Searched refs:shared_secret (Results 1 - 25 of 34) sorted by relevance

12

/freebsd-11-stable/crypto/openssh/
H A Dkexc25519c.c77 struct sshbuf *shared_secret = NULL; local
121 if ((shared_secret = sshbuf_new()) == NULL) {
126 shared_secret)) < 0)
140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret),
159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
168 sshbuf_free(shared_secret);
H A Dkexc25519s.c60 struct sshbuf *shared_secret = NULL; local
99 if ((shared_secret = sshbuf_new()) == NULL) {
104 shared_secret)) < 0)
121 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret),
149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
157 sshbuf_free(shared_secret);
H A Dkexecdhs.c69 BIGNUM *shared_secret = NULL; local
124 /* Calculate shared_secret */
127 (shared_secret = BN_new()) == NULL) {
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
156 shared_secret,
187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
201 if (shared_secret)
202 BN_clear_free(shared_secret);
H A Dkexdh.c54 const BIGNUM *shared_secret,
76 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexecdhc.c105 BIGNUM *shared_secret = NULL; local
161 (shared_secret = BN_new()) == NULL) {
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
187 shared_secret,
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
220 if (shared_secret)
221 BN_clear_free(shared_secret);
H A Dkexgexs.c127 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
179 (shared_secret = BN_new()) == NULL) {
184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
207 shared_secret,
237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
248 if (shared_secret)
249 BN_clear_free(shared_secret);
H A Dkexgexc.c150 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
206 (shared_secret = BN_new()) == NULL) {
211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
234 shared_secret,
253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
265 if (shared_secret)
266 BN_clear_free(shared_secret);
H A Dkexdhs.c98 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
150 (shared_secret = BN_new()) == NULL) {
155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
176 shared_secret,
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
218 if (shared_secret)
219 BN_clear_free(shared_secret);
H A Dkexdhc.c107 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
158 (shared_secret = BN_new()) == NULL) {
163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
182 shared_secret,
201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
213 if (shared_secret)
214 BN_clear_free(shared_secret);
H A Dkexecdh.c60 const BIGNUM *shared_secret,
82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexgex.c57 const BIGNUM *shared_secret,
84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexc25519.c94 const u_char *shared_secret, size_t secretlen,
116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) {
85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
H A Dkex.c885 const struct sshbuf *shared_secret, u_char **keyp)
904 ssh_digest_update_buffer(hashctx, shared_secret) != 0 ||
923 ssh_digest_update_buffer(hashctx, shared_secret) != 0 ||
949 const struct sshbuf *shared_secret)
958 shared_secret, &keys[i])) != 0) {
979 struct sshbuf *shared_secret; local
982 if ((shared_secret = sshbuf_new()) == NULL)
984 if ((r = sshbuf_put_bignum2(shared_secret, secret)) == 0)
985 r = kex_derive_keys(ssh, hash, hashlen, shared_secret);
986 sshbuf_free(shared_secret);
884 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret, u_char **keyp) argument
948 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/radius/
H A Dradius_client.h39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_das.h46 const u8 *shared_secret; member in struct:radius_das_conf
H A Dradius_client.c67 const u8 *shared_secret,
133 * shared_secret - Shared secret with the target RADIUS server
135 const u8 *shared_secret; member in struct:radius_msg_list
138 * shared_secret_len - shared_secret length in octets
285 const u8 *shared_secret,
453 radius_msg_finish_acct(entry->msg, entry->shared_secret,
668 const u8 *shared_secret,
691 entry->shared_secret = shared_secret;
751 const u8 *shared_secret; local
281 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
665 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
1040 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
H A Dradius_das.c21 u8 *shared_secret; member in struct:radius_das_data
432 if (radius_msg_verify_das_req(msg, das->shared_secret,
486 if (radius_msg_finish_das_resp(reply, das->shared_secret,
541 if (conf->port == 0 || conf->shared_secret == NULL ||
560 das->shared_secret = os_memdup(conf->shared_secret,
562 if (das->shared_secret == NULL) {
596 os_free(das->shared_secret);
H A Dradius_server.c114 char *shared_secret; member in struct:radius_client
1140 (u8 *) client->shared_secret,
1309 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
1355 (u8 *) client->shared_secret,
1393 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
1438 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
1732 if (radius_msg_verify(msg, (const u8 *) client->shared_secret,
1776 if (radius_msg_verify(msg, (const u8 *) client->shared_secret,
1931 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
2043 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret,
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.h43 u8 *shared_secret; member in struct:ikev2_initiator_data
H A Dikev2.c28 os_free(data->shared_secret);
618 &data->keys, 0, data->shared_secret,
1068 &data->keys, 1, data->shared_secret,
1140 os_free(data->shared_secret);
1141 data->shared_secret = os_malloc(16);
1142 if (data->shared_secret == NULL)
1145 if (random_get_bytes(data->shared_secret, 16))
1148 os_free(data->shared_secret);
1149 data->shared_secret = os_memdup(secret, secret_len);
1150 if (data->shared_secret
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_eke_common.c413 NULL, 0, sess->shared_secret) < 0)
416 sess->shared_secret, sess->auth_len);
460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN);
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dieee802_11_auth.c172 hapd->conf->radius->auth_server->shared_secret,
438 const u8 *shared_secret,
454 msg, &passphraselen, shared_secret, shared_secret_len,
507 * @shared_secret: RADIUS shared secret
508 * @shared_secret_len: Length of shared_secret in octets
515 const u8 *shared_secret, size_t shared_secret_len,
537 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
584 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
437 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
514 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Deapol_test.c671 os_free(e->radius_conf->auth_server->shared_secret);
843 const u8 *shared_secret,
850 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
854 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
901 const u8 *shared_secret, size_t shared_secret_len,
916 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
939 ieee802_1x_get_keys(e, msg, req, shared_secret,
1037 as->shared_secret = (u8 *) os_strdup(secret);
841 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
900 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument

Completed in 149 milliseconds

12