Searched refs:secret (Results 1 - 25 of 107) sorted by relevance

12345

/openbsd-current/sys/crypto/
H A Dcurve25519.h28 const uint8_t secret[CURVE25519_KEY_SIZE]);
31 curve25519_clamp_secret(uint8_t secret[CURVE25519_KEY_SIZE]) argument
33 secret[0] &= 248;
34 secret[31] = (secret[31] & 127) | 64;
38 curve25519_generate_secret(uint8_t secret[CURVE25519_KEY_SIZE]) argument
40 arc4random_buf(secret, CURVE25519_KEY_SIZE);
41 curve25519_clamp_secret(secret);
/openbsd-current/regress/usr.bin/signify/
H A Dorders.txt.sig1 untrusted comment: signature from signify secret key
/openbsd-current/lib/libradius/
H A Dradius_mppe.c46 size_t plen, const void *ra, const char *secret)
48 size_t slen = strlen(secret);
71 MD5_Update(&ctx, secret, slen);
87 size_t clen, const void *ra, const char *secret)
89 size_t slen = strlen(secret);
106 MD5_Update(&ctx, secret, slen);
127 void *buf, size_t * len, const char *secret)
136 radius_get_request_authenticator_retval(packet), secret) != 0)
143 const void *buf, size_t len, const char *secret)
149 radius_get_request_authenticator_retval(packet), secret) !
45 radius_encrypt_mppe_key_attr(void *cipher, size_t * clen, const void *plain, size_t plen, const void *ra, const char *secret) argument
86 radius_decrypt_mppe_key_attr(void *plain, size_t * plen, const void *cipher, size_t clen, const void *ra, const char *secret) argument
126 radius_get_mppe_key_attr(const RADIUS_PACKET * packet, uint8_t vtype, void *buf, size_t * len, const char *secret) argument
142 radius_put_mppe_key_attr(RADIUS_PACKET * packet, uint8_t vtype, const void *buf, size_t len, const char *secret) argument
159 radius_get_mppe_send_key_attr(const RADIUS_PACKET * packet, void *buf, size_t * len, const char *secret) argument
167 radius_put_mppe_send_key_attr(RADIUS_PACKET * packet, const void *buf, size_t len, const char *secret) argument
175 radius_get_mppe_recv_key_attr(const RADIUS_PACKET * packet, void *buf, size_t * len, const char *secret) argument
183 radius_put_mppe_recv_key_attr(RADIUS_PACKET * packet, const void *buf, size_t len, const char *secret) argument
[all...]
H A Dradius_eapmsk.c38 const char *secret)
49 if (radius_get_mppe_recv_key_attr(packet, buf0, &len0, secret) == 0 &&
50 radius_get_mppe_send_key_attr(packet, buf1, &len1, secret) == 0) {
37 radius_get_eap_msk(const RADIUS_PACKET * packet, void *buf, size_t *len, const char *secret) argument
H A Dradius_userpass.c40 const char *plain, const void *ra, const char *secret)
43 size_t slen = strlen(secret);
57 MD5_Update(&ctx, secret, slen);
73 size_t clen, const void *ra, const char *secret)
75 size_t slen = strlen(secret);
91 MD5_Update(&ctx, secret, slen);
117 size_t len, const char *secret)
126 radius_get_authenticator_retval(packet), secret) != 0)
134 const char *secret)
140 radius_get_authenticator_retval(packet), secret) !
39 radius_encrypt_user_password_attr(void *cipher, size_t * clen, const char *plain, const void *ra, const char *secret) argument
72 radius_decrypt_user_password_attr(char *plain, size_t plen, const void *cipher, size_t clen, const void *ra, const char *secret) argument
116 radius_get_user_password_attr(const RADIUS_PACKET * packet, char *buf, size_t len, const char *secret) argument
133 radius_put_user_password_attr(RADIUS_PACKET * packet, const char *buf, const char *secret) argument
[all...]
