/openbsd-current/sys/crypto/ |
H A D | curve25519.h | 28 const uint8_t secret[CURVE25519_KEY_SIZE]); 31 curve25519_clamp_secret(uint8_t secret[CURVE25519_KEY_SIZE]) argument 33 secret[0] &= 248; 34 secret[31] = (secret[31] & 127) | 64; 38 curve25519_generate_secret(uint8_t secret[CURVE25519_KEY_SIZE]) argument 40 arc4random_buf(secret, CURVE25519_KEY_SIZE); 41 curve25519_clamp_secret(secret);
|
/openbsd-current/regress/usr.bin/signify/ |
H A D | orders.txt.sig | 1 untrusted comment: signature from signify secret key
|
/openbsd-current/lib/libradius/ |
H A D | radius_mppe.c | 46 size_t plen, const void *ra, const char *secret) 48 size_t slen = strlen(secret); 71 MD5_Update(&ctx, secret, slen); 87 size_t clen, const void *ra, const char *secret) 89 size_t slen = strlen(secret); 106 MD5_Update(&ctx, secret, slen); 127 void *buf, size_t * len, const char *secret) 136 radius_get_request_authenticator_retval(packet), secret) != 0) 143 const void *buf, size_t len, const char *secret) 149 radius_get_request_authenticator_retval(packet), secret) ! 45 radius_encrypt_mppe_key_attr(void *cipher, size_t * clen, const void *plain, size_t plen, const void *ra, const char *secret) argument 86 radius_decrypt_mppe_key_attr(void *plain, size_t * plen, const void *cipher, size_t clen, const void *ra, const char *secret) argument 126 radius_get_mppe_key_attr(const RADIUS_PACKET * packet, uint8_t vtype, void *buf, size_t * len, const char *secret) argument 142 radius_put_mppe_key_attr(RADIUS_PACKET * packet, uint8_t vtype, const void *buf, size_t len, const char *secret) argument 159 radius_get_mppe_send_key_attr(const RADIUS_PACKET * packet, void *buf, size_t * len, const char *secret) argument 167 radius_put_mppe_send_key_attr(RADIUS_PACKET * packet, const void *buf, size_t len, const char *secret) argument 175 radius_get_mppe_recv_key_attr(const RADIUS_PACKET * packet, void *buf, size_t * len, const char *secret) argument 183 radius_put_mppe_recv_key_attr(RADIUS_PACKET * packet, const void *buf, size_t len, const char *secret) argument [all...] |
H A D | radius_eapmsk.c | 38 const char *secret) 49 if (radius_get_mppe_recv_key_attr(packet, buf0, &len0, secret) == 0 && 50 radius_get_mppe_send_key_attr(packet, buf1, &len1, secret) == 0) { 37 radius_get_eap_msk(const RADIUS_PACKET * packet, void *buf, size_t *len, const char *secret) argument
|
H A D | radius_userpass.c | 40 const char *plain, const void *ra, const char *secret) 43 size_t slen = strlen(secret); 57 MD5_Update(&ctx, secret, slen); 73 size_t clen, const void *ra, const char *secret) 75 size_t slen = strlen(secret); 91 MD5_Update(&ctx, secret, slen); 117 size_t len, const char *secret) 126 radius_get_authenticator_retval(packet), secret) != 0) 134 const char *secret) 140 radius_get_authenticator_retval(packet), secret) ! 39 radius_encrypt_user_password_attr(void *cipher, size_t * clen, const char *plain, const void *ra, const char *secret) argument 72 radius_decrypt_user_password_attr(char *plain, size_t plen, const void *cipher, size_t clen, const void *ra, const char *secret) argument 116 radius_get_user_password_attr(const RADIUS_PACKET * packet, char *buf, size_t len, const char *secret) argument 133 radius_put_user_password_attr(RADIUS_PACKET * packet, const char *buf, const char *secret) argument [all...] |
H A D | radius_msgauth.c | 45 radius_calc_message_authenticator(RADIUS_PACKET * packet, const char *secret, argument 60 if (!HMAC_Init_ex(ctx, secret, strlen(secret), EVP_md5(), NULL)) 106 radius_put_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument 119 return (radius_set_message_authenticator(packet, secret)); 123 radius_set_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument 127 if (radius_calc_message_authenticator(packet, secret, ma) != 0) 135 radius_check_message_authenticator(RADIUS_PACKET * packet, const char *secret) argument 141 if (radius_calc_message_authenticator(packet, secret, ma0) != 0)
|
