| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | t_vectors.c | 52 const char *thash; member 386 krb5_data *w, *x, *y, *T, *S, *K, *support, *challenge, *thash; in run_test() local 399 thash = decode_data(t->thash); in run_test() 426 assert(data_eq(*thash, hash)); in run_test() 430 check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 0, in run_test() 434 check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 1, in run_test() 438 check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 2, in run_test() 442 check(derive_key(ctx, gstate, t->group, ikey, &wbytes, K, thash, body, 3, in run_test() 458 krb5_free_data(ctx, thash); in run_test()
|
| H A D | spake_kdc.c | 91 krb5_data thash, spake, factors; in parse_cookie() local 106 parse_data(&in, &thash); in parse_cookie() 114 *thash_out = thash; in parse_cookie() 130 const krb5_data *thash, krb5_data *cookie_out) in make_cookie() argument 144 marshal_data(&buf, thash); in make_cookie() 223 krb5_data thash = empty_data(), cookie = empty_data(); in send_challenge() local 257 ret = update_thash(context, gstate, group, &thash, support, der_msg); in send_challenge() 263 ret = make_cookie(0, group, &kdcpriv, &thash, &cookie); in send_challenge() 279 krb5_free_data_contents(context, &thash); in send_challenge() 374 krb5_data thash = empty_data(), der_factor = empty_data(); in verify_response() local [all …]
|
| H A D | trace.h | 44 #define TRACE_SPAKE_CLIENT_THASH(c, thash) \ argument 45 TRACE(c, "SPAKE final transcript hash: {hexdata}", thash) 48 #define TRACE_SPAKE_KDC_THASH(c, thash) \ argument 49 TRACE(c, "SPAKE final transcript hash: {hexdata}", thash)
|
| H A D | util.c | 76 krb5_data *thash, const krb5_data *data1, const krb5_data *data2) in update_thash() argument 83 if (thash->length == 0) { in update_thash() 88 ret = alloc_data(thash, hashlen); in update_thash() 94 dlist[0] = *thash; in update_thash() 98 (uint8_t *)thash->data); in update_thash() 151 const krb5_data *spakeresult, const krb5_data *thash, in derive_key() argument 171 dlist[5] = *thash; in derive_key()
|
| H A D | spake_client.c | 45 krb5_data thash; member 97 krb5_free_data_contents(context, &st->thash); in spake_request_fini() 212 ret = update_thash(context, gstate, ch->group, &st->thash, st->support, in process_challenge() 241 ret = update_thash(context, gstate, ch->group, &st->thash, &clpub, NULL); in process_challenge() 244 TRACE_SPAKE_CLIENT_THASH(context, &st->thash); in process_challenge() 248 &st->spakeresult, &st->thash, der_req, 0, &k0); in process_challenge() 257 &st->spakeresult, &st->thash, der_req, 1, &k1); in process_challenge()
|
| H A D | util.h | 42 int32_t group, krb5_data *thash, 53 const krb5_data *thash, const krb5_data *der_req,
|
| /freebsd/sys/netipsec/ |
| H A D | xform_ah.c | 181 const struct auth_hash *thash; in ah_init0() local 184 thash = auth_algorithm_lookup(sav->alg_auth); in ah_init0() 185 if (thash == NULL) { in ah_init0() 206 __func__, thash->name)); in ah_init0() 210 if (keylen > thash->keysize && thash->keysize != 0) { in ah_init0() 213 keylen, thash->name, thash->keysize)); in ah_init0() 218 sav->tdb_authalgxform = thash; in ah_init0()
|
| /freebsd/sys/opencrypto/ |
| H A D | cryptodev.c | 337 const struct auth_hash *thash; in cse_create() local 388 thash = crypto_auth_hash(&csp); in cse_create() 397 } else if (txform != NULL && thash != NULL) { in cse_create() 401 } else if (thash != NULL) { in cse_create() 436 if (thash != NULL) { in cse_create() 437 if (sop->mackeylen > thash->keysize || sop->mackeylen < 0) { in cse_create() 473 if (!(thash != NULL || csp.csp_mode == CSP_MODE_AEAD)) { in cse_create() 504 else if (thash != NULL) in cse_create() 505 cse->hashsize = thash->hashsize; in cse_create()
|