Searched refs:shared_secret (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-9.3-release/crypto/openssh/
H A Dkexc25519c.c55 Buffer shared_secret; local
96 buffer_init(&shared_secret);
97 kexc25519_shared_key(client_key, server_pubkey, &shared_secret);
109 buffer_ptr(&shared_secret), buffer_len(&shared_secret),
126 buffer_ptr(&shared_secret), buffer_len(&shared_secret));
127 buffer_free(&shared_secret);
H A Dkexc25519s.c52 Buffer shared_secret; local
79 buffer_init(&shared_secret);
80 kexc25519_shared_key(server_key, client_pubkey, &shared_secret);
93 buffer_ptr(&shared_secret), buffer_len(&shared_secret),
123 buffer_ptr(&shared_secret), buffer_len(&shared_secret));
124 buffer_free(&shared_secret);
H A Dkexdhc.c50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
123 if ((shared_secret = BN_new()) == NULL)
125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
139 shared_secret,
158 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
159 BN_clear_free(shared_secret);
H A Dkexdhs.c49 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
109 if ((shared_secret = BN_new()) == NULL)
111 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
127 shared_secret,
157 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
158 BN_clear_free(shared_secret);
H A Dkexecdhc.c55 BIGNUM *shared_secret; local
118 if ((shared_secret = BN_new()) == NULL)
120 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
136 shared_secret,
155 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
156 BN_clear_free(shared_secret);
H A Dkexecdhs.c52 BIGNUM *shared_secret; local
92 /* Calculate shared_secret */
102 if ((shared_secret = BN_new()) == NULL)
104 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
121 shared_secret,
151 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
152 BN_clear_free(shared_secret);
H A Dkexgexc.c52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
161 if ((shared_secret = BN_new()) == NULL)
163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
183 shared_secret,
203 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
204 BN_clear_free(shared_secret);
H A Dkexgexs.c56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
149 if ((shared_secret = BN_new()) == NULL)
151 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
173 shared_secret,
204 kex_derive_keys_bn(kex, hash, hashlen, shared_secret);
205 BN_clear_free(shared_secret);
H A Dkexdh.c51 BIGNUM *shared_secret,
72 buffer_put_bignum2(&b, shared_secret);
43 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexecdh.c60 const BIGNUM *shared_secret,
81 buffer_put_bignum2(&b, shared_secret);
50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexgex.c53 BIGNUM *shared_secret,
83 buffer_put_bignum2(&b, shared_secret);
43 kexgex_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexc25519.c86 const u_char *shared_secret, u_int secretlen,
107 buffer_append(&b, shared_secret, secretlen);
77 kex_c25519_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, u_int secretlen, u_char **hash, u_int *hashlen) argument
H A Dkex.c563 const u_char *shared_secret, u_int slen)
577 buffer_append(&b, shared_secret, slen);
621 const u_char *shared_secret, u_int slen)
628 shared_secret, slen);
646 Buffer shared_secret; local
648 buffer_init(&shared_secret);
649 buffer_put_bignum2(&shared_secret, secret);
651 buffer_ptr(&shared_secret), buffer_len(&shared_secret));
652 buffer_free(&shared_secret);
562 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, const u_char *shared_secret, u_int slen) argument
620 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, const u_char *shared_secret, u_int slen) argument
[all...]
/freebsd-9.3-release/contrib/wpa/src/radius/
H A Dradius_client.h45 * shared_secret - Shared secret for authenticating RADIUS messages
47 u8 *shared_secret; member in struct:hostapd_radius_server
50 * shared_secret_len - Length of shared_secret in octets
247 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_client.c73 const u8 *shared_secret,
134 * shared_secret - Shared secret with the target RADIUS server
136 const u8 *shared_secret; member in struct:radius_msg_list
139 * shared_secret_len - shared_secret length in octets
274 const u8 *shared_secret,
521 const u8 *shared_secret,
544 entry->shared_secret = shared_secret;
632 const u8 *shared_secret; local
651 shared_secret
270 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
518 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
919 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
H A Dradius_server.c92 char *shared_secret; member in struct:radius_client
575 (u8 *) client->shared_secret,
590 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
635 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
935 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
1048 os_free(prev->shared_secret);
1159 entry->shared_secret = os_strdup(pos);
1160 if (entry->shared_secret == NULL) {
1165 entry->shared_secret_len = os_strlen(entry->shared_secret);
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Dikev2.h50 u8 *shared_secret; member in struct:ikev2_responder_data
H A Deap_ikev2.c95 data->ikev2.shared_secret = os_malloc(password_len);
96 if (data->ikev2.shared_secret == NULL)
98 os_memcpy(data->ikev2.shared_secret, password, password_len);
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Dikev2.h49 u8 *shared_secret; member in struct:ikev2_initiator_data
H A Dikev2.c33 os_free(data->shared_secret);
624 &data->keys, 0, data->shared_secret,
1074 &data->keys, 1, data->shared_secret,
1146 os_free(data->shared_secret);
1147 data->shared_secret = os_malloc(16);
1148 if (data->shared_secret == NULL)
1151 if (os_get_random(data->shared_secret, 16))
1154 os_free(data->shared_secret);
1155 data->shared_secret = os_malloc(secret_len);
1156 if (data->shared_secret
[all...]
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Deapol_test.c450 os_free(e->radius_conf->auth_server->shared_secret);
616 const u8 *shared_secret,
621 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
625 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
664 const u8 *shared_secret, size_t shared_secret_len,
679 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
702 ieee802_1x_get_keys(e, msg, req, shared_secret,
756 as->shared_secret = (u8 *) os_strdup(secret);
614 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
663 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dieee802_11_auth.c134 hapd->conf->radius->auth_server->shared_secret,
385 * @shared_secret: RADIUS shared secret
386 * @shared_secret_len: Length of shared_secret in octets
393 const u8 *shared_secret, size_t shared_secret_len,
415 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
392 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Daccounting.c419 * @shared_secret: RADIUS shared secret
420 * @shared_secret_len: Length of shared_secret in octets
426 const u8 *shared_secret, size_t shared_secret_len,
434 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
425 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Dikev2_common.h299 const u8 *shared_secret, size_t shared_secret_len,
H A Dikev2_common.c439 const u8 *shared_secret, size_t shared_secret_len,
451 shared_secret == NULL || nonce == NULL || prf == NULL)
481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument

Completed in 244 milliseconds

12