/dragonfly/sys/crypto/curve25519/ |
H A D | curve25519.h | 30 const uint8_t secret[CURVE25519_KEY_SIZE]); 33 curve25519_clamp_secret(uint8_t secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() 35 secret[0] &= 248; in curve25519_clamp_secret() 36 secret[31] = (secret[31] & 127) | 64; in curve25519_clamp_secret() 40 curve25519_generate_secret(uint8_t secret[CURVE25519_KEY_SIZE]) in curve25519_generate_secret() 42 karc4random_buf(secret, CURVE25519_KEY_SIZE); in curve25519_generate_secret() 43 curve25519_clamp_secret(secret); in curve25519_generate_secret()
|
/dragonfly/contrib/wpa_supplicant/src/radius/ |
H A D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_t secret_len); 276 const u8 *secret, size_t secret_len); 279 const u8 *secret, size_t secret_len, 286 const u8 *secret, size_t secret_len, 291 const u8 *secret, size_t secret_len); [all …]
|
H A D | radius.c | 370 if (secret) { in radius_msg_finish() 426 addr[3] = secret; in radius_msg_finish_srv() 464 addr[1] = secret; in radius_msg_finish_das_resp() 488 addr[1] = secret; in radius_msg_finish_acct() 509 addr[1] = secret; in radius_msg_finish_acct_resp() 535 addr[3] = secret; in radius_msg_verify_acct_req() 563 addr[3] = secret; in radius_msg_verify_das_req() 874 addr[3] = secret; in radius_msg_verify() 1019 addr[0] = secret; in decrypt_ms_key() 1312 addr[0] = secret; in radius_user_password_hide() [all …]
|
/dragonfly/crypto/libressl/ssl/ |
H A D | tls13_key_schedule.c | 27 tls13_secret_init(struct tls13_secret *secret, size_t len) in tls13_secret_init() argument 29 if (secret->data != NULL) in tls13_secret_init() 32 if ((secret->data = calloc(1, len)) == NULL) in tls13_secret_init() 34 secret->len = len; in tls13_secret_init() 40 tls13_secret_cleanup(struct tls13_secret *secret) in tls13_secret_cleanup() argument 42 freezero(secret->data, secret->len); in tls13_secret_cleanup() 43 secret->data = NULL; in tls13_secret_cleanup() 44 secret->len = 0; in tls13_secret_cleanup() 159 const struct tls13_secret *secret, const char *label, in tls13_hkdf_expand_label() argument 195 secret->len, hkdf_label, hkdf_label_len); in tls13_hkdf_expand_label_with_length() [all …]
|
H A D | t1_enc.c | 160 tls1_P_hash(const EVP_MD *md, const unsigned char *secret, size_t secret_len, in tls1_P_hash() argument 179 mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, secret, secret_len); in tls1_P_hash() 247 tls1_PRF(SSL *s, const unsigned char *secret, size_t secret_len, in tls1_PRF() argument 266 if (!tls1_P_hash(EVP_md5(), secret, half_len, seed1, seed1_len, in tls1_PRF() 271 secret += secret_len - half_len; in tls1_PRF() 272 if (!tls1_P_hash(EVP_sha1(), secret, half_len, seed1, seed1_len, in tls1_PRF() 280 if (!tls1_P_hash(md, secret, secret_len, seed1, seed1_len, in tls1_PRF()
|
H A D | tls13_lib.c | 221 struct tls13_secret *secret; in tls13_phh_update_read_traffic_secret() local 224 secret = &secrets->server_application_traffic; in tls13_phh_update_read_traffic_secret() 228 secret = &secrets->client_application_traffic; in tls13_phh_update_read_traffic_secret() 234 secret, ssl_encryption_application); in tls13_phh_update_read_traffic_secret() 241 struct tls13_secret *secret; in tls13_phh_update_write_traffic_secret() local 244 secret = &secrets->client_application_traffic; in tls13_phh_update_write_traffic_secret() 248 secret = &secrets->server_application_traffic; in tls13_phh_update_write_traffic_secret() 254 secret, ssl_encryption_application); in tls13_phh_update_write_traffic_secret()
|
/dragonfly/usr.bin/chkey/ |
H A D | chkey.c | 80 char secret[HEXKEYBYTES + 1]; in main() local 157 genkeys(public, secret, pass); in main() 159 memcpy(crypt1, secret, HEXKEYBYTES); in main() 160 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main() 168 memcmp(crypt2, secret, HEXKEYBYTES) != 0) in main() 201 if (write(fd, secret, strlen(secret)) < 0 || in main() 207 if (key_setsecret(secret) < 0) in main() 227 setpublicmap(char *name, char *public, char *secret) in setpublicmap() argument 231 sprintf(pkent,"%s:%s", public, secret); in setpublicmap()
|
/dragonfly/lib/librpcsvc/ |
H A D | xcrypt.c | 59 xencrypt(char *secret, char *passwd) in xencrypt() argument 67 len = strlen(secret) / 2; in xencrypt() 71 hex2bin(len, secret, buf); in xencrypt() 80 bin2hex(len, (unsigned char *) buf, secret); in xencrypt() 91 xdecrypt(char *secret, char *passwd) in xdecrypt() argument 99 len = strlen(secret) / 2; in xdecrypt() 103 hex2bin(len, secret, buf); in xdecrypt() 112 bin2hex(len, (unsigned char *) buf, secret); in xdecrypt()
|
/dragonfly/usr.sbin/keyserv/ |