H A D | radius.c | 235 const char *secret) 245 MD5_Update(&ctx, (unsigned char *)secret, strlen(secret)); 251 const RADIUS_PACKET * packet, const char *secret) 254 packet, packet->request->pdata->authenticator, secret); 259 const char *secret) 263 radius_calc_response_authenticator(authenticator, packet, secret); 269 const char *secret) 272 packet, secret); 277 const RADIUS_PACKET * packet, const char *secret) 233 radius_calc_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const uint8_t * authenticator_src, const char *secret) argument 250 radius_calc_response_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const char *secret) argument 258 radius_check_response_authenticator(const RADIUS_PACKET * packet, const char *secret) argument 268 radius_set_response_authenticator(RADIUS_PACKET * packet, const char *secret) argument 276 radius_calc_accounting_request_authenticator(uint8_t * authenticator_dst, const RADIUS_PACKET * packet, const char *secret) argument 287 radius_set_accounting_request_authenticator(RADIUS_PACKET * packet, const char *secret) argument 295 radius_check_accounting_request_authenticator(const RADIUS_PACKET * packet, const char *secret) argument [all...] |
/openbsd-current/libexec/login_token/ |
H A D | token.c | 125 h2cb(tr.secret, &cb); 184 * we have translated out the user's shared secret just in 191 h2cb(tokenrec.secret, &user_seed); 192 explicit_bzero(&tokenrec.secret, sizeof(tokenrec.secret)); 199 * shared secret asap. 257 TOKEN_CBlock secret; local 263 memset(&secret, 0, sizeof(secret)); 266 * If no user secret passe [all...] |
H A D | tokendb.h | 40 * A null byte is required after the share secret field. 45 char secret[16]; /* token shared secret */ member in struct:__anon22
|
/openbsd-current/etc/examples/ |
H A D | radiusd.conf | 7 secret "secret" 13 secret "secret" 20 module set radius secret "testing123"
|
H A D | ripd.conf | 17 auth-key secret
|
H A D | ospfd.conf | 13 # auth-key secret 28 auth-key secret
|
/openbsd-current/lib/libfido2/src/ |
H A D | ecdh.c | 20 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret) argument 27 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, 35 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret) argument 45 if (secret->len > INT_MAX || strlen(info) > INT_MAX) { 58 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 || 80 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret) argument 87 /* use sha256 on the resulting secret */ 90 SHA256(secret 121 fido_blob_t *secret = NULL; local [all...] |
H A D | aes256.c | 65 aes256_cbc_fips(const fido_blob_t *secret, const fido_blob_t *in, argument 73 if (secret->len != 64) { 74 fido_log_debug("%s: invalid secret len %zu", __func__, 75 secret->len); 93 key.ptr = secret->ptr + 32; 94 key.len = secret->len - 32; 188 aes256_cbc_enc(const fido_dev_t *dev, const fido_blob_t *secret, argument 191 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret, 192 in, out, 1) : aes256_cbc_proto1(secret, in, out, 1); 196 aes256_cbc_dec(const fido_dev_t *dev, const fido_blob_t *secret, argument [all...] |
/openbsd-current/usr.sbin/unbound/util/ |
H A D | edns.h | 122 * @param secret: the server secret; implicit length of 16 octets. 127 uint8_t* edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, 144 * @param secret: the server secret; implicit length of 16 octets. 148 void edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, 155 * @param secret: pointer to the server secret. 156 * @param secret_len: the length of the secret. 165 size_t cookie_len, const uint8_t* secret, size_ [all...] |
H A D | edns.c | 135 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, argument 138 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8); 143 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, argument 152 (void)edns_cookie_server_hash(buf, secret, v4, hash); 158 const uint8_t* secret, size_t secret_len, int v4, 180 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash), 157 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, const uint8_t* hash_input, uint32_t now) argument
|
/openbsd-current/sbin/unwind/libunbound/util/ |