H A Dradius_msgauth.c45 radius_calc_message_authenticator(RADIUS_PACKET * packet, const char *secret, argument
60 if (!HMAC_Init_ex(ctx, secret, strlen(secret), EVP_md5(), NULL))
106 radius_put_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument
119 return (radius_set_message_authenticator(packet, secret));
123 radius_set_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument
127 if (radius_calc_message_authenticator(packet, secret, ma) != 0)
135 radius_check_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument
141 if (radius_calc_message_authenticator(packet, secret, ma0) != 0)
H A Dradius.c235 const char *secret)
245 MD5_Update(&ctx, (unsigned char *)secret, strlen(secret));
251 const RADIUS_PACKET * packet, const char *secret)
254 packet, packet->request->pdata->authenticator, secret);
259 const char *secret)
263 radius_calc_response_authenticator(authenticator, packet, secret);
269 const char *secret)
272 packet, secret);
277 const RADIUS_PACKET * packet, const char *secret)
233 radius_calc_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const uint8_t * authenticator_src, const char *secret) argument
250 radius_calc_response_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const char *secret) argument
258 radius_check_response_authenticator(const RADIUS_PACKET * packet, const char *secret) argument
268 radius_set_response_authenticator(RADIUS_PACKET * packet, const char *secret) argument
276 radius_calc_accounting_request_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const char *secret) argument
287 radius_set_accounting_request_authenticator(RADIUS_PACKET * packet, const char *secret) argument
295 radius_check_accounting_request_authenticator(const RADIUS_PACKET * packet, const char *secret) argument
[all...]
/openbsd-current/libexec/login_token/
H A Dtoken.c125 h2cb(tr.secret, &cb);
184 * we have translated out the user's shared secret just in
191 h2cb(tokenrec.secret, &user_seed);
192 explicit_bzero(&tokenrec.secret, sizeof(tokenrec.secret));
199 * shared secret asap.
257 TOKEN_CBlock secret; local
263 memset(&secret, 0, sizeof(secret));
266 * If no user secret passe
[all...]
H A Dtokendb.h40 * A null byte is required after the share secret field.
45 char secret[16]; /* token shared secret */ member in struct:__anon22
/openbsd-current/etc/examples/
H A Dradiusd.conf7 secret "secret"
13 secret "secret"
20 module set radius secret "testing123"
H A Dripd.conf17 auth-key secret
H A Dospfd.conf13 # auth-key secret
28 auth-key secret
/openbsd-current/lib/libfido2/src/
H A Decdh.c20 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret) argument
27 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt,
35 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret) argument
45 if (secret->len > INT_MAX || strlen(info) > INT_MAX) {
58 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 ||
80 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret) argument
87 /* use sha256 on the resulting secret */
90 SHA256(secret
121 fido_blob_t *secret = NULL; local
[all...]
H A Daes256.c65 aes256_cbc_fips(const fido_blob_t *secret, const fido_blob_t *in, argument
73 if (secret->len != 64) {
74 fido_log_debug("%s: invalid secret len %zu", __func__,
75 secret->len);
93 key.ptr = secret->ptr + 32;
94 key.len = secret->len - 32;
188 aes256_cbc_enc(const fido_dev_t *dev, const fido_blob_t *secret, argument
191 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret,
192 in, out, 1) : aes256_cbc_proto1(secret, in, out, 1);
196 aes256_cbc_dec(const fido_dev_t *dev, const fido_blob_t *secret, argument
[all...]
/openbsd-current/usr.sbin/unbound/util/
H A Dedns.h122 * @param secret: the server secret; implicit length of 16 octets.
127 uint8_t* edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret,
144 * @param secret: the server secret; implicit length of 16 octets.
148 void edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4,
155 * @param secret: pointer to the server secret.
156 * @param secret_len: the length of the secret.
165 size_t cookie_len, const uint8_t* secret, size_
[all...]
H A Dedns.c135 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, argument
138 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8);
143 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, argument
152 (void)edns_cookie_server_hash(buf, secret, v4, hash);
158 const uint8_t* secret, size_t secret_len, int v4,
180 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash),
157 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, const uint8_t* hash_input, uint32_t now) argument
/openbsd-current/sbin/unwind/libunbound/util/
H A Dedns.h122 * @param secret: the server secret; implicit length of 16 octets.
