Home
last modified time | relevance | path

Searched refs:nonces (Results 1 – 13 of 13) sorted by relevance

/freebsd/contrib/wpa/src/eap_common/
H A Deap_ikev2_common.c23 u8 *nonces; in eap_ikev2_derive_keymat() local
31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat()
32 if (nonces == NULL) in eap_ikev2_derive_keymat()
34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat()
35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
39 os_free(nonces); in eap_ikev2_derive_keymat()
42 os_free(nonces); in eap_ikev2_derive_keymat()
/freebsd/crypto/openssl/doc/man3/
H A DOCSP_request_add1_nonce.pod39 nonces are present and equal 1 is returned. If the nonces are absent 2 is
40 returned. If a nonce is present in the response only 3 is returned. If nonces
56 performance reasons. As a result they do not support nonces.
59 positive return value effectively indicates success: nonces are both present
62 this will happen if the responder doesn't support nonces. A zero return value
63 indicates present and mismatched nonces: this should be treated as an error
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_eke.c508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local
532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm()
534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm()
545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm()
546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm()
552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
/freebsd/contrib/wpa/src/common/
H A Ddpp_crypto.c448 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_bk_ke() local
462 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke()
463 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke()
480 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_bk_ke()
1696 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_responder() local
1751 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder()
1752 os_memcpy(&nonces[curve->nonce_len], auth->e_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder()
1753 if (dpp_hmac(curve->hash_len, nonces, 2 * curve->nonce_len, in dpp_reconfig_derive_ke_responder()
1797 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_initiator() local
1844 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_initiator()
[all …]
H A Dwpa_common.c596 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local
617 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
618 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
628 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
631 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_eke.c309 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local
329 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm()
330 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm()
333 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
/freebsd/sys/contrib/libsodium/
H A DChangeLog15 order to use synthetic nonces for EdDSA. This is disabled by default.
120 to use ChaCha20 with random nonces.
279 arbitrary large numbers (such as nonces, in order to prevent replay
/freebsd/contrib/wpa/wpa_supplicant/
H A Dsme.c2229 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local
2321 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate()
2322 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate()
2323 params.fils_nonces = nonces; in sme_associate()
2324 params.fils_nonces_len = sizeof(nonces); in sme_associate()
/freebsd/contrib/llvm-project/llvm/lib/Support/BLAKE3/
H A DREADME.md204 include any dynamic input like salts, nonces, or identifiers read from a
/freebsd/crypto/openssl/
H A DNEWS.md303 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
382 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
H A DCHANGES.md2913 * Prevent over long nonces in ChaCha20-Poly1305.
3604 * Prevent over long nonces in ChaCha20-Poly1305.
12412 copies and compares OCSP nonces as opaque blobs without any attempt at
/freebsd/crypto/libecc/
H A DREADME.md57 generates nonces using a HMAC-DRBG process, and is suitable for situations where there is
58 no RNG or where entropy sources are considered weak (please note that any leak on these nonces
/freebsd/crypto/heimdal/
H A DChangeLog.20051400 highest bit to make windows PK-INIT happy. Also make the nonces