Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 359) sorted by relevance

12345678910>>...15

/freebsd/crypto/openssl/test/ssl-tests/
H A D30-extended-master-secret.cnf5 test-0 = 0-disable-extended-master-secret-server-sha
6 test-1 = 1-disable-extended-master-secret-client-sha
7 test-2 = 2-disable-extended-master-secret-both-sha
8 test-3 = 3-disable-extended-master-secret-both-resume
9 test-4 = 4-disable-extended-master-secret-server-sha2
10 test-5 = 5-disable-extended-master-secret-client-sha2
11 test-6 = 6-disable-extended-master-secret-both-sha2
14 [0-disable-extended-master-secret-server-sha]
15 ssl_conf = 0-disable-extended-master-secret-server-sha-ssl
17 [0-disable-extended-master-secret-server-sha-ssl]
[all …]
H A D30-extended-master-secret.cnf.in20 name => "disable-extended-master-secret-server-sha",
34 name => "disable-extended-master-secret-client-sha",
48 name => "disable-extended-master-secret-both-sha",
63 name => "disable-extended-master-secret-both-resume",
85 name => "disable-extended-master-secret-server-sha2",
99 name => "disable-extended-master-secret-client-sha2",
113 name => "disable-extended-master-secret-both-sha2",
/freebsd/contrib/llvm-project/llvm/lib/Support/
H A Dxxhash.cpp226 const uint8_t *secret, uint64_t seed) { in XXH3_len_1to3_64b() argument
233 (uint64_t)(endian::read32le(secret) ^ endian::read32le(secret + 4)) + in XXH3_len_1to3_64b()
239 const uint8_t *secret, uint64_t seed) { in XXH3_len_4to8_64b() argument
244 (endian::read64le(secret + 8) ^ endian::read64le(secret + 16)) - seed; in XXH3_len_4to8_64b()
256 const uint8_t *secret, uint64_t const seed) { in XXH3_len_9to16_64b() argument
258 (endian::read64le(secret + 24) ^ endian::read64le(secret + 32)) + seed; in XXH3_len_9to16_64b()
260 (endian::read64le(secret + 40) ^ endian::read64le(secret + 48)) - seed; in XXH3_len_9to16_64b()
270 const uint8_t *secret, uint64_t const seed) { in XXH3_len_0to16_64b() argument
272 return XXH3_len_9to16_64b(input, len, secret, seed); in XXH3_len_0to16_64b()
274 return XXH3_len_4to8_64b(input, len, secret, seed); in XXH3_len_0to16_64b()
[all …]
/freebsd/contrib/libfido2/src/
H A Decdh.c21 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret) in hkdf_sha256() argument
28 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, in hkdf_sha256()
36 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret) in hkdf_sha256() argument
46 if (secret->len > INT_MAX || strlen(info) > INT_MAX) { in hkdf_sha256()
59 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 || in hkdf_sha256()
81 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret) in kdf() argument
91 SHA256(secret->ptr, secret->len, key->ptr) != key->ptr) { in kdf()
100 hkdf_sha256(key->ptr, hmac_info, secret) < 0 || in kdf()
102 secret) < 0) { in kdf()
122 fido_blob_t *secret = NULL; in do_ecdh() local
[all …]
H A Daes256.c66 aes256_cbc_fips(const fido_blob_t *secret, const fido_blob_t *in, in aes256_cbc_fips() argument
74 if (secret->len != 64) { in aes256_cbc_fips()
76 secret->len); in aes256_cbc_fips()
94 key.ptr = secret->ptr + 32; in aes256_cbc_fips()
95 key.len = secret->len - 32; in aes256_cbc_fips()
193 aes256_cbc_enc(const fido_dev_t *dev, const fido_blob_t *secret, in aes256_cbc_enc() argument
196 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret, in aes256_cbc_enc()
197 in, out, 1) : aes256_cbc_proto1(secret, in, out, 1); in aes256_cbc_enc()
201 aes256_cbc_dec(const fido_dev_t *dev, const fido_blob_t *secret, in aes256_cbc_dec() argument