H A D | setkey.c | 156 BIGNUM *public, *secret, *common; in pk_crypt() local 189 secret = NULL; in pk_crypt() 190 if (BN_hex2bn(&secret, xsecret) == 0) { in pk_crypt() 197 BN_free(secret); in pk_crypt() 206 BN_free(secret); in pk_crypt() 224 BIGNUM *public, *secret, *common; in pk_get_conv_key() local 250 secret = NULL; in pk_get_conv_key() 251 if (BN_hex2bn(&secret, xsecret) == 0) { in pk_get_conv_key() 258 BN_free(secret); in pk_get_conv_key() 268 BN_free(secret); in pk_get_conv_key() [all …]
|
/dragonfly/usr.bin/newkey/ |
H A D | newkey.c | 93 char secret[HEXKEYBYTES + 1]; in main() local 132 genkeys(public, secret, pass); in main() 134 memcpy(crypt1, secret, HEXKEYBYTES); in main() 135 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main() 142 memcmp(crypt2, secret, HEXKEYBYTES) != 0) in main() 175 setpublicmap(char *name, char *public, char *secret) in setpublicmap() argument 179 (void)sprintf(pkent, "%s:%s", public, secret); in setpublicmap()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
H A D | crypto_wolfssl.c | 702 byte *secret; in dh5_init_fixed() local 711 if (!secret) in dh5_init_fixed() 744 struct wpabuf *secret; in dh5_derive_shared() local 748 if (!secret) in dh5_derive_shared() 758 ret = secret; in dh5_derive_shared() 759 secret = NULL; in dh5_derive_shared() 761 wpabuf_clear_free(secret); in dh5_derive_shared() 1762 if (!secret) in crypto_ecdh_set_peerkey() 1773 return secret; in crypto_ecdh_set_peerkey() 1775 wpabuf_free(secret); in crypto_ecdh_set_peerkey() [all …]
|
H A D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
H A D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
H A D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 64 S1 = secret; in tls_prf_sha1_md5() 65 S2 = secret + L_S1; in tls_prf_sha1_md5()
|
/dragonfly/usr.sbin/ppp/libradius/ |
H A D | radlib.c | 119 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in insert_scrambled_password() 151 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in insert_request_authenticator() 167 HMAC_Init_ex(ctx, srvp->secret, strlen(srvp->secret), EVP_md5(), NULL); in insert_message_authenticator() 221 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in is_valid_response() 302 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); in is_valid_request() 321 HMAC_Init_ex(hctx, srvp->secret, in is_valid_request() 439 if ((srvp->secret = strdup(secret)) == NULL) { in rad_add_server_ex() 462 memset(h->servers[srv].secret, 0, in rad_close() 464 free(h->servers[srv].secret); in rad_close() 501 const char *secret; in rad_config() local [all …]
|
/dragonfly/lib/libtelnet/ |
H A D | pk.c | 128 BIGNUM *public, *secret, *common, *modulus; in common_key() local 139 secret = NULL; in common_key() 140 if (BN_hex2bn(&secret, xsecret) == 0) in common_key() 146 BN_mod_exp(common, public, secret, modulus, ctx); in common_key() 151 BN_free(secret); in common_key() 190 genkeys(char *public, char *secret) in genkeys() argument 232 adjust(secret, xkey); in genkeys()
|
H A D | pk.h | 56 extern void genkeys(char *public, char *secret); 57 extern void common_key(char *secret, char *public, IdeaData *common,
|
/dragonfly/crypto/libressl/crypto/hkdf/ |
H A D | hkdf.c | 30 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() argument 36 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 49 const EVP_MD *digest, const uint8_t *secret, size_t secret_len, in HKDF_extract() argument 58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
|
/dragonfly/share/examples/ppp/ |
H A D | ppp.secret.span-isp.working | 1 # $FreeBSD: src/share/examples/ppp/ppp.secret.span-isp.working,v 1.2 1999/08/28 00:19:32 peter Exp $ 2 # $DragonFly: src/share/examples/ppp/ppp.secret.span-isp.working,v 1.2 2003/06/17 04:36:57 dillon E… 4 # This is a working example of ppp.secret.span-isp that uses ppp connections
|
/dragonfly/games/hack/ |
H A D | hack.mklev.c | 133 secret = FALSE; in makelevel() 194 secret = TRUE; in makelevel() 231 xlim = XLIM + secret; in makerooms() 232 ylim = YLIM + secret; in makerooms() 244 if (!secret && nroom > (MAXNROFROOMS / 3) && in makerooms() 256 if (secret) in makerooms() 285 if (secret) in makerooms() 302 xlim = XLIM + secret; in addrs() 303 ylim = YLIM + secret; in addrs() 459 int xlim = XLIM + secret, ylim = YLIM + secret; in maker() [all …]
|
/dragonfly/contrib/tcpdump/ |
H A D | print-esp.c | 120 u_char secret[256]; /* is that big enough for all secrets? */ member 207 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL) < 0) { in do_decrypt() 465 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo() 470 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo() 471 memcpy(sa->secret, colon, i); in espprint_decode_encalgo() 474 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo() 475 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
|
/dragonfly/usr.bin/keylogout/ |
H A D | keylogout.c | 49 static char secret[HEXKEYBYTES + 1]; in main() local 61 if (key_setsecret(secret) < 0) { in main()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 23 addr[1] = secret; in chap_md5()
|