HomeSort by relevance Sort by last modified time
    Searched refs:secret_len (Results 1 - 25 of 35) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
chap.c 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
31 len[1] = secret_len;
chap.h 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
24 len[1] = secret_len;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
sha1-tlsprf.c 19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label,
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
sha256.h 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
sha1.h 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
  /external/ppp/pppd/
chap-md5.c 58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
chap_ms.c 194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE])
523 int mdlen = secret_len;
    [all...]
chap-new.h 102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
chap-new.c 404 int secret_len; local
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
427 int secret_len; local
448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) {
449 secret_len = 0; /* assume null secret if can't find one */
458 secret, secret_len, cs->priv);
459 memset(secret, 0, secret_len);
  /external/wpa_supplicant_8/src/radius/
radius.h 192 size_t secret_len);
194 size_t secret_len, const u8 *req_authenticator);
196 size_t secret_len);
204 size_t secret_len, struct radius_msg *sent_msg,
207 size_t secret_len, const u8 *req_auth);
214 const u8 *secret, size_t secret_len);
217 const u8 *secret, size_t secret_len);
220 const u8 *secret, size_t secret_len,
226 const u8 *secret, size_t secret_len);
230 const u8 *secret, size_t secret_len,
    [all...]
radius.c 338 size_t secret_len)
354 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
369 size_t secret_len, const u8 *req_authenticator)
386 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
397 len[3] = secret_len;
410 size_t secret_len)
420 len[1] = secret_len;
623 size_t secret_len, const u8 *req_auth)
655 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
673 size_t secret_len, struct radius_msg *sent_msg, int auth
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.h 211 size_t secret_len);
213 size_t secret_len, const u8 *req_authenticator);
215 size_t secret_len);
223 size_t secret_len, struct radius_msg *sent_msg,
226 size_t secret_len, const u8 *req_auth);
233 const u8 *secret, size_t secret_len);
236 const u8 *secret, size_t secret_len);
239 const u8 *secret, size_t secret_len,
245 const u8 *secret, size_t secret_len);
radius.c 297 size_t secret_len)
313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
328 size_t secret_len, const u8 *req_authenticator)
345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
356 len[3] = secret_len;
369 size_t secret_len)
379 len[1] = secret_len;
586 size_t secret_len, const u8 *req_auth)
618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth);
635 size_t secret_len, struct radius_msg *sent_msg, int auth
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha1.h 28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.h 56 size_t IDr_len, size_t *secret_len);
ikev2.c 1134 size_t secret_len; local
1137 data->IDr_len, &secret_len);
1155 data->shared_secret = os_malloc(secret_len);
1158 os_memcpy(data->shared_secret, secret, secret_len);
1159 data->shared_secret_len = secret_len;
eap_ikev2.c 38 size_t *secret_len)
55 *secret_len = sm->user->password_len;
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 50 size_t IDr_len, size_t *secret_len);
ikev2.c 1129 size_t secret_len; local
1132 data->IDr_len, &secret_len);
1150 data->shared_secret = os_malloc(secret_len);
1153 os_memcpy(data->shared_secret, secret, secret_len);
1154 data->shared_secret_len = secret_len;
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
tlsv1_common.h 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
  /external/openssh/
auth2-jpake.c 277 u_int secret_len, salt_len; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
363 bzero(secret, secret_len);

Completed in 759 milliseconds

1 2