204 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret, in aes256_cbc_dec()
[all …]
/freebsd/crypto/libecc/src/examples/sss/
H A Dsss.c125 …tatic int _sss_raw_generate(sss_share *shares, u16 k, u16 n, sss_secret *secret, boolean input_sec… in _sss_raw_generate() argument
142 MUST_HAVE((shares != NULL) && (secret != NULL), ret, err); in _sss_raw_generate()
181 ret = fp_import_from_buf(&a0, secret->secret, SSS_SECRET_SIZE); EG(ret, err); in _sss_raw_generate()
260 ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &a0); in _sss_raw_generate()
289 …NUSED_RET static int _sss_raw_lagrange(const sss_share *shares, u16 k, sss_secret *secret, u16 val) in _sss_raw_lagrange() argument
302 MUST_HAVE((shares != NULL) && (secret != NULL), ret, err); in _sss_raw_lagrange()
387 ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &y); in _sss_raw_lagrange()
410 …UTE_WARN_UNUSED_RET static int _sss_raw_combine(const sss_share *shares, u16 k, sss_secret *secret) in _sss_raw_combine() argument
412 return _sss_raw_lagrange(shares, k, secret, 0); in _sss_raw_combine()
426 int sss_generate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret, boolean… in sss_generate() argument
[all …]
/freebsd/sys/crypto/
H A Dcurve25519.h38 bool curve25519(uint8_t *public, const uint8_t *secret,
41 const uint8_t *secret);
44 curve25519_clamp_secret(uint8_t *secret) in curve25519_clamp_secret() argument
46 secret[0] &= 248; in curve25519_clamp_secret()
47 secret[31] &= 127; in curve25519_clamp_secret()
48 secret[31] |= 64; in curve25519_clamp_secret()
52 curve25519_generate_secret(uint8_t *secret) in curve25519_generate_secret() argument
54 arc4random_buf(secret, CURVE25519_KEY_SIZE); in curve25519_generate_secret()
55 curve25519_clamp_secret(secret); in curve25519_generate_secret()
H A Dcurve25519.c35 curve25519(uint8_t *public, const uint8_t *secret, in curve25519() argument
38 return (crypto_scalarmult_curve25519(public, secret, in curve25519()
43 curve25519_generate_public(uint8_t *public, const uint8_t *secret) in curve25519_generate_public() argument
45 return (crypto_scalarmult_curve25519_base(public, secret) == 0); in curve25519_generate_public()
/freebsd/contrib/unbound/util/
H A Dedns.c163 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, in edns_cookie_server_validate() argument
166 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8); in edns_cookie_server_validate()
171 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, in edns_cookie_server_validate()
180 (void)edns_cookie_server_hash(buf, secret, v4, hash); in edns_cookie_server_validate()
186 const uint8_t* secret, size_t secret_len, int v4, in edns_cookie_server_validate()
208 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash), in cookie_secrets_create()
245 /** Read the cookie secret file */ in cookie_secret_file_read()
250 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; in cookie_secret_file_read()
261 log_err("Could not read cookie-secret in cookie_secret_file_read()
140 edns_cookie_server_hash(const uint8_t * in,const uint8_t * secret,int v4,uint8_t * hash) edns_cookie_server_hash() argument
148 edns_cookie_server_write(uint8_t * buf,const uint8_t * secret,int v4,uint32_t timestamp) edns_cookie_server_write() argument
227 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; cookie_secret_file_read() local
317 add_cookie_secret(struct cookie_secrets * cookie_secrets,uint8_t * secret,size_t secret_len) add_cookie_secret() argument
[all...]
