Home
last modified time | relevance | path

Searched refs:shared_secret (Results 1 – 25 of 36) sorted by relevance

12

/freebsd/crypto/openssh/
H A Dkexgen.c57 const struct sshbuf *shared_secret, in kex_gen_hash() argument
79 (r = sshbuf_putb(b, shared_secret)) != 0) { in kex_gen_hash()
146 struct sshbuf *shared_secret = NULL; in input_kex_gen_reply() local
185 r = kex_dh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply()
188 r = kex_ecdh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply()
192 r = kex_c25519_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply()
196 &shared_secret); in input_kex_gen_reply()
200 &shared_secret); in input_kex_gen_reply()
220 shared_secret, in input_kex_gen_reply()
228 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) != 0 || in input_kex_gen_reply()
[all …]
H A Dkexgexs.c132 struct sshbuf *shared_secret = NULL; in input_kex_dh_gex_init() local
151 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_dh_gex_init()
155 if ((r = kex_dh_compute_key(kex, dh_client_pub, shared_secret)) != 0) in input_kex_dh_gex_init()
179 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_init()
196 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) != 0 || in input_kex_dh_gex_init()
211 sshbuf_free(shared_secret); in input_kex_dh_gex_init()
H A Dkexgexc.c150 struct sshbuf *shared_secret = NULL; in input_kex_dh_gex_reply() local
177 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_dh_gex_reply()
181 if ((r = kex_dh_compute_key(kex, dh_server_pub, shared_secret)) != 0) in input_kex_dh_gex_reply()
201 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_reply()
209 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) != 0 || in input_kex_dh_gex_reply()
234 sshbuf_free(shared_secret); in input_kex_dh_gex_reply()
H A Dkexdh.c75 BIGNUM *shared_secret = NULL; in kex_dh_compute_key() local
95 (shared_secret = BN_new()) == NULL) { in kex_dh_compute_key()
100 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in kex_dh_compute_key()
107 r = sshbuf_put_bignum2(out, shared_secret); in kex_dh_compute_key()
110 BN_clear_free(shared_secret); in kex_dh_compute_key()
H A Dkexecdh.c142 BIGNUM *shared_secret = NULL; in kex_ecdh_dec_key_group() local
175 (shared_secret = BN_new()) == NULL) { in kex_ecdh_dec_key_group()
180 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in kex_ecdh_dec_key_group()
187 if ((r = sshbuf_put_bignum2(buf, shared_secret)) != 0) in kex_ecdh_dec_key_group()
193 BN_clear_free(shared_secret); in kex_ecdh_dec_key_group()
H A Dkexgex.c59 const u_char *shared_secret, size_t secretlen, in kexgex_hash() argument
86 (r = sshbuf_put(b, shared_secret, secretlen)) != 0) { in kexgex_hash()
/freebsd/contrib/wpa/src/radius/
H A Dradius_client.c70 const u8 *shared_secret,
138 const u8 *shared_secret; member
294 const u8 *shared_secret, in radius_client_register() argument
485 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit()
722 const u8 *shared_secret, in radius_client_list_add() argument
745 entry->shared_secret = shared_secret; in radius_client_list_add()
851 const u8 *shared_secret; in radius_client_send() local
872 conf->acct_server->shared_secret == NULL) { in radius_client_send()
879 shared_secret = conf->acct_server->shared_secret; in radius_client_send()
881 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send()
[all …]
H A Dradius_das.c21 u8 *shared_secret; member
442 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive()
496 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive()
551 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init()
570 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init()
572 if (das->shared_secret == NULL) { in radius_das_init()
606 os_free(das->shared_secret); in radius_das_deinit()
H A Dradius_client.h46 u8 *shared_secret; member
271 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_server.c109 char *shared_secret; member
978 (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
1147 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
1193 (u8 *) client->shared_secret, in radius_server_macacl()
1236 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl()
1286 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject()
1580 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp()
1624 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp()
1779 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth()
1891 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct()
[all …]
H A Dradius_das.h46 const u8 *shared_secret; member
/freebsd/crypto/libecc/src/ecdh/
H A Dx25519_448.c359 …int x25519_448_derive_secret(const u8 *priv_key, const u8 *peer_pub_key, u8 *shared_secret, u8 len) in x25519_448_derive_secret() argument
363 MUST_HAVE((priv_key != NULL) && (peer_pub_key != NULL) && (shared_secret != NULL), ret, err); in x25519_448_derive_secret()
367 ret = x25519_448_core(priv_key, peer_pub_key, shared_secret, len); in x25519_448_derive_secret()
