HomeSort by relevance Sort by last modified time
    Searched refs:shared_secret (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant/
radius_client.h 27 u8 *shared_secret; member in struct:hostapd_radius_server
85 u8 *shared_secret, size_t shared_secret_len,
radius_client.c 38 u8 *shared_secret, size_t shared_secret_len,
56 u8 *shared_secret; member in struct:radius_msg_list
109 u8 *shared_secret,
353 RadiusType msg_type, u8 *shared_secret,
378 entry->shared_secret = shared_secret;
444 u8 *shared_secret; local
462 shared_secret = conf->acct_server->shared_secret;
464 radius_msg_finish_acct(msg, shared_secret, shared_secret_len)
    [all...]
eapol_test.c 407 os_free(e->radius_conf->auth_server->shared_secret);
566 u8 *shared_secret, size_t shared_secret_len)
570 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
603 u8 *shared_secret, size_t shared_secret_len,
617 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
644 ieee802_1x_get_keys(e, msg, req, shared_secret,
697 as->shared_secret = (u8 *) os_strdup(secret);
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius_client.h 27 u8 *shared_secret; member in struct:hostapd_radius_server
88 const u8 *shared_secret, size_t shared_secret_len,
radius_client.c 38 const u8 *shared_secret,
57 u8 *shared_secret; member in struct:radius_msg_list
110 const u8 *shared_secret,
354 RadiusType msg_type, u8 *shared_secret,
379 entry->shared_secret = shared_secret;
445 u8 *shared_secret; local
463 shared_secret = conf->acct_server->shared_secret;
465 radius_msg_finish_acct(msg, shared_secret, shared_secret_len)
    [all...]
radius_server.c 73 char *shared_secret; member in struct:radius_client
395 (u8 *) client->shared_secret,
411 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
456 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
753 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
869 os_free(prev->shared_secret);
980 entry->shared_secret = os_strdup(pos);
981 if (entry->shared_secret == NULL) {
986 entry->shared_secret_len = os_strlen(entry->shared_secret);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.h 50 u8 *shared_secret; member in struct:ikev2_responder_data
eap_ikev2.c 95 data->ikev2.shared_secret = os_malloc(password_len);
96 if (data->ikev2.shared_secret == NULL)
98 os_memcpy(data->ikev2.shared_secret, password, password_len);
ikev2.c 29 os_free(data->shared_secret);
590 &data->keys, 1, data->shared_secret,
1055 &data->keys, 0, data->shared_secret,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.h 49 u8 *shared_secret; member in struct:ikev2_initiator_data
ikev2.c 33 os_free(data->shared_secret);
624 &data->keys, 0, data->shared_secret,
1074 &data->keys, 1, data->shared_secret,
1146 os_free(data->shared_secret);
1147 data->shared_secret = os_malloc(16);
1148 if (data->shared_secret == NULL)
1151 if (os_get_random(data->shared_secret, 16))
1154 os_free(data->shared_secret);
1155 data->shared_secret = os_malloc(secret_len);
1156 if (data->shared_secret == NULL
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 454 os_free(e->radius_conf->auth_server->shared_secret);
620 const u8 *shared_secret,
625 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
668 const u8 *shared_secret, size_t shared_secret_len,
682 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
709 ieee802_1x_get_keys(e, msg, req, shared_secret,
763 as->shared_secret = (u8 *) os_strdup(secret);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.h 299 const u8 *shared_secret, size_t shared_secret_len,
ikev2_common.c 439 const u8 *shared_secret, size_t shared_secret_len,
451 shared_secret == NULL || nonce == NULL || prf == NULL)
481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,

Completed in 749 milliseconds