/freebsd/crypto/openssl/demos/keyexch/ |
H A D | x25519.c | 56 size_t secret_len; member 158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after() 168 if (local_peer->secret_len != 32) { /* unreachable */ in keyexch_x25519_after() 174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after() 182 &local_peer->secret_len) == 0) { in keyexch_x25519_after() 188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after() 196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after() 241 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519() 248 peer1.secret_len) != 0) { in keyexch_x25519() 256 OPENSSL_clear_free(peer1.secret, peer1.secret_len); in keyexch_x25519() [all …]
|
/freebsd/contrib/unbound/util/ |
H A D | edns.c | 163 const uint8_t* secret, size_t secret_len, int v4, in edns_cookie_server_validate() argument 173 if(secret_len != 16 || /* RFC9018 cookies have 16 byte secrets */ in edns_cookie_server_validate() 246 size_t secret_len = 0; in cookie_secret_file_read() local 249 secret_len = strlen(secret); in cookie_secret_file_read() 250 if( secret_len == 0 ) { break; } in cookie_secret_file_read() 251 log_assert( secret_len <= sizeof(secret) ); in cookie_secret_file_read() 252 secret_len = secret[secret_len - 1] == '\n' ? secret_len - 1 : secret_len; in cookie_secret_file_read() 253 if( secret_len != UNBOUND_COOKIE_SECRET_SIZE * 2 ) { corrupt++; break; } in cookie_secret_file_read() 255 secret[secret_len] = '\0'; in cookie_secret_file_read() 317 uint8_t* secret, size_t secret_len) in add_cookie_secret() argument [all …]
|
H A D | edns.h | 191 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, 239 size_t secret_len);
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius.h | 273 size_t secret_len); 275 size_t secret_len, const u8 *req_authenticator); 277 size_t secret_len, 280 size_t secret_len); 282 size_t secret_len, 285 size_t secret_len); 287 size_t secret_len, 296 size_t secret_len, struct radius_msg *sent_msg, 299 size_t secret_len, const u8 *req_auth); 305 const u8 *secret, size_t secret_len); [all …]
|
H A D | radius.c | 462 size_t secret_len) in radius_msg_finish() argument 471 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 487 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument 499 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 511 len[3] = secret_len; in radius_msg_finish_srv() 524 size_t secret_len, in radius_msg_finish_das_resp() argument 537 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 545 len[1] = secret_len; in radius_msg_finish_das_resp() 559 size_t secret_len) in radius_msg_finish_acct() argument 569 len[1] = secret_len; in radius_msg_finish_acct() [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_prf.h | 92 const void *secret, size_t secret_len, const char *label, 110 const void *secret, size_t secret_len, const char *label, 128 const void *secret, size_t secret_len, const char *label, 143 const void *secret, size_t secret_len, const char *label,
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
H A D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
|
H A D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
H A D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
H A D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5() 66 if (secret_len & 1) { in tls_prf_sha1_md5()
|
H A D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha384.h | 23 int tls_prf_sha384(const u8 *secret, size_t secret_len, 26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | prf_md5sha1.c | 30 const void *secret, size_t secret_len, const char *label, in br_tls10_prf() argument 37 slen = (secret_len + 1) >> 1; in br_tls10_prf() 42 s1 + secret_len - slen, slen, label, seed_num, seed); in br_tls10_prf()
|
H A D | prf_sha256.c | 30 const void *secret, size_t secret_len, const char *label, in br_tls12_sha256_prf() argument 35 secret, secret_len, label, seed_num, seed); in br_tls12_sha256_prf()
|
H A D | prf_sha384.c | 30 const void *secret, size_t secret_len, const char *label, in br_tls12_sha384_prf() argument 35 secret, secret_len, label, seed_num, seed); in br_tls12_sha384_prf()
|
H A D | prf.c | 31 const void *secret, size_t secret_len, const char *label, in br_tls_phash() argument 46 br_hmac_key_init(&kc, dig, secret, secret_len); in br_tls_phash()
|
/freebsd/contrib/wpa/src/common/ |
H A D | dpp_auth.c | 421 size_t secret_len; in dpp_auth_build_resp_ok() local 484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok() 488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok() 489 auth->Nx_len = auth->secret_len; in dpp_auth_build_resp_ok() 491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok() 675 size_t secret_len; in dpp_auth_req_rx() local 782 if (dpp_ecdh(own_bi->pubkey, pi, auth->Mx, &secret_len) < 0) in dpp_auth_req_rx() 784 auth->secret_len = secret_len; in dpp_auth_req_rx() 787 auth->Mx, auth->secret_len); in dpp_auth_req_rx() 788 auth->Mx_len = auth->secret_len; in dpp_auth_req_rx() [all …]
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 24 len[1] = secret_len; in chap_md5()
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KEYEXCH-DH.pod | 93 size_t secret_len = 0; 106 EVP_PKEY_derive(dctx, NULL, &secret_len); 107 secret = OPENSSL_zalloc(secret_len); 109 EVP_PKEY_derive(dctx, secret, &secret_len); 111 OPENSSL_clear_free(secret, secret_len);
|
H A D | EVP_KEYEXCH-ECDH.pod | 73 size_t secret_len = out_len; 93 EVP_PKEY_derive(dctx, secret, &secret_len); 95 OPENSSL_clear_free(secret, secret_len);
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | sskdf.c | 59 size_t secret_len; member 306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset() 405 ctx->secret, ctx->secret_len, in sskdf_derive() 414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive() 445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive() 476 if (!sskdf_set_buffer(&ctx->secret, &ctx->secret_len, p)) in sskdf_set_ctx_params()
|
H A D | x942kdf.c | 41 size_t secret_len; member 352 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in x942kdf_reset() 463 ret = x942kdf_hash_kdm(md, ctx->secret, ctx->secret_len, in x942kdf_derive() 485 if (p != NULL && !x942kdf_set_buffer(&ctx->secret, &ctx->secret_len, p)) in x942kdf_set_ctx_params()
|