| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 30-extended-master-secret.cnf | 5 test-0 = 0-disable-extended-master-secret-server-sha 6 test-1 = 1-disable-extended-master-secret-client-sha 7 test-2 = 2-disable-extended-master-secret-both-sha 8 test-3 = 3-disable-extended-master-secret-both-resume 9 test-4 = 4-disable-extended-master-secret-server-sha2 10 test-5 = 5-disable-extended-master-secret-client-sha2 11 test-6 = 6-disable-extended-master-secret-both-sha2 14 [0-disable-extended-master-secret-server-sha] 15 ssl_conf = 0-disable-extended-master-secret-server-sha-ssl 17 [0-disable-extended-master-secret-server-sha-ssl] [all …]
|
| H A D | 30-extended-master-secret.cnf.in | 20 name => "disable-extended-master-secret-server-sha", 34 name => "disable-extended-master-secret-client-sha", 48 name => "disable-extended-master-secret-both-sha", 63 name => "disable-extended-master-secret-both-resume", 85 name => "disable-extended-master-secret-server-sha2", 99 name => "disable-extended-master-secret-client-sha2", 113 name => "disable-extended-master-secret-both-sha2",
|
| /freebsd/contrib/llvm-project/llvm/lib/Support/ |
| H A D | xxhash.cpp | 226 const uint8_t *secret, uint64_t seed) { in XXH3_len_1to3_64b() argument 233 (uint64_t)(endian::read32le(secret) ^ endian::read32le(secret + 4)) + in XXH3_len_1to3_64b() 239 const uint8_t *secret, uint64_t seed) { in XXH3_len_4to8_64b() argument 244 (endian::read64le(secret + 8) ^ endian::read64le(secret + 16)) - seed; in XXH3_len_4to8_64b() 256 const uint8_t *secret, uint64_t const seed) { in XXH3_len_9to16_64b() argument 258 (endian::read64le(secret + 24) ^ endian::read64le(secret + 32)) + seed; in XXH3_len_9to16_64b() 260 (endian::read64le(secret + 40) ^ endian::read64le(secret + 48)) - seed; in XXH3_len_9to16_64b() 270 const uint8_t *secret, uint64_t const seed) { in XXH3_len_0to16_64b() argument 272 return XXH3_len_9to16_64b(input, len, secret, seed); in XXH3_len_0to16_64b() 274 return XXH3_len_4to8_64b(input, len, secret, seed); in XXH3_len_0to16_64b() [all …]
|
| /freebsd/contrib/libfido2/src/ |
| H A D | ecdh.c | 21 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret) in hkdf_sha256() argument 28 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, in hkdf_sha256() 36 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret) in hkdf_sha256() argument 46 if (secret->len > INT_MAX || strlen(info) > INT_MAX) { in hkdf_sha256() 59 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 || in hkdf_sha256() 81 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret) in kdf() argument 91 SHA256(secret->ptr, secret->len, key->ptr) != key->ptr) { in kdf() 100 hkdf_sha256(key->ptr, hmac_info, secret) < 0 || in kdf() 102 secret) < 0) { in kdf() 122 fido_blob_t *secret = NULL; in do_ecdh() local [all …]
|
| H A D | aes256.c | 66 aes256_cbc_fips(const fido_blob_t *secret, const fido_blob_t *in, in aes256_cbc_fips() argument 74 if (secret->len != 64) { in aes256_cbc_fips() 76 secret->len); in aes256_cbc_fips() 94 key.ptr = secret->ptr + 32; in aes256_cbc_fips() 95 key.len = secret->len - 32; in aes256_cbc_fips() 193 aes256_cbc_enc(const fido_dev_t *dev, const fido_blob_t *secret, in aes256_cbc_enc() argument 196 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret, in aes256_cbc_enc() 197 in, out, 1) : aes256_cbc_proto1(secret, in, out, 1); in aes256_cbc_enc() 201 aes256_cbc_dec(const fido_dev_t *dev, const fido_blob_t *secret, in aes256_cbc_dec() argument 204 return fido_dev_get_pin_protocol(dev) == 2 ? aes256_cbc_fips(secret, in aes256_cbc_dec() [all …]
|
| /freebsd/crypto/libecc/src/examples/sss/ |
| H A D | sss.c | 125 …tatic int _sss_raw_generate(sss_share *shares, u16 k, u16 n, sss_secret *secret, boolean input_sec… in _sss_raw_generate() argument 142 MUST_HAVE((shares != NULL) && (secret != NULL), ret, err); in _sss_raw_generate() 181 ret = fp_import_from_buf(&a0, secret->secret, SSS_SECRET_SIZE); EG(ret, err); in _sss_raw_generate() 260 ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &a0); in _sss_raw_generate() 289 …NUSED_RET static int _sss_raw_lagrange(const sss_share *shares, u16 k, sss_secret *secret, u16 val) in _sss_raw_lagrange() argument 302 MUST_HAVE((shares != NULL) && (secret != NULL), ret, err); in _sss_raw_lagrange() 387 ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &y); in _sss_raw_lagrange() 410 …UTE_WARN_UNUSED_RET static int _sss_raw_combine(const sss_share *shares, u16 k, sss_secret *secret) in _sss_raw_combine() argument 412 return _sss_raw_lagrange(shares, k, secret, 0); in _sss_raw_combine() 426 int sss_generate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret, boolean… in sss_generate() argument [all …]
