/freebsd/sys/contrib/libsodium/test/default/ |
H A D | kdf.c | 8 unsigned char *master_key; in tv_kdf() local 16 master_key = (unsigned char *) sodium_malloc(crypto_kdf_KEYBYTES); in tv_kdf() 20 master_key[i] = i; in tv_kdf() 25 i, context, master_key); in tv_kdf() 35 i, context, master_key) == 0) { in tv_kdf() 45 sodium_free(master_key); in tv_kdf()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 22 ASN1_OCTET_STRING *master_key; member 54 ASN1_SIMPLE(SSL_SESSION_ASN1, master_key, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 157 ssl_session_oinit(&as.master_key, &master_key, in i2d_SSL_SESSION() 158 in->master_key, in->master_key_length); in i2d_SSL_SESSION() 298 if (!ssl_session_memcpy(ret->master_key, &tmpl, in d2i_SSL_SESSION() 299 as->master_key, TLS13_MAX_RESUMPTION_PSK_LENGTH)) in d2i_SSL_SESSION()
|
H A D | ssl_txt.c | 81 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) in SSL_SESSION_print() 193 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) in SSL_SESSION_print_keylog()
|
H A D | t1_enc.c | 95 NULL, 0, NULL, 0, s->session->master_key, in tls1_generate_key_block() 516 s->session->master_key, in tls1_setup_key_block() 573 s->session->master_key, s->session->master_key_length, in tls1_final_finish_mac() 637 s->session->master_key, in tls1_generate_master_secret() 712 s->session->master_key, s->session->master_key_length, in tls1_export_keying_material()
|
H A D | s3_enc.c | 52 || !EVP_DigestUpdate(s1, s->session->master_key, in ssl3_generate_key_block() 58 || !EVP_DigestUpdate(m5, s->session->master_key, in ssl3_generate_key_block() 415 (void *)session->master_key, in ssl3_digest_master_key_set_params()
|
H A D | ssl_sess.c | 875 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); in SSL_SESSION_free()
|
H A D | ssl_lib.c | 4542 memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key() 4549 if (len > sizeof(sess->master_key)) in SSL_SESSION_set1_master_key() 4552 memcpy(sess->master_key, in, len); in SSL_SESSION_set1_master_key()
|
H A D | s3_lib.c | 4636 s->session->master_key, pskpms, pskpmslen, in ssl_generate_master_secret() 4649 s->session->master_key, pms, pmslen, in ssl_generate_master_secret()
|
H A D | ssl_local.h | 565 unsigned char master_key[TLS13_MAX_RESUMPTION_PSK_LENGTH]; member
|
/freebsd/crypto/heimdal/kdc/ |
H A D | set_dbinfo.c | 40 const char *conf, const char *master_key) in add_db() argument 58 if (master_key) { in add_db() 59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key); in add_db()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 42 u8 *master_key) in mschapv2_derive_response() argument 103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response() 106 master_key, MSCHAPV2_MASTER_KEY_LEN); in mschapv2_derive_response()
|
H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member 214 data->auth_response, data->master_key)) { in eap_mschapv2_challenge_reply() 623 data->master_key)) { in eap_mschapv2_change_password() 879 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey() 881 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
H A D | mschapv2.h | 24 u8 *master_key);
|
H A D | eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member 600 data->master_key)) { in eap_ttls_phase2_request_mschapv2()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 326 u8 *master_key) in get_master_key() argument 343 os_memcpy(master_key, hash, 16); in get_master_key() 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, in get_asymetric_start_key() argument 400 addr[0] = master_key; in get_asymetric_start_key()
|
H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
H A D | crypto_module_tests.c | 2505 u8 master_key[] = { in test_ms_funcs() local 2550 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { in test_ms_funcs() 2555 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key), in test_ms_funcs()
|
H A D | tls_wolfssl.c | 2078 byte *master_key; in tls_connection_get_eap_fast_key() local 2097 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, in tls_connection_get_eap_fast_key() 2103 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2113 ret = tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2119 forced_memzero(master_key, master_key_len); in tls_connection_get_eap_fast_key()
|
H A D | tls_openssl.c | 117 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key() 4430 unsigned char master_key[64]; in tls_connection_get_eap_fast_key() local 4466 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key() 4467 sizeof(master_key)); in tls_connection_get_eap_fast_key() 4473 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4477 } else if (tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4482 forced_memzero(master_key, sizeof(master_key)); in tls_connection_get_eap_fast_key()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member 441 data->master_key)) { in eap_mschapv2_process_response() 447 data->master_key, MSCHAPV2_KEY_LEN); in eap_mschapv2_process_response() 576 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey() 578 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 337 s->session->master_key) <= 0 in tls_construct_cert_verify() 531 s->session->master_key) <= 0) { in tls_process_cert_verify() 620 s->session->master_key, in tls_construct_finished()
|
H A D | statem_clnt.c | 1539 master_key_length = sizeof(s->session->master_key); in tls_process_server_hello() 1540 if (s->ext.session_secret_cb(s, s->session->master_key, in tls_process_server_hello() 2610 s->session->master_key, in tls_process_new_session_ticket()
|
H A D | statem_srvr.c | 1895 master_key_length = sizeof(s->session->master_key); in tls_early_post_process_client_hello() 1896 if (s->ext.session_secret_cb(s, s->session->master_key, in tls_early_post_process_client_hello() 3961 s->session->master_key, in tls_construct_new_session_ticket()
|
H A D | extensions.c | 1519 if (!tls13_generate_secret(s, md, NULL, sess->master_key, in tls_psk_do_binder()
|