| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_kdf_test.c | 76 krb5_keyblock key_block; in main() local 89 memset(&key_block, 0, sizeof(key_block)); in main() 130 v_principal, enctype, &as_req, &pk_as_rep, &key_block); in main() 139 if ((key_block.length == sizeof(key1_hex)) && in main() 140 (0 == memcmp(key_block.contents, key1_hex, key_block.length))) { in main() 144 krb5_free_keyblock_contents(context, &key_block); in main() 158 v_principal, enctype, &as_req, &pk_as_rep, &key_block); in main() 167 if ((key_block.length == sizeof(key2_hex)) && in main() 168 (0 == memcmp(key_block.contents, key2_hex, key_block.length))) { in main() 172 krb5_free_keyblock_contents(context, &key_block); in main() [all …]
|
| H A D | pkinit_crypto_openssl.c | 2576 const krb5_data *secret, krb5_keyblock *key_block) in octetstring2key() argument 2616 key_block->magic = 0; in octetstring2key() 2617 key_block->enctype = etype; in octetstring2key() 2623 key_block->length = keylength; in octetstring2key() 2624 key_block->contents = k5alloc(keylength, &retval); in octetstring2key() 2625 if (key_block->contents == NULL) in octetstring2key() 2631 retval = krb5_c_random_to_key(context, etype, &random_data, key_block); in octetstring2key() 2635 TRACE_PKINIT_KDF_OS2K(context, key_block); in octetstring2key() 2642 krb5_free_keyblock_contents(context, key_block); in octetstring2key() 2788 krb5_keyblock *key_block) in pkinit_kdf() argument [all …]
|
| H A D | pkinit_clnt.c | 66 krb5_keyblock *key_block, krb5_enctype etype, krb5_data *); 501 krb5_keyblock *key_block, in pkinit_as_rep_parse() argument 520 assert((as_rep != NULL) && (key_block != NULL)); in pkinit_as_rep_parse() 619 encoded_request, as_rep, key_block); in pkinit_as_rep_parse()
|
| H A D | pkinit_crypto.h | 543 krb5_keyblock *key_block);
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | kerberos5.c | 347 krb5_keyblock *key_block; in kerberos5_is() local 451 &key_block); in kerberos5_is() 462 if (key_block == NULL) { in kerberos5_is() 465 &key_block); in kerberos5_is() 475 if (key_block == NULL) { in kerberos5_is() 492 krb5_free_keyblock(context, key_block); in kerberos5_is() 509 if(key_block->keytype == ETYPE_DES_CBC_MD5 || in kerberos5_is() 510 key_block->keytype == ETYPE_DES_CBC_MD4 || in kerberos5_is() 511 key_block->keytype == ETYPE_DES_CBC_CRC) { in kerberos5_is() 516 skey.data = key_block->keyvalue.data; in kerberos5_is() [all …]
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | kerberos5.c | 304 krb5_keyblock *key_block; in kerberos5_is() local 404 &key_block); in kerberos5_is() 415 if (key_block == NULL) { in kerberos5_is() 418 &key_block); in kerberos5_is() 428 if (key_block == NULL) { in kerberos5_is() 462 if(key_block->keytype == ETYPE_DES_CBC_MD5 || in kerberos5_is() 463 key_block->keytype == ETYPE_DES_CBC_MD4 || in kerberos5_is() 464 key_block->keytype == ETYPE_DES_CBC_CRC) { in kerberos5_is() 469 skey.data = key_block->keyvalue.data; in kerberos5_is() 487 krb5_free_keyblock_contents(context, key_block); in kerberos5_is() [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | bad_dtls_test.c | 58 static unsigned char key_block[104]; variable 59 #define mac_key (key_block + 20) 60 #define dec_key (key_block + 40) 61 #define enc_key (key_block + 56) 580 key_block, sizeof(key_block)); in send_finished()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | s3_enc.c | 115 p = s->s3.tmp.key_block; in ssl3_change_cipher_state() 205 s->s3.tmp.key_block = p; in ssl3_setup_key_block() 215 OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); in ssl3_cleanup_key_block() 216 s->s3.tmp.key_block = NULL; in ssl3_cleanup_key_block()
|
| H A D | s3_msg.c | 23 if (s->s3.tmp.key_block == NULL) { in ssl3_do_change_cipher_spec()
|
| H A D | t1_enc.c | 141 p = s->s3.tmp.key_block; in tls1_change_cipher_state() 302 s->s3.tmp.key_block = p; in tls1_setup_key_block()
|
| H A D | ssl_local.h | 1371 unsigned char *key_block; member
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | tlsv1_server.c | 61 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tlsv1_server_derive_keys() local 90 key_block, key_block_len)) { in tlsv1_server_derive_keys() 95 key_block, key_block_len); in tlsv1_server_derive_keys() 97 pos = key_block; in tlsv1_server_derive_keys()
|
| H A D | tlsv1_client.c | 79 u8 key_block[TLS_MAX_KEY_BLOCK_LEN]; in tls_derive_keys() local 109 key_block, key_block_len)) { in tls_derive_keys() 114 key_block, key_block_len); in tls_derive_keys() 116 pos = key_block; in tls_derive_keys()
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | crypto_module_tests.c | 1013 const u8 key_block[] = { in test_eap_fast() local 1108 buf, sizeof(key_block)) || in test_eap_fast() 1109 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { in test_eap_fast()
|