|
| /freebsd/sys/crypto/ |
| H A D | curve25519.h | 38 bool curve25519(uint8_t *public, const uint8_t *secret, 41 const uint8_t *secret); 44 curve25519_clamp_secret(uint8_t *secret) in curve25519_clamp_secret() argument 46 secret[0] &= 248; in curve25519_clamp_secret() 47 secret[31] &= 127; in curve25519_clamp_secret() 48 secret[31] |= 64; in curve25519_clamp_secret() 52 curve25519_generate_secret(uint8_t *secret) in curve25519_generate_secret() argument 54 arc4random_buf(secret, CURVE25519_KEY_SIZE); in curve25519_generate_secret() 55 curve25519_clamp_secret(secret); in curve25519_generate_secret()
|
| H A D | curve25519.c | 35 curve25519(uint8_t *public, const uint8_t *secret, in curve25519() argument 38 return (crypto_scalarmult_curve25519(public, secret, in curve25519() 43 curve25519_generate_public(uint8_t *public, const uint8_t *secret) in curve25519_generate_public() argument 45 return (crypto_scalarmult_curve25519_base(public, secret) == 0); in curve25519_generate_public()
|
| /freebsd/contrib/unbound/util/ |
| H A D | edns.c | 163 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, in edns_cookie_server_validate() argument 166 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8); in edns_cookie_server_validate() 171 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, in edns_cookie_server_validate() 180 (void)edns_cookie_server_hash(buf, secret, v4, hash); in edns_cookie_server_validate() 186 const uint8_t* secret, size_t secret_len, int v4, in edns_cookie_server_validate() 208 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash), in cookie_secrets_create() 245 /** Read the cookie secret file */ in cookie_secret_file_read() 250 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; in cookie_secret_file_read() 261 log_err("Could not read cookie-secret in cookie_secret_file_read() 140 edns_cookie_server_hash(const uint8_t * in,const uint8_t * secret,int v4,uint8_t * hash) edns_cookie_server_hash() argument 148 edns_cookie_server_write(uint8_t * buf,const uint8_t * secret,int v4,uint32_t timestamp) edns_cookie_server_write() argument 227 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; cookie_secret_file_read() local 317 add_cookie_secret(struct cookie_secrets * cookie_secrets,uint8_t * secret,size_t secret_len) add_cookie_secret() argument [all...] |
| /freebsd/sys/contrib/openzfs/module/zstd/lib/common/ |
| H A D | xxhash.h | 1185 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize… 1277 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize… 1402 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize… 1474 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize… 1931 XXH_NOESCAPE const void* secret, size_t secretSize, 1949 XXH_NOESCAPE const void* secret, size_t secretSize, 1967 XXH_NOESCAPE const void* secret, size_t secretSize, 1984 XXH_NOESCAPE const void* secret, size_t secretSize, 4569 XXH3_len_1to3_64b(const xxh_u8* input, size_t len, const xxh_u8* secret, XXH64_hash_t seed) in XXH3_len_1to3_64b() argument 4573 XXH_ASSERT(secret != NULL); in XXH3_len_1to3_64b() [all …]
|
| /freebsd/sys/contrib/zstd/lib/common/ |
| H A D | xxhash.h | 1184 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize… 1276 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize… 1401 …cret(XXH_NOESCAPE const void* data, size_t len, XXH_NOESCAPE const void* secret, size_t secretSize… 1473 …withSecret(XXH_NOESCAPE XXH3_state_t* statePtr, XXH_NOESCAPE const void* secret, size_t secretSize… 1930 XXH_NOESCAPE const void* secret, size_t secretSize, 1948 XXH_NOESCAPE const void* secret, size_t secretSize, 1966 XXH_NOESCAPE const void* secret, size_t secretSize, 1983 XXH_NOESCAPE const void* secret, size_t secretSize, 4568 XXH3_len_1to3_64b(const xxh_u8* input, size_t len, const xxh_u8* secret, XXH64_hash_t seed) in XXH3_len_1to3_64b() argument 4572 XXH_ASSERT(secret != NULL); in XXH3_len_1to3_64b() [all …]
|
| /freebsd/crypto/openssl/demos/keyexch/ |
