Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 96) sorted by relevance

1234

/dragonfly/sys/crypto/curve25519/
H A Dcurve25519.h30 const uint8_t secret[CURVE25519_KEY_SIZE]);
33 curve25519_clamp_secret(uint8_t secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret()
35 secret[0] &= 248; in curve25519_clamp_secret()
36 secret[31] = (secret[31] & 127) | 64; in curve25519_clamp_secret()
40 curve25519_generate_secret(uint8_t secret[CURVE25519_KEY_SIZE]) in curve25519_generate_secret()
42 karc4random_buf(secret, CURVE25519_KEY_SIZE); in curve25519_generate_secret()
43 curve25519_clamp_secret(secret); in curve25519_generate_secret()
/dragonfly/contrib/wpa_supplicant/src/radius/
H A Dradius.h240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
273 const u8 *secret, size_t secret_len);
276 const u8 *secret, size_t secret_len);
279 const u8 *secret, size_t secret_len,
286 const u8 *secret, size_t secret_len,
291 const u8 *secret, size_t secret_len);
[all …]
H A Dradius.c370 if (secret) { in radius_msg_finish()
426 addr[3] = secret; in radius_msg_finish_srv()
464 addr[1] = secret; in radius_msg_finish_das_resp()
488 addr[1] = secret; in radius_msg_finish_acct()
509 addr[1] = secret; in radius_msg_finish_acct_resp()
535 addr[3] = secret; in radius_msg_verify_acct_req()
563 addr[3] = secret; in radius_msg_verify_das_req()
874 addr[3] = secret; in radius_msg_verify()
1019 addr[0] = secret; in decrypt_ms_key()
1312 addr[0] = secret; in radius_user_password_hide()
[all …]
/dragonfly/crypto/libressl/ssl/
H A Dtls13_key_schedule.c27 tls13_secret_init(struct tls13_secret *secret, size_t len) in tls13_secret_init() argument
29 if (secret->data != NULL) in tls13_secret_init()
32 if ((secret->data = calloc(1, len)) == NULL) in tls13_secret_init()
34 secret->len = len; in tls13_secret_init()
40 tls13_secret_cleanup(struct tls13_secret *secret) in tls13_secret_cleanup() argument
42 freezero(secret->data, secret->len); in tls13_secret_cleanup()
43 secret->data = NULL; in tls13_secret_cleanup()
44 secret->len = 0; in tls13_secret_cleanup()
159 const struct tls13_secret *secret, const char *label, in tls13_hkdf_expand_label() argument
195 secret->len, hkdf_label, hkdf_label_len); in tls13_hkdf_expand_label_with_length()
[all …]
H A Dt1_enc.c160 tls1_P_hash(const EVP_MD *md, const unsigned char *secret, size_t secret_len, in tls1_P_hash() argument
179 mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, secret, secret_len); in tls1_P_hash()
247 tls1_PRF(SSL *s, const unsigned char *secret, size_t secret_len, in tls1_PRF() argument
266 if (!tls1_P_hash(EVP_md5(), secret, half_len, seed1, seed1_len, in tls1_PRF()
271 secret += secret_len - half_len; in tls1_PRF()
272 if (!tls1_P_hash(EVP_sha1(), secret, half_len, seed1, seed1_len, in tls1_PRF()
280 if (!tls1_P_hash(md, secret, secret_len, seed1, seed1_len, in tls1_PRF()
H A Dtls13_lib.c221 struct tls13_secret *secret; in tls13_phh_update_read_traffic_secret() local
224 secret = &secrets->server_application_traffic; in tls13_phh_update_read_traffic_secret()
228 secret = &secrets->client_application_traffic; in tls13_phh_update_read_traffic_secret()
234 secret, ssl_encryption_application); in tls13_phh_update_read_traffic_secret()
241 struct tls13_secret *secret; in tls13_phh_update_write_traffic_secret() local
244 secret = &secrets->client_application_traffic; in tls13_phh_update_write_traffic_secret()
248 secret = &secrets->server_application_traffic; in tls13_phh_update_write_traffic_secret()
254 secret, ssl_encryption_application); in tls13_phh_update_write_traffic_secret()
/dragonfly/usr.bin/chkey/
H A Dchkey.c80 char secret[HEXKEYBYTES + 1]; in main() local
157 genkeys(public, secret, pass); in main()
159 memcpy(crypt1, secret, HEXKEYBYTES); in main()
160 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main()
168 memcmp(crypt2, secret, HEXKEYBYTES) != 0) in main()
201 if (write(fd, secret, strlen(secret)) < 0 || in main()
207 if (key_setsecret(secret) < 0) in main()
227 setpublicmap(char *name, char *public, char *secret) in setpublicmap() argument
231 sprintf(pkent,"%s:%s", public, secret); in setpublicmap()
/dragonfly/lib/librpcsvc/
H A Dxcrypt.c59 xencrypt(char *secret, char *passwd) in xencrypt() argument
67 len = strlen(secret) / 2; in xencrypt()
71 hex2bin(len, secret, buf); in xencrypt()
80 bin2hex(len, (unsigned char *) buf, secret); in xencrypt()
91 xdecrypt(char *secret, char *passwd) in xdecrypt() argument
99 len = strlen(secret) / 2; in xdecrypt()
103 hex2bin(len, secret, buf); in xdecrypt()
112 bin2hex(len, (unsigned char *) buf, secret); in xdecrypt()
/dragonfly/usr.sbin/keyserv/
H A Dsetkey.c156 BIGNUM *public, *secret, *common; in pk_crypt() local
189 secret = NULL; in pk_crypt()
190 if (BN_hex2bn(&secret, xsecret) == 0) { in pk_crypt()
197 BN_free(secret); in pk_crypt()