/freebsd/sys/contrib/openzfs/module/zstd/lib/common/
H A Dxxhash.h1185 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize…
1277 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize…
1402 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize…
1474 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize…
1931 XXH_NOESCAPE const void* secret, size_t secretSize,
1949 XXH_NOESCAPE const void* secret, size_t secretSize,
1967 XXH_NOESCAPE const void* secret, size_t secretSize,
1984 XXH_NOESCAPE const void* secret, size_t secretSize,
4569 XXH3_len_1to3_64b(const xxh_u8* input, size_t len, const xxh_u8* secret, XXH64_hash_t seed) in XXH3_len_1to3_64b() argument
4573 XXH_ASSERT(secret != NULL); in XXH3_len_1to3_64b()
[all …]
/freebsd/sys/contrib/zstd/lib/common/
H A Dxxhash.h1184 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize…
1276 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize…
1401 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize…
1473 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize…
1930 XXH_NOESCAPE const void* secret, size_t secretSize,
1948 XXH_NOESCAPE const void* secret, size_t secretSize,
1966 XXH_NOESCAPE const void* secret, size_t secretSize,
1983 XXH_NOESCAPE const void* secret, size_t secretSize,
4568 XXH3_len_1to3_64b(const xxh_u8* input, size_t len, const xxh_u8* secret, XXH64_hash_t seed) in XXH3_len_1to3_64b() argument
4572 XXH_ASSERT(secret != NULL); in XXH3_len_1to3_64b()
[all …]
/freebsd/crypto/openssl/demos/keyexch/
H A Dx25519.c55 unsigned char *secret; /* allocated shared secret buffer */ member
127 local_peer->secret = NULL; in keyexch_x25519_after()
173 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after()
174 if (local_peer->secret == NULL) { in keyexch_x25519_after()
180 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after()
188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after()
196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after()
197 local_peer->secret = NULL; in keyexch_x25519_after()
243 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519()
249 if (use_kat && CRYPTO_memcmp(peer1.secret, expected_result, peer1.secret_len) != 0) { in keyexch_x25519()
[all …]
H A Decdh.c32 unsigned char *secret; /* allocated shared secret buffer */ member
109 unsigned char *secret = NULL; in generate_secret() local
152 secret = (unsigned char *)OPENSSL_malloc(secretlen); in generate_secret()
153 if (secret == NULL) in generate_secret()
161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) in generate_secret()
163 peerA->secret = secret; in generate_secret()
167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2); in generate_secret()
172 OPENSSL_free(secret); in generate_secret()
208 || CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secretlen) != 0) { in main()
/freebsd/crypto/krb5/src/lib/krad/
H A Dpacket.c171 auth_generate_response(krb5_context ctx, const char *secret, in auth_generate_response() argument
180 retval = alloc_data(&data, response->pkt.length + strlen(secret)); in auth_generate_response()
188 memcpy(data.data + response->pkt.length, secret, strlen(secret)); in auth_generate_response()
218 packet_set_attrset(krb5_context ctx, const char *secret, krad_packet *pkt) in packet_set_attrset() argument
223 return kr_attrset_decode(ctx, &tmp, secret, pkt_auth(pkt), &pkt->attrset); in packet_set_attrset()
228 requires_msgauth(const char *secret, krad_code code) in requires_msgauth() argument
232 if (*secret == '\0') in requires_msgauth()
278 calculate_mac(const char *secret, const krad_packet *pkt, in calculate_mac() argument
317 ksecr = string2data((char *)secret); in calculate_mac()
346 krad_packet_new_request(krb5_context ctx, const char *secret, krad_code code, in krad_packet_new_request() argument
[all …]
H A Dinternal.h60 kr_attr_encode(krb5_context ctx, const char *secret, const unsigned char *auth,
66 kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
73 kr_attrset_encode(const krad_attrset *set, const char *secret,
79 kr_attrset_decode(krb5_context ctx, const krb5_data *in, const char *secret,
86 const char *secret, krad_remote **rr);
123 const char *secret);
H A Dattr.c39 (*attribute_transform_fn)(krb5_context ctx, const char *secret,
52 user_password_encode(krb5_context ctx, const char *secret,
57 user_password_decode(krb5_context ctx, const char *secret,
146 user_password_encode(krb5_context ctx, const char *secret, in user_password_encode() argument
165 seclen = strlen(secret); in user_password_encode()
170 memcpy(tmp.data, secret, seclen); in user_password_encode()
198 user_password_decode(krb5_context ctx, const char *secret, in user_password_decode() argument
215 seclen = strlen(secret); in user_password_decode()
220 memcpy(tmp.data, secret, seclen); in user_password_decode()
265 kr_attr_encode(krb5_context ctx, const char *secret, in kr_attr_encode() argument
[all …]
/freebsd/contrib/wireguard-tools/
H A Dcurve25519.h16 void curve25519(uint8_t mypublic[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE2551…
17 void curve25519_generate_public(uint8_t pub[static CURVE25519_KEY_SIZE], const uint8_t secret[stati…
18 static inline void curve25519_clamp_secret(uint8_t secret[static CURVE25519_KEY_SIZE]) in curve25519_clamp_secret()
20 secret[0] &= 248; in curve25519_clamp_secret()
21 secret[31] = (secret[31] & 127) | 64; in curve25519_clamp_secret()
/freebsd/lib/librpcsvc/
H A Dxcrypt.c57 xencrypt(char *secret, char *passwd) in xencrypt() argument
65 len = strlen(secret) / 2; in xencrypt()
70 hex2bin(len, secret, buf); in xencrypt()
79 bin2hex(len, (unsigned char *) buf, secret); in xencrypt()
90 xdecrypt(char *secret, char *passwd) in xdecrypt() argument
98 len = strlen(secret) / 2; in xdecrypt()
103 hex2bin(len, secret, buf); in xdecrypt()
112 bin2hex(len, (unsigned char *) buf, secret); in xdecrypt()
/freebsd/contrib/ntp/libntp/
H A Dauthkeys.c28 u_char * secret; /* shared secret */ member
33 size_t secretsize; /* secret octets */
38 #define symkey_payload secret
101 u_char *cache_secret; /* secret */
102 size_t cache_secretsize; /* secret length */
472 * secret must be allocated with a free-compatible allocator. It is
483 u_char * secret, in allocsymkey() argument
501 sk->secret = secret; in allocsymkey()
755 u_char * secret; MD5auth_setkey() local
[all...]