H A D | edns.h | 122 * @param secret: the server secret; implicit length of 16 octets. 127 uint8_t* edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, 144 * @param secret: the server secret; implicit length of 16 octets. 148 void edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, 155 * @param secret: pointer to the server secret. 156 * @param secret_len: the length of the secret. 165 size_t cookie_len, const uint8_t* secret, size_ [all...] |
H A D | edns.c | 135 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, argument 138 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8); 143 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, argument 152 (void)edns_cookie_server_hash(buf, secret, v4, hash); 158 const uint8_t* secret, size_t secret_len, int v4, 180 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash), 157 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, const uint8_t* hash_input, uint32_t now) argument
|
/openbsd-current/lib/libcrypto/hkdf/ |
H A D | hkdf.h | 27 * material |secret| with |salt| and |info| using |digest|, and 37 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 42 * initial keying material |secret| and salt |salt| using |digest|, 47 const uint8_t *secret, size_t secret_len,
|
H A D | hkdf.c | 32 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 38 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, 52 const EVP_MD *digest, const uint8_t *secret, size_t secret_len, 61 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == 31 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument 51 HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len) argument
|
/openbsd-current/regress/lib/libc/explicit_bzero/ |
H A D | explicit_bzero.c | 41 static const char secret[16] = { variable 48 SECRETBYTES = SECRETCOUNT * sizeof(secret) 132 ASSERT_EQ(sizeof(secret), write(fds[1], secret, sizeof(secret))); 145 if (memcmp(buf + i * sizeof(secret), secret, 146 sizeof(secret)) == 0) 203 * to count how many instances of secret we found. 208 * *are* able to find at least one instance of the secret dat [all...] |
/openbsd-current/usr.sbin/radiusctl/ |
H A D | parser.h | 49 const char *secret; member in struct:parse_result
|
/openbsd-current/usr.sbin/tokeninit/ |
H A D | tokeninit.c | 66 unsigned char secret[9]; local 80 * valid user shared-secret in memory. 152 explicit_bzero(secret, sizeof(secret)); 153 if (parse_secret(hexformat, seed, secret)) { 155 "%sinit: Invalid secret entered.\n", 160 switch (tokenuserinit(cmd, *argv, secret, modes)) { 186 * Parse the 8 octal numbers or a 16 digit hex string into a token secret 190 parse_secret(int hexformat, char *seed, unsigned char *secret) argument 207 secret[ [all...] |
/openbsd-current/lib/libssl/ |
H A D | tls13_key_schedule.c | 28 tls13_secret_init(struct tls13_secret *secret, size_t len) argument 30 if (secret->data != NULL) 33 if ((secret->data = calloc(1, len)) == NULL) 35 secret->len = len; 41 tls13_secret_cleanup(struct tls13_secret *secret) argument 43 freezero(secret->data, secret->len); 44 secret->data = NULL; 45 secret->len = 0; 160 const struct tls13_secret *secret, cons 159 tls13_hkdf_expand_label(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const char *label, const struct tls13_secret *context) argument 168 tls13_hkdf_expand_label_with_length(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const uint8_t *label, size_t label_len, const struct tls13_secret *context) argument 210 tls13_derive_secret(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const char *label, const struct tls13_secret *context) argument 218 tls13_derive_secret_with_label_length(struct tls13_secret *out, const EVP_MD *digest, const struct tls13_secret *secret, const uint8_t *label, size_t label_len, const struct tls13_secret *context) argument [all...] |
/openbsd-current/libexec/login_radius/ |
H A D | raddauth.c | 93 #define MAXSECRETLEN 128 /* maximum length of secret */ 232 /* get the secret from the servers file */ 473 /* verify server's shared secret */ 481 errx(1, "shared secret incorrect"); 517 * Get the secret from the servers file 523 char *host, *secret, buffer[PATH_MAX]; local 534 secret = NULL; /* Keeps gcc happy */ 544 if ((secret = malloc(len + 1)) == NULL) { 548 memcpy(secret, host, len); 550 host = secret; [all...] |