127 uint8_t* edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret,
144 * @param secret: the server secret; implicit length of 16 octets.
148 void edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4,
155 * @param secret: pointer to the server secret.
156 * @param secret_len: the length of the secret.
165 size_t cookie_len, const uint8_t* secret, size_
[all...]
H A Dedns.c135 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, argument
138 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8);
143 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, argument
152 (void)edns_cookie_server_hash(buf, secret, v4, hash);
158 const uint8_t* secret, size_t secret_len, int v4,
180 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash),
157 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, const uint8_t* hash_input, uint32_t now) argument
/openbsd-current/lib/libcrypto/hkdf/
H A Dhkdf.h27 * material |secret| with |salt| and |info| using |digest|, and
37 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
42 * initial keying material |secret| and salt |salt| using |digest|,
47 const uint8_t *secret, size_t secret_len,
H A Dhkdf.c32 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
38 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt,
52 const EVP_MD *digest, const uint8_t *secret, size_t secret_len,
61 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) ==
31 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
51 HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len) argument
/openbsd-current/regress/lib/libc/explicit_bzero/
H A Dexplicit_bzero.c41 static const char secret[16] = { variable
48 SECRETBYTES = SECRETCOUNT * sizeof(secret)
132 ASSERT_EQ(sizeof(secret), write(fds[1], secret, sizeof(secret)));
145 if (memcmp(buf + i * sizeof(secret), secret,
146 sizeof(secret)) == 0)
203 * to count how many instances of secret we found.
208 * *are* able to find at least one instance of the secret dat
[all...]
/openbsd-current/usr.sbin/radiusctl/
H A Dparser.h49 const char *secret; member in struct:parse_result
/openbsd-current/usr.sbin/tokeninit/
H A Dtokeninit.c66 unsigned char secret[9]; local
80 * valid user shared-secret in memory.
152 explicit_bzero(secret, sizeof(secret));
153 if (parse_secret(hexformat, seed, secret)) {
155 "%sinit: Invalid secret entered.\n",
160 switch (tokenuserinit(cmd, *argv, secret, modes)) {
186 * Parse the 8 octal numbers or a 16 digit hex string into a token secret
190 parse_secret(int hexformat, char *seed, unsigned char *secret) argument
207 secret[
[all...]
/openbsd-current/lib/libssl/
H A Dtls13_key_schedule.c28 tls13_secret_init(struct tls13_secret *secret, size_t len) argument
30 if (secret->data != NULL)
33 if ((secret->data = calloc(1, len)) == NULL)
35 secret->len = len;
41 tls13_secret_cleanup(struct tls13_secret *secret) argument
43 freezero(secret->data, secret->len);
44 secret->data = NULL;
45 secret->len = 0;
160 const struct tls13_secret *secret, cons
159 tls13_hkdf_expand_label(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const char *label, const struct tls13_secret *context) argument
168 tls13_hkdf_expand_label_with_length(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const uint8_t *label, size_t label_len, const struct tls13_secret *context) argument
210 tls13_derive_secret(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const char *label, const struct tls13_secret *context) argument
218 tls13_derive_secret_with_label_length(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const uint8_t *label, size_t label_len, const struct tls13_secret *context) argument
[all...]
/openbsd-current/libexec/login_radius/
H A Draddauth.c93 #define MAXSECRETLEN 128 /* maximum length of secret */
232 /* get the secret from the servers file */
473 /* verify server's shared secret */
481 errx(1, "shared secret incorrect");
517 * Get the secret from the servers file
523 char *host, *secret, buffer[PATH_MAX]; local
534 secret = NULL; /* Keeps gcc happy */
544 if ((secret = malloc(len + 1)) == NULL) {
548 memcpy(secret, host, len);
550 host = secret;
[all...]

Completed in 303 milliseconds

12345