| /freebsd/sys/contrib/libsodium/test/default/ |
| H A D | kdf.c | 8 unsigned char *master_key; in tv_kdf() local 16 master_key = (unsigned char *) sodium_malloc(crypto_kdf_KEYBYTES); in tv_kdf() 20 master_key[i] = i; in tv_kdf() 25 i, context, master_key); in tv_kdf() 35 i, context, master_key) == 0) { in tv_kdf() 45 sodium_free(master_key); in tv_kdf()
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | set_dbinfo.c | 40 const char *conf, const char *master_key) in add_db() argument 58 if (master_key) { in add_db() 59 ret = hdb_set_master_keyfile(context, c->db[c->num_db - 1], master_key); in add_db()
|
| /freebsd/contrib/wpa/src/eap_peer/ |
| H A D | mschapv2.c | 42 u8 *master_key) in mschapv2_derive_response() argument 103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response() 106 master_key, MSCHAPV2_MASTER_KEY_LEN); in mschapv2_derive_response()
|
| H A D | eap_mschapv2.c | 93 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; member 214 data->auth_response, data->master_key)) { in eap_mschapv2_challenge_reply() 623 data->master_key)) { in eap_mschapv2_change_password() 879 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey() 881 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
| H A D | mschapv2.h | 24 u8 *master_key);
|
| H A D | eap_ttls.c | 53 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ member 600 data->master_key)) { in eap_ttls_phase2_request_mschapv2()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_asn1.c | 23 ASN1_OCTET_STRING *master_key; member 56 ASN1_SIMPLE(SSL_SESSION_ASN1, master_key, ASN1_OCTET_STRING), 116 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 162 ssl_session_oinit(&as.master_key, &master_key, in i2d_SSL_SESSION() 163 in->master_key, in->master_key_length); in i2d_SSL_SESSION() 318 if (!ssl_session_memcpy(ret->master_key, &tmpl, in d2i_SSL_SESSION_ex() 319 as->master_key, TLS13_MAX_RESUMPTION_PSK_LENGTH)) in d2i_SSL_SESSION_ex()
|
| H A D | t1_enc.c | 99 NULL, 0, NULL, 0, s->session->master_key, in tls1_generate_key_block() 313 s->session->master_key, in tls1_setup_key_block() 356 s->session->master_key, s->session->master_key_length, in tls1_final_finish_mac() 424 s->session->master_key, in tls1_generate_master_secret() 514 s->session->master_key, s->session->master_key_length, in tls1_export_keying_material()
|
| H A D | ssl_txt.c | 86 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) in SSL_SESSION_print() 205 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) in SSL_SESSION_print_keylog()
|
| H A D | s3_enc.c | 54 || !EVP_DigestUpdate(s1, s->session->master_key, in ssl3_generate_key_block() 60 || !EVP_DigestUpdate(m5, s->session->master_key, in ssl3_generate_key_block() 316 (void *)session->master_key, in ssl3_digest_master_key_set_params()
|
| H A D | ssl_sess.c | 858 OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); in SSL_SESSION_free()
|
| H A D | s3_lib.c | 5242 s->session->master_key, pskpms, pskpmslen, in ssl_generate_master_secret() 5255 s->session->master_key, pms, pmslen, in ssl_generate_master_secret()
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | ms_funcs.c | 326 u8 *master_key) in get_master_key() argument 343 os_memcpy(master_key, hash, 16); in get_master_key() 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, in get_asymetric_start_key() argument 400 addr[0] = master_key; in get_asymetric_start_key()
|
| H A D | ms_funcs.h | 42 u8 *master_key); 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
| H A D | crypto_module_tests.c | 2505 u8 master_key[] = { in test_ms_funcs() local 2550 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { in test_ms_funcs() 2555 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key), in test_ms_funcs()
|
| H A D | tls_wolfssl.c | 2078 byte *master_key; in tls_connection_get_eap_fast_key() local 2097 wolfSSL_get_keys(ssl, &master_key, &master_key_len, &server_random, in tls_connection_get_eap_fast_key() 2103 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2113 ret = tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 2119 forced_memzero(master_key, master_key_len); in tls_connection_get_eap_fast_key()
|
| H A D | tls_openssl.c | 117 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key() 4430 unsigned char master_key[64]; in tls_connection_get_eap_fast_key() local 4466 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key() 4467 sizeof(master_key)); in tls_connection_get_eap_fast_key() 4473 tls_prf_sha256(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4477 } else if (tls_prf_sha1_md5(master_key, master_key_len, in tls_connection_get_eap_fast_key() 4482 forced_memzero(master_key, sizeof(master_key)); in tls_connection_get_eap_fast_key()
|
| /freebsd/crypto/krb5/src/lib/kdb/ |
| H A D | kdb_cpw.c | 152 add_key_rnd(krb5_context context, krb5_keyblock *master_key, in add_key_rnd() argument 198 retval = krb5_dbe_encrypt_key_data(context, master_key, &key, NULL, in add_key_rnd() 245 add_key_pwd(krb5_context context, krb5_keyblock *master_key, in add_key_pwd() argument 326 retval = krb5_dbe_encrypt_key_data(context, master_key, &key, in add_key_pwd()
|
| H A D | kdb5.c | 2425 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock *master_key, in krb5_dbe_cpw() argument 2435 return v->change_pwd(kcontext, master_key, ks_tuple, ks_tuple_count, in krb5_dbe_cpw()
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server_mschapv2.c | 53 u8 master_key[16]; member 441 data->master_key)) { in eap_mschapv2_process_response() 447 data->master_key, MSCHAPV2_KEY_LEN); in eap_mschapv2_process_response() 576 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey() 578 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN, in eap_mschapv2_getKey()
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | kdb.h | 634 krb5_keyblock * master_key, 645 krb5_keyblock * master_key, 652 krb5_keyblock * master_key, 660 krb5_keyblock * master_key, 772 krb5_keyblock * master_key, 1250 krb5_keyblock *master_key,
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_lib.c | 380 s->session->master_key) in tls_construct_cert_verify() 574 s->session->master_key) in tls_process_cert_verify() 676 && !ssl_log_secret(s, MASTER_SECRET_LABEL, s->session->master_key, in tls_construct_finished()
|
| H A D | statem_srvr.c | 2018 master_key_length = sizeof(s->session->master_key); in tls_early_post_process_client_hello() 2019 if (s->ext.session_secret_cb(ussl, s->session->master_key, in tls_early_post_process_client_hello() 4272 s->session->master_key, in tls_construct_new_session_ticket()
|
| H A D | statem_clnt.c | 1638 master_key_length = sizeof(s->session->master_key); in tls_process_server_hello() 1639 if (s->ext.session_secret_cb(ussl, s->session->master_key, in tls_process_server_hello() 2885 s->session->master_key, in tls_process_new_session_ticket()
|
| H A D | extensions.c | 1512 if (!tls13_generate_secret(s, md, NULL, sess->master_key, in tls_psk_do_binder()
|