654 binding->nonce[sizeof(binding->nonce) - 1] &= ~0x01; 656 os_memcpy(data->crypto_binding_nonce, binding->nonce, 657 sizeof(binding->nonce)); 674 binding->nonce, sizeof(binding->nonce)); 1185 b->nonce, sizeo [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_tlv_common.h | 82 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
H A D | ikev2_common.h | 300 const u8 *nonce, size_t nonce_len, 318 const u8 *nonce; member in struct:ikev2_payloads
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_in_tkt.c | 127 unsigned nonce, 219 if (nonce != rep->enc_part.nonce) { 429 unsigned nonce, 484 a->req_body.nonce = nonce; 663 unsigned nonce; local 668 krb5_generate_random_block (&nonce, sizeof(nonce)); 669 nonce 120 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_const_pointer keyseed, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument 420 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument [all...] |
H A D | pkinit.c | 295 unsigned nonce, 314 a->pkAuthenticator.nonce = nonce; 471 unsigned nonce, 509 ap.pkAuthenticator.nonce = nonce; 527 ret = build_auth_pack(context, nonce, ctx, ctx->dh, req_body, &ap); 635 unsigned nonce, 691 return pk_mk_padata(context, ctx, req_body, nonce, md); 753 unsigned nonce, 294 build_auth_pack(krb5_context context, unsigned nonce, krb5_pk_init_ctx ctx, DH *dh, const KDC_REQ_BODY *body, AuthPack *a) argument 468 pk_mk_padata(krb5_context context, krb5_pk_init_ctx ctx, const KDC_REQ_BODY *req_body, unsigned nonce, METHOD_DATA *md) argument 632 _krb5_pk_mk_padata(krb5_context context, void *c, const KDC_REQ_BODY *req_body, unsigned nonce, METHOD_DATA *md) argument 751 get_reply_key_win(krb5_context context, const krb5_data *content, unsigned nonce, krb5_keyblock **key) argument 939 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument 1075 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument 1248 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument [all...] |
H A D | rd_cred.c | 236 if(enc_krb_cred_part.nonce) 237 outdata->seq = *enc_krb_cred_part.nonce;
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | init_sec_context.c | 352 unsigned char nonce[8]; local 354 if (RAND_bytes(nonce, sizeof(nonce)) != 1) { 361 ret = heim_ntlm_calculate_ntlm2_sess(nonce,
|
/freebsd-9.3-release/contrib/bind9/bin/named/ |
H A D | controlconf.c | 86 isc_uint32_t nonce; member in struct:controlconnection 340 isc_uint32_t nonce; local 435 if (conn->nonce != 0 && 436 (isccc_cc_lookupuint32(_ctrl, "_nonce", &nonce) != ISC_R_SUCCESS || 437 conn->nonce != nonce)) { 443 * Establish nonce. 445 while (conn->nonce == 0) 446 isc_random_get(&conn->nonce); 478 isccc_cc_defineuint32(_ctrl, "_nonce", conn->nonce) [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | pkinit.c | 67 unsigned nonce; member in struct:pk_client_params 580 client_params->nonce = ap.pkAuthenticator.nonce; 611 client_params->nonce = ap.pkAuthenticator.nonce; 730 kp.nonce = client_params->nonce; 888 dh_info.nonce = client_params->nonce;
|