206 BN_free(secret); in pk_crypt()
224 BIGNUM *public, *secret, *common; in pk_get_conv_key() local
250 secret = NULL; in pk_get_conv_key()
251 if (BN_hex2bn(&secret, xsecret) == 0) { in pk_get_conv_key()
258 BN_free(secret); in pk_get_conv_key()
268 BN_free(secret); in pk_get_conv_key()
[all …]
/dragonfly/usr.bin/newkey/
H A Dnewkey.c93 char secret[HEXKEYBYTES + 1]; in main() local
132 genkeys(public, secret, pass); in main()
134 memcpy(crypt1, secret, HEXKEYBYTES); in main()
135 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main()
142 memcmp(crypt2, secret, HEXKEYBYTES) != 0) in main()
175 setpublicmap(char *name, char *public, char *secret) in setpublicmap() argument
179 (void)sprintf(pkent, "%s:%s", public, secret); in setpublicmap()
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
H A Dcrypto_wolfssl.c702 byte *secret; in dh5_init_fixed() local
711 if (!secret) in dh5_init_fixed()
744 struct wpabuf *secret; in dh5_derive_shared() local
748 if (!secret) in dh5_derive_shared()
758 ret = secret; in dh5_derive_shared()
759 secret = NULL; in dh5_derive_shared()
761 wpabuf_clear_free(secret); in dh5_derive_shared()
1762 if (!secret) in crypto_ecdh_set_peerkey()
1773 return secret; in crypto_ecdh_set_peerkey()
1775 wpabuf_free(secret); in crypto_ecdh_set_peerkey()
[all …]
H A Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
H A Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
H A Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
H A Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
64 S1 = secret; in tls_prf_sha1_md5()
65 S2 = secret + L_S1; in tls_prf_sha1_md5()
/dragonfly/usr.sbin/ppp/libradius/
H A Dradlib.c119 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in insert_scrambled_password()
151 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in insert_request_authenticator()
167 HMAC_Init_ex(ctx, srvp->secret, strlen(srvp->secret), EVP_md5(), NULL); in insert_message_authenticator()
221 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in is_valid_response()
302 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in is_valid_request()
321 HMAC_Init_ex(hctx, srvp->secret, in is_valid_request()
439 if ((srvp->secret = strdup(secret)) == NULL) { in rad_add_server_ex()
462 memset(h->servers[srv].secret, 0, in rad_close()
464 free(h->servers[srv].secret); in rad_close()
501 const char *secret; in rad_config() local
[all …]
/dragonfly/lib/libtelnet/
H A Dpk.c128 BIGNUM *public, *secret, *common, *modulus; in common_key() local
139 secret = NULL; in common_key()
140 if (BN_hex2bn(&secret, xsecret) == 0) in common_key()
146 BN_mod_exp(common, public, secret, modulus, ctx); in common_key()
151 BN_free(secret); in common_key()
190 genkeys(char *public, char *secret) in genkeys() argument
232 adjust(secret, xkey); in genkeys()
H A Dpk.h56 extern void genkeys(char *public, char *secret);
57 extern void common_key(char *secret, char *public, IdeaData *common,
/dragonfly/crypto/libressl/crypto/hkdf/
H A Dhkdf.c30 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() argument
36 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
49 const EVP_MD *digest, const uint8_t *secret, size_t secret_len, in HKDF_extract() argument
58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
/dragonfly/share/examples/ppp/
H A Dppp.secret.span-isp.working1 # $FreeBSD: src/share/examples/ppp/ppp.secret.span-isp.working,v 1.2 1999/08/28 00:19:32 peter Exp $
2 # $DragonFly: src/share/examples/ppp/ppp.secret.span-isp.working,v 1.2 2003/06/17 04:36:57 dillon E…
4 # This is a working example of ppp.secret.span-isp that uses ppp connections
/dragonfly/games/hack/
H A Dhack.mklev.c133 secret = FALSE; in makelevel()
194 secret = TRUE; in makelevel()
231 xlim = XLIM + secret; in makerooms()
232 ylim = YLIM + secret; in makerooms()
244 if (!secret && nroom > (MAXNROFROOMS / 3) && in makerooms()
256 if (secret) in makerooms()
285 if (secret) in makerooms()
302 xlim = XLIM + secret; in addrs()
303 ylim = YLIM + secret; in addrs()
459 int xlim = XLIM + secret, ylim = YLIM + secret; in maker()
[all …]
/dragonfly/contrib/tcpdump/
H A Dprint-esp.c120 u_char secret[256]; /* is that big enough for all secrets? */ member
207 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL) < 0) { in do_decrypt()
465 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo()
470 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo()
471 memcpy(sa->secret, colon, i); in espprint_decode_encalgo()
474 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo()
475 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
/dragonfly/usr.bin/keylogout/
H A Dkeylogout.c49 static char secret[HEXKEYBYTES + 1]; in main() local
61 if (key_setsecret(secret) < 0) { in main()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
23 addr[1] = secret; in chap_md5()

1234