/freebsd-11-stable/crypto/openssh/ |
H A D | kexc25519c.c | 77 struct sshbuf *shared_secret = NULL; local 121 if ((shared_secret = sshbuf_new()) == NULL) { 126 shared_secret)) < 0) 140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) 168 sshbuf_free(shared_secret);
|
H A D | kexc25519s.c | 60 struct sshbuf *shared_secret = NULL; local 99 if ((shared_secret = sshbuf_new()) == NULL) { 104 shared_secret)) < 0) 121 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), 149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) 157 sshbuf_free(shared_secret);
|
H A D | kexecdhs.c | 69 BIGNUM *shared_secret = NULL; local 124 /* Calculate shared_secret */ 127 (shared_secret = BN_new()) == NULL) { 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 156 shared_secret, 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 201 if (shared_secret) 202 BN_clear_free(shared_secret);
|
H A D | kexdh.c | 54 const BIGNUM *shared_secret, 76 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexecdhc.c | 105 BIGNUM *shared_secret = NULL; local 161 (shared_secret = BN_new()) == NULL) { 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 187 shared_secret, 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 220 if (shared_secret) 221 BN_clear_free(shared_secret);
|
H A D | kexgexs.c | 127 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 179 (shared_secret = BN_new()) == NULL) { 184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 207 shared_secret, 237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 248 if (shared_secret) 249 BN_clear_free(shared_secret);
|
H A D | kexgexc.c | 150 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 206 (shared_secret = BN_new()) == NULL) { 211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 234 shared_secret, 253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 265 if (shared_secret) 266 BN_clear_free(shared_secret);
|
H A D | kexdhs.c | 98 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 150 (shared_secret = BN_new()) == NULL) { 155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 176 shared_secret, 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 218 if (shared_secret) 219 BN_clear_free(shared_secret);
|
H A D | kexdhc.c | 107 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 158 (shared_secret = BN_new()) == NULL) { 163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 182 shared_secret, 201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 213 if (shared_secret) 214 BN_clear_free(shared_secret);
|
H A D | kexecdh.c | 60 const BIGNUM *shared_secret, 82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexgex.c | 57 const BIGNUM *shared_secret, 84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 94 const u_char *shared_secret, size_t secretlen, 116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) { 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | kex.c | 885 const struct sshbuf *shared_secret, u_char **keyp) 904 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || 923 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || 949 const struct sshbuf *shared_secret) 958 shared_secret, &keys[i])) != 0) { 979 struct sshbuf *shared_secret; local 982 if ((shared_secret = sshbuf_new()) == NULL) 984 if ((r = sshbuf_put_bignum2(shared_secret, secret)) == 0) 985 r = kex_derive_keys(ssh, hash, hashlen, shared_secret); 986 sshbuf_free(shared_secret); 884 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret, u_char **keyp) argument 948 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, const struct sshbuf *shared_secret) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.h | 46 const u8 *shared_secret; member in struct:radius_das_conf
|
H A D | radius_client.c | 67 const u8 *shared_secret, 133 * shared_secret - Shared secret with the target RADIUS server 135 const u8 *shared_secret; member in struct:radius_msg_list 138 * shared_secret_len - shared_secret length in octets 285 const u8 *shared_secret, 453 radius_msg_finish_acct(entry->msg, entry->shared_secret, 668 const u8 *shared_secret, 691 entry->shared_secret = shared_secret; 751 const u8 *shared_secret; local 281 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 665 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 1040 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 432 if (radius_msg_verify_das_req(msg, das->shared_secret, 486 if (radius_msg_finish_das_resp(reply, das->shared_secret, 541 if (conf->port == 0 || conf->shared_secret == NULL || 560 das->shared_secret = os_memdup(conf->shared_secret, 562 if (das->shared_secret == NULL) { 596 os_free(das->shared_secret);
|
H A D | radius_server.c | 114 char *shared_secret; member in struct:radius_client 1140 (u8 *) client->shared_secret, 1309 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 1355 (u8 *) client->shared_secret, 1393 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 1438 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 1732 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, 1776 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, 1931 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 2043 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
H A D | ikev2.c | 28 os_free(data->shared_secret); 618 &data->keys, 0, data->shared_secret, 1068 &data->keys, 1, data->shared_secret, 1140 os_free(data->shared_secret); 1141 data->shared_secret = os_malloc(16); 1142 if (data->shared_secret == NULL) 1145 if (random_get_bytes(data->shared_secret, 16)) 1148 os_free(data->shared_secret); 1149 data->shared_secret = os_memdup(secret, secret_len); 1150 if (data->shared_secret [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 413 NULL, 0, sess->shared_secret) < 0) 416 sess->shared_secret, sess->auth_len); 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, 508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, 553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, 724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN);
|
H A D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 172 hapd->conf->radius->auth_server->shared_secret, 438 const u8 *shared_secret, 454 msg, &passphraselen, shared_secret, shared_secret_len, 507 * @shared_secret: RADIUS shared secret 508 * @shared_secret_len: Length of shared_secret in octets 515 const u8 *shared_secret, size_t shared_secret_len, 537 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 584 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 437 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 514 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 671 os_free(e->radius_conf->auth_server->shared_secret); 843 const u8 *shared_secret, 850 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 854 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 901 const u8 *shared_secret, size_t shared_secret_len, 916 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 939 ieee802_1x_get_keys(e, msg, req, shared_secret, 1037 as->shared_secret = (u8 *) os_strdup(secret); 841 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 900 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|