/freebsd/contrib/wpa/src/radius/
H A Dradius.h272 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
274 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
276 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
279 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
281 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
284 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
286 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
295 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
298 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
305 const u8 *secret, size_t secret_len);
[all …]
/freebsd/crypto/openssl/ssl/
H A Dtls13_enc.c35 const unsigned char *secret, in tls13_hkdf_expand_ex() argument
77 (unsigned char *)secret, hashlen); in tls13_hkdf_expand_ex()
101 const unsigned char *secret, in tls13_hkdf_expand() argument
110 secret, label, labellen, data, datalen, in tls13_hkdf_expand()
123 const unsigned char *secret, in tls13_derive_key() argument
129 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key()
138 const unsigned char *secret, in tls13_derive_iv() argument
144 return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1, in tls13_derive_iv()
149 const unsigned char *secret, in tls13_derive_finishedkey() argument
155 return tls13_hkdf_expand(s, md, secret, finishedlabel, in tls13_derive_finishedkey()
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_kdf_test.c72 krb5_data secret; in main() local
92 if (NULL == (secret.data = malloc(secret_len))) { in main()
97 secret.length = secret_len; in main()
98 memset(secret.data, 0, secret_len); in main()
129 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main()
157 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main()
185 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main()
207 free(secret.data); in main()
/freebsd/crypto/krb5/src/plugins/preauth/otp/
H A Dotp_state.c51 char *secret; member
83 read_secret_file(const char *secret_file, char **secret) in read_secret_file() argument
91 *secret = NULL; in read_secret_file()
124 *secret = k5memdup0(&buf[i], j - i, &retval); in read_secret_file()
140 free(type->secret); in token_type_free()
148 char *name = NULL, *server = NULL, *secret = NULL; in token_type_default() local
157 secret = strdup(""); in token_type_default()
158 if (secret == NULL) in token_type_default()
163 out->secret = secret; in token_type_default()
172 free(secret); in token_type_default()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_decapsulate.pod36 shared secret is written.
37 The shared secret may not match the peer's value even when decapsulation
39 Instead, the shared secret must be used to derive a key that is used to
41 If I<unwrapped> is NULL then the size of the output shared secret buffer is
44 decapsulated secret data is written to I<unwrapped> and the length of shared
45 secret is written to I<*unwrappedlen>.
52 algorithm, callers SHOULD NOT assume that the returned shared secret
82 unsigned char *secret = NULL;;
98 secret = OPENSSL_malloc(secretlen);
99 if (secret == NULL)
[all …]
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KEYEXCH-DH.pod26 If padding is off then the derived shared secret may be smaller than the
27 largest possible secret size.
28 If padding is on then the derived shared secret will have its first bytes
29 filled with zeros where necessary to make the shared secret the same size as
30 the largest possible secret size.
82 To derive a shared secret on the host using the host's key and the peer's public
90 unsigned char *secret = NULL;
105 secret = OPENSSL_zalloc(secret_len);
107 EVP_PKEY_derive(dctx, secret, &secret_len);
109 OPENSSL_clear_free(secret, secret_len);
[all …]

12345678910>>...15