/external/wpa_supplicant/ |
radius_client.h | 27 u8 *shared_secret; member in struct:hostapd_radius_server 85 u8 *shared_secret, size_t shared_secret_len,
|
radius_client.c | 38 u8 *shared_secret, size_t shared_secret_len, 56 u8 *shared_secret; member in struct:radius_msg_list 109 u8 *shared_secret, 353 RadiusType msg_type, u8 *shared_secret, 378 entry->shared_secret = shared_secret; 444 u8 *shared_secret; local 462 shared_secret = conf->acct_server->shared_secret; 464 radius_msg_finish_acct(msg, shared_secret, shared_secret_len) [all...] |
eapol_test.c | 407 os_free(e->radius_conf->auth_server->shared_secret); 566 u8 *shared_secret, size_t shared_secret_len) 570 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 603 u8 *shared_secret, size_t shared_secret_len, 617 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 644 ieee802_1x_get_keys(e, msg, req, shared_secret, 697 as->shared_secret = (u8 *) os_strdup(secret);
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_client.h | 27 u8 *shared_secret; member in struct:hostapd_radius_server 88 const u8 *shared_secret, size_t shared_secret_len,
|
radius_client.c | 38 const u8 *shared_secret, 57 u8 *shared_secret; member in struct:radius_msg_list 110 const u8 *shared_secret, 354 RadiusType msg_type, u8 *shared_secret, 379 entry->shared_secret = shared_secret; 445 u8 *shared_secret; local 463 shared_secret = conf->acct_server->shared_secret; 465 radius_msg_finish_acct(msg, shared_secret, shared_secret_len) [all...] |
radius_server.c | 73 char *shared_secret; member in struct:radius_client 395 (u8 *) client->shared_secret, 411 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 456 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 753 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 869 os_free(prev->shared_secret); 980 entry->shared_secret = os_strdup(pos); 981 if (entry->shared_secret == NULL) { 986 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.h | 50 u8 *shared_secret; member in struct:ikev2_responder_data
|
eap_ikev2.c | 95 data->ikev2.shared_secret = os_malloc(password_len); 96 if (data->ikev2.shared_secret == NULL) 98 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
ikev2.c | 29 os_free(data->shared_secret); 590 &data->keys, 1, data->shared_secret, 1055 &data->keys, 0, data->shared_secret, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.h | 49 u8 *shared_secret; member in struct:ikev2_initiator_data
|
ikev2.c | 33 os_free(data->shared_secret); 624 &data->keys, 0, data->shared_secret, 1074 &data->keys, 1, data->shared_secret, 1146 os_free(data->shared_secret); 1147 data->shared_secret = os_malloc(16); 1148 if (data->shared_secret == NULL) 1151 if (os_get_random(data->shared_secret, 16)) 1154 os_free(data->shared_secret); 1155 data->shared_secret = os_malloc(secret_len); 1156 if (data->shared_secret == NULL [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 454 os_free(e->radius_conf->auth_server->shared_secret); 620 const u8 *shared_secret, 625 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 668 const u8 *shared_secret, size_t shared_secret_len, 682 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 709 ieee802_1x_get_keys(e, msg, req, shared_secret, 763 as->shared_secret = (u8 *) os_strdup(secret);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.h | 299 const u8 *shared_secret, size_t shared_secret_len,
|
ikev2_common.c | 439 const u8 *shared_secret, size_t shared_secret_len, 451 shared_secret == NULL || nonce == NULL || prf == NULL) 481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
|