| H A D | x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member 127 local_peer->secret = NULL; in keyexch_x25519_after() 173 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after() 174 if (local_peer->secret == NULL) { in keyexch_x25519_after() 180 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after() 188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after() 196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after() 197 local_peer->secret = NULL; in keyexch_x25519_after() 243 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519() 249 if (use_kat && CRYPTO_memcmp(peer1.secret, expected_result, peer1.secret_len) != 0) { in keyexch_x25519() [all …]
|
| H A D | ecdh.c | 32 unsigned char *secret; /* allocated shared secret buffer */ member 109 unsigned char *secret = NULL; in generate_secret() local 152 secret = (unsigned char *)OPENSSL_malloc(secretlen); in generate_secret() 153 if (secret == NULL) in generate_secret() 161 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) in generate_secret() 163 peerA->secret = secret; in generate_secret() 167 BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2); in generate_secret() 172 OPENSSL_free(secret); in generate_secret() 208 || CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secretlen) != 0) { in main()
|
| /freebsd/crypto/krb5/src/lib/krad/ |
| H A D | packet.c | 171 auth_generate_response(krb5_context ctx, const char *secret, in auth_generate_response() argument 180 retval = alloc_data(&data, response->pkt.length + strlen(secret)); in auth_generate_response() 188 memcpy(data.data + response->pkt.length, secret, strlen(secret)); in auth_generate_response() 218 packet_set_attrset(krb5_context ctx, const char *secret, krad_packet *pkt) in packet_set_attrset() argument 223 return kr_attrset_decode(ctx, &tmp, secret, pkt_auth(pkt), &pkt->attrset); in packet_set_attrset() 228 requires_msgauth(const char *secret, krad_code code) in requires_msgauth() argument 232 if (*secret == '\0') in requires_msgauth() 278 calculate_mac(const char *secret, const krad_packet *pkt, in calculate_mac() argument 317 ksecr = string2data((char *)secret); in calculate_mac() 346 krad_packet_new_request(krb5_context ctx, const char *secret, krad_code code, in krad_packet_new_request() argument [all …]
|
| H A D | internal.h | 60 kr_attr_encode(krb5_context ctx, const char *secret, const unsigned char *auth, 66 kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth, 73 kr_attrset_encode(const krad_attrset *set, const char *secret, 79 kr_attrset_decode(krb5_context ctx, const krb5_data *in, const char *secret, 86 const char *secret, krad_remote **rr); 123 const char *secret);
|
| H A D | attr.c | 39 (*attribute_transform_fn)(krb5_context ctx, const char *secret, 52 user_password_encode(krb5_context ctx, const char *secret, 57 user_password_decode(krb5_context ctx, const char *secret, 146 user_password_encode(krb5_context ctx, const char *secret, in user_password_encode() argument 165 seclen = strlen(secret); in user_password_encode() 170 memcpy(tmp.data, secret, seclen); in user_password_encode() 198 user_password_decode(krb5_context ctx, const char *secret, in user_password_decode() argument 215 seclen = strlen(secret); in user_password_decode() 220 memcpy(tmp.data, secret, seclen); in user_password_decode() 265 kr_attr_encode(krb5_context ctx, const char *secret, in kr_attr_encode() argument [all …]
|
| /freebsd/contrib/wireguard-tools/ |
| H A D | curve25519.h | 16 void curve25519(uint8_t mypublic[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE2551… 17 void curve25519_generate_public(uint8_t pub[static CURVE25519_KEY_SIZE], const uint8_t secret[stati… 18 static inline void curve25519_clamp_secret(uint8_t secret[static CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() 20 secret[0] &= 248; in curve25519_clamp_secret() 21 secret[31] = (secret[31] & 127) | 64; in curve25519_clamp_secret()
|
| /freebsd/lib/librpcsvc/ |
| H A D | xcrypt.c | 57 xencrypt(char *secret, char *passwd) in xencrypt() argument 65 len = strlen(secret) / 2; in xencrypt() 70 hex2bin(len, secret, buf); in xencrypt() 79 bin2hex(len, (unsigned char *) buf, secret); in xencrypt() 90 xdecrypt(char *secret, char *passwd) in xdecrypt() argument 98 len = strlen(secret) / 2; in xdecrypt() 103 hex2bin(len, secret, buf); in xdecrypt() 112 bin2hex(len, (unsigned char *) buf, secret); in xdecrypt()
