/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; in eap_ikev2_derive_keymat() local 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 32 if (nonces == NULL) in eap_ikev2_derive_keymat() 34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat() 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 39 os_free(nonces); in eap_ikev2_derive_keymat() 42 os_free(nonces); in eap_ikev2_derive_keymat()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OCSP_request_add1_nonce.pod | 39 nonces are present and equal 1 is returned. If the nonces are absent 2 is 40 returned. If a nonce is present in the response only 3 is returned. If nonces 56 performance reasons. As a result they do not support nonces. 59 positive return value effectively indicates success: nonces are both present 62 this will happen if the responder doesn't support nonces. A zero return value 63 indicates present and mismatched nonces: this should be treated as an error
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_eke.c | 508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
|
/freebsd/contrib/wpa/src/common/ |
H A D | dpp_crypto.c | 448 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_bk_ke() local 462 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke() 463 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke() 480 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_bk_ke() 1696 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_responder() local 1751 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1752 os_memcpy(&nonces[curve->nonce_len], auth->e_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1753 if (dpp_hmac(curve->hash_len, nonces, 2 * curve->nonce_len, in dpp_reconfig_derive_ke_responder() 1797 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_initiator() local 1844 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_initiator() [all …]
|
H A D | wpa_common.c | 596 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local 617 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 618 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 628 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk() 631 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local 329 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 330 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 333 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
|
/freebsd/sys/contrib/libsodium/ |
H A D | ChangeLog | 15 order to use synthetic nonces for EdDSA. This is disabled by default. 120 to use ChaCha20 with random nonces. 279 arbitrary large numbers (such as nonces, in order to prevent replay
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 2229 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local 2321 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate() 2322 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate() 2323 params.fils_nonces = nonces; in sme_associate() 2324 params.fils_nonces_len = sizeof(nonces); in sme_associate()
|
/freebsd/contrib/llvm-project/llvm/lib/Support/BLAKE3/ |
H A D | README.md | 204 include any dynamic input like salts, nonces, or identifiers read from a
|
/freebsd/crypto/openssl/ |
H A D | NEWS.md | 303 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543]) 382 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
|
H A D | CHANGES.md | 2913 * Prevent over long nonces in ChaCha20-Poly1305. 3604 * Prevent over long nonces in ChaCha20-Poly1305. 12412 copies and compares OCSP nonces as opaque blobs without any attempt at
|
/freebsd/crypto/libecc/ |
H A D | README.md | 57 generates nonces using a HMAC-DRBG process, and is suitable for situations where there is 58 no RNG or where entropy sources are considered weak (please note that any leak on these nonces
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2005 | 1400 highest bit to make windows PK-INIT happy. Also make the nonces
|