395 …(const u8 priv_key[X25519_SIZE], const u8 peer_pub_key[X25519_SIZE], u8 shared_secret[X25519_SIZE]) in x25519_derive_secret()
397 return x25519_448_derive_secret(priv_key, peer_pub_key, shared_secret, X25519_SIZE); in x25519_derive_secret()
422 …secret(const u8 priv_key[X448_SIZE], const u8 peer_pub_key[X448_SIZE], u8 shared_secret[X448_SIZE]) in x448_derive_secret()
424 return x25519_448_derive_secret(priv_key, peer_pub_key, shared_secret, X448_SIZE); in x448_derive_secret()
H A Decccdh.c167 …ur_priv_key, const u8 *peer_pub_key_buf, u8 peer_pub_key_buf_len, u8 *shared_secret, u8 shared_sec… in ecccdh_derive_secret() argument
177 MUST_HAVE((shared_secret != NULL), ret, err); in ecccdh_derive_secret()
224 ret = fp_export_to_buf(shared_secret, shared_secret_len, &(Q->X)); in ecccdh_derive_secret()
/freebsd/crypto/libecc/include/libecc/ecdh/
H A Dx25519_448.h40 …const u8 priv_key[X25519_SIZE], const u8 peer_pub_key[X25519_SIZE], u8 shared_secret[X25519_SIZE]);
57 …ecret(const u8 priv_key[X448_SIZE], const u8 peer_pub_key[X448_SIZE], u8 shared_secret[X448_SIZE]);
H A Decccdh.h59 …v_key *our_priv_key, const u8 *peer_pub_key, u8 peer_pub_key_len, u8 *shared_secret, u8 shared_sec…
/freebsd/contrib/wpa/src/eap_server/
H A Dikev2.c28 os_free(data->shared_secret); in ikev2_initiator_deinit()
618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret()
1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth()
1140 os_free(data->shared_secret); in ikev2_build_sa_auth()
1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth()
1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth()
1148 os_free(data->shared_secret); in ikev2_build_sa_auth()
1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth()
1150 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
H A Dikev2.h43 u8 *shared_secret; member
/freebsd/contrib/wpa/src/ap/
H A Dieee802_11_auth.c143 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query()
410 const u8 *shared_secret, in decode_tunnel_passwords() argument
426 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords()
487 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument
512 msg, shared_secret, shared_secret_len, req, in hostapd_acl_recv_radius()
563 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
H A Daccounting.c413 const u8 *shared_secret, size_t shared_secret_len, in accounting_receive() argument
421 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in accounting_receive()
/freebsd/contrib/wpa/src/eap_common/
H A Deap_eke_common.c413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret()
416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki()
508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka()
553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk()
724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member
/freebsd/crypto/libecc/src/tests/
H A Dec_self_tests_core.c1048 u8 shared_secret[EC_PUB_KEY_MAX_SIZE]; local
1052 ret = local_memset(shared_secret, 0, sizeof(shared_secret)); EG(ret, err);
1081 MUST_HAVE((sizeof(shared_secret) >= shared_secret_len), ret, err);
1082 …ret = ecccdh_derive_secret(&(kp.priv_key), c->peer_pub_key, c->peer_pub_key_len, shared_secret, sh…
1090 ret = are_equal(shared_secret, c->exp_shared_secret, shared_secret_len, &check); EG(ret, err);
1103 u8 shared_secret[X25519_SIZE]; local
1106 ret = local_memset(shared_secret, 0, sizeof(shared_secret)); EG(ret, err);
1126 ret = x25519_derive_secret(c->our_priv_key, c->peer_pub_key, shared_secret);
1134 ret = are_equal(shared_secret, c->exp_shared_secret, X25519_SIZE, &check); EG(ret, err);
1147 u8 shared_secret[X448_SIZE]; local
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Deapol_test.c675 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean()
861 const u8 *shared_secret, in ieee802_1x_get_keys() argument
868 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
872 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
919 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument
933 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth()
956 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth()
1059 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
/freebsd/contrib/wpa/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_openssl.c4962 u8 *shared_secret) in hpke_extract_and_expand() argument
4982 shared_secret, ctx->n_secret) < 0) in hpke_extract_and_expand()
4990 static int hpke_key_schedule(struct hpke_context *ctx, const u8 *shared_secret, in hpke_key_schedule() argument
5012 if (hpke_labeled_extract(ctx, false, shared_secret, ctx->n_secret, in hpke_key_schedule()
5037 u8 *shared_secret, u8 *enc) in hpke_encap() argument
5086 wpabuf_len(pk_rm), shared_secret); in hpke_encap()
5163 u8 shared_secret[HPKE_MAX_SHARED_SECRET_LEN]; in hpke_base_seal_int() local
5172 if (hpke_encap(ctx, peer_pub, shared_secret, enc) < 0) in hpke_base_seal_int()
5177 if (hpke_key_schedule(ctx, shared_secret, info, info_len) < 0) in hpke_base_seal_int()
5193 forced_memzero(shared_secret, sizeof(shared_secret)); in hpke_base_seal_int()
[all …]

12