|
| /freebsd/contrib/ntp/libntp/ |
| H A D | authkeys.c | 28 u_char * secret; /* shared secret */ member 33 size_t secretsize; /* secret octets */ 38 #define symkey_payload secret 101 u_char *cache_secret; /* secret */ 102 size_t cache_secretsize; /* secret length */ 472 * secret must be allocated with a free-compatible allocator. It is 483 u_char * secret, in allocsymkey() argument 501 sk->secret = secret; in allocsymkey() 755 u_char * secret; MD5auth_setkey() local [all...] |
| /freebsd/contrib/wpa/src/radius/ |
| H A D | radius.h | 272 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 274 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 276 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 279 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 281 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 284 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 286 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 295 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 298 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 305 const u8 *secret, size_t secret_len); [all …]
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | tls13_enc.c | 35 const unsigned char *secret, in tls13_hkdf_expand_ex() argument 77 (unsigned char *)secret, hashlen); in tls13_hkdf_expand_ex() 101 const unsigned char *secret, in tls13_hkdf_expand() argument 110 secret, label, labellen, data, datalen, in tls13_hkdf_expand() 123 const unsigned char *secret, in tls13_derive_key() argument 129 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 138 const unsigned char *secret, in tls13_derive_iv() argument 144 return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1, in tls13_derive_iv() 149 const unsigned char *secret, in tls13_derive_finishedkey() argument 155 return tls13_hkdf_expand(s, md, secret, finishedlabel, in tls13_derive_finishedkey() [all …]
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_kdf_test.c | 72 krb5_data secret; in main() local 92 if (NULL == (secret.data = malloc(secret_len))) { in main() 97 secret.length = secret_len; in main() 98 memset(secret.data, 0, secret_len); in main() 129 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main() 157 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main() 185 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main() 207 free(secret.data); in main()
|
| /freebsd/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | otp_state.c | 51 char *secret; member 83 read_secret_file(const char *secret_file, char **secret) in read_secret_file() argument 91 *secret = NULL; in read_secret_file() 124 *secret = k5memdup0(&buf[i], j - i, &retval); in read_secret_file() 140 free(type->secret); in token_type_free() 148 char *name = NULL, *server = NULL, *secret = NULL; in token_type_default() local 157 secret = strdup(""); in token_type_default() 158 if (secret == NULL) in token_type_default() 163 out->secret = secret; in token_type_default() 172 free(secret); in token_type_default() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_decapsulate.pod | 36 shared secret is written. 37 The shared secret may not match the peer's value even when decapsulation 39 Instead, the shared secret must be used to derive a key that is used to 41 If I<unwrapped> is NULL then the size of the output shared secret buffer is 44 decapsulated secret data is written to I<unwrapped> and the length of shared 45 secret is written to I<*unwrappedlen>. 52 algorithm, callers SHOULD NOT assume that the returned shared secret 82 unsigned char *secret = NULL;; 98 secret = OPENSSL_malloc(secretlen); 99 if (secret == NULL) [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_KEYEXCH-DH.pod | 26 If padding is off then the derived shared secret may be smaller than the 27 largest possible secret size. 28 If padding is on then the derived shared secret will have its first bytes 29 filled with zeros where necessary to make the shared secret the same size as 30 the largest possible secret size. 82 To derive a shared secret on the host using the host's key and the peer's public 90 unsigned char *secret = NULL; 105 secret = OPENSSL_zalloc(secret_len); 107 EVP_PKEY_derive(dctx, secret, &secret_len); 109 OPENSSL_clear_free(secret, secret_len); [all …]
|