Home
last modified time | relevance | path

Searched refs:secret_len (Results 1 – 25 of 51) sorted by relevance

123

/freebsd/crypto/openssl/demos/keyexch/
H A Dx25519.c56 size_t secret_len; member
158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after()
168 if (local_peer->secret_len != 32) { /* unreachable */ in keyexch_x25519_after()
174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after()
182 &local_peer->secret_len) == 0) { in keyexch_x25519_after()
188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after()
196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after()
241 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519()
248 peer1.secret_len) != 0) { in keyexch_x25519()
256 OPENSSL_clear_free(peer1.secret, peer1.secret_len); in keyexch_x25519()
[all …]
/freebsd/contrib/unbound/util/
H A Dedns.c163 const uint8_t* secret, size_t secret_len, int v4, in edns_cookie_server_validate() argument
173 if(secret_len != 16 || /* RFC9018 cookies have 16 byte secrets */ in edns_cookie_server_validate()
246 size_t secret_len = 0; in cookie_secret_file_read() local
249 secret_len = strlen(secret); in cookie_secret_file_read()
250 if( secret_len == 0 ) { break; } in cookie_secret_file_read()
251 log_assert( secret_len <= sizeof(secret) ); in cookie_secret_file_read()
252 secret_len = secret[secret_len - 1] == '\n' ? secret_len - 1 : secret_len; in cookie_secret_file_read()
253 if( secret_len != UNBOUND_COOKIE_SECRET_SIZE * 2 ) { corrupt++; break; } in cookie_secret_file_read()
255 secret[secret_len] = '\0'; in cookie_secret_file_read()
317 uint8_t* secret, size_t secret_len) in add_cookie_secret() argument
[all …]
H A Dedns.h191 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4,
239 size_t secret_len);
/freebsd/contrib/wpa/src/radius/
H A Dradius.h273 size_t secret_len);
275 size_t secret_len, const u8 *req_authenticator);
277 size_t secret_len,
280 size_t secret_len);
282 size_t secret_len,
285 size_t secret_len);
287 size_t secret_len,
296 size_t secret_len, struct radius_msg *sent_msg,
299 size_t secret_len, const u8 *req_auth);
305 const u8 *secret, size_t secret_len);
[all …]
H A Dradius.c462 size_t secret_len) in radius_msg_finish() argument
471 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
487 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument
499 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
511 len[3] = secret_len; in radius_msg_finish_srv()
524 size_t secret_len, in radius_msg_finish_das_resp() argument
537 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
545 len[1] = secret_len; in radius_msg_finish_das_resp()
559 size_t secret_len) in radius_msg_finish_acct() argument
569 len[1] = secret_len; in radius_msg_finish_acct()
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_prf.h92 const void *secret, size_t secret_len, const char *label,
110 const void *secret, size_t secret_len, const char *label,
128 const void *secret, size_t secret_len, const char *label,
143 const void *secret, size_t secret_len, const char *label,
/freebsd/contrib/wpa/src/crypto/
H A Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
H A Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
H A Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
H A Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
H A Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
H A Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
H A Dsha384.h23 int tls_prf_sha384(const u8 *secret, size_t secret_len,
26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
/freebsd/contrib/bearssl/src/ssl/
H A Dprf_md5sha1.c30 const void *secret, size_t secret_len, const char *label, in br_tls10_prf() argument
37 slen = (secret_len + 1) >> 1; in br_tls10_prf()
42 s1 + secret_len - slen, slen, label, seed_num, seed); in br_tls10_prf()
H A Dprf_sha256.c30 const void *secret, size_t secret_len, const char *label, in br_tls12_sha256_prf() argument
35 secret, secret_len, label, seed_num, seed); in br_tls12_sha256_prf()
H A Dprf_sha384.c30 const void *secret, size_t secret_len, const char *label, in br_tls12_sha384_prf() argument
35 secret, secret_len, label, seed_num, seed); in br_tls12_sha384_prf()
H A Dprf.c31 const void *secret, size_t secret_len, const char *label, in br_tls_phash() argument
46 br_hmac_key_init(&kc, dig, secret, secret_len); in br_tls_phash()
/freebsd/contrib/wpa/src/common/
H A Ddpp_auth.c421 size_t secret_len; in dpp_auth_build_resp_ok() local
484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok()
488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok()
489 auth->Nx_len = auth->secret_len; in dpp_auth_build_resp_ok()
491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok()
675 size_t secret_len; in dpp_auth_req_rx() local
782 if (dpp_ecdh(own_bi->pubkey, pi, auth->Mx, &secret_len) < 0) in dpp_auth_req_rx()
784 auth->secret_len = secret_len; in dpp_auth_req_rx()
787 auth->Mx, auth->secret_len); in dpp_auth_req_rx()
788 auth->Mx_len = auth->secret_len; in dpp_auth_req_rx()
[all …]
/freebsd/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KEYEXCH-DH.pod93 size_t secret_len = 0;
106 EVP_PKEY_derive(dctx, NULL, &secret_len);
107 secret = OPENSSL_zalloc(secret_len);
109 EVP_PKEY_derive(dctx, secret, &secret_len);
111 OPENSSL_clear_free(secret, secret_len);
H A DEVP_KEYEXCH-ECDH.pod73 size_t secret_len = out_len;
93 EVP_PKEY_derive(dctx, secret, &secret_len);
95 OPENSSL_clear_free(secret, secret_len);
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dsskdf.c59 size_t secret_len; member
306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset()
405 ctx->secret, ctx->secret_len, in sskdf_derive()
414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive()
445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive()
476 if (!sskdf_set_buffer(&ctx->secret, &ctx->secret_len, p)) in sskdf_set_ctx_params()
H A Dx942kdf.c41 size_t secret_len; member
352 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in x942kdf_reset()
463 ret = x942kdf_hash_kdm(md, ctx->secret, ctx->secret_len, in x942kdf_derive()
485 if (p != NULL && !x942kdf_set_buffer(&ctx->secret, &ctx->secret_len, p)) in x942kdf_set_ctx_params()

123