/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 31 len[1] = secret_len;
|
chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 24 len[1] = secret_len;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
sha256.h | 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/external/ppp/pppd/ |
chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len);
|
chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) 523 int mdlen = secret_len; [all...] |
chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
chap-new.c | 404 int secret_len; local 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 427 int secret_len; local 448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 449 secret_len = 0; /* assume null secret if can't find one */ 458 secret, secret_len, cs->priv); 459 memset(secret, 0, secret_len);
|
/external/wpa_supplicant_8/src/radius/ |
radius.h | 192 size_t secret_len); 194 size_t secret_len, const u8 *req_authenticator); 196 size_t secret_len); 204 size_t secret_len, struct radius_msg *sent_msg, 207 size_t secret_len, const u8 *req_auth); 214 const u8 *secret, size_t secret_len); 217 const u8 *secret, size_t secret_len); 220 const u8 *secret, size_t secret_len, 226 const u8 *secret, size_t secret_len); 230 const u8 *secret, size_t secret_len, [all...] |
radius.c | 338 size_t secret_len) 354 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 369 size_t secret_len, const u8 *req_authenticator) 386 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 397 len[3] = secret_len; 410 size_t secret_len) 420 len[1] = secret_len; 623 size_t secret_len, const u8 *req_auth) 655 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 673 size_t secret_len, struct radius_msg *sent_msg, int auth [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.h | 211 size_t secret_len); 213 size_t secret_len, const u8 *req_authenticator); 215 size_t secret_len); 223 size_t secret_len, struct radius_msg *sent_msg, 226 size_t secret_len, const u8 *req_auth); 233 const u8 *secret, size_t secret_len); 236 const u8 *secret, size_t secret_len); 239 const u8 *secret, size_t secret_len, 245 const u8 *secret, size_t secret_len);
|
radius.c | 297 size_t secret_len) 313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 328 size_t secret_len, const u8 *req_authenticator) 345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 356 len[3] = secret_len; 369 size_t secret_len) 379 len[1] = secret_len; 586 size_t secret_len, const u8 *req_auth) 618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth); 635 size_t secret_len, struct radius_msg *sent_msg, int auth [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.h | 28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.h | 56 size_t IDr_len, size_t *secret_len);
|
ikev2.c | 1134 size_t secret_len; local 1137 data->IDr_len, &secret_len); 1155 data->shared_secret = os_malloc(secret_len); 1158 os_memcpy(data->shared_secret, secret, secret_len); 1159 data->shared_secret_len = secret_len;
|
eap_ikev2.c | 38 size_t *secret_len) 55 *secret_len = sm->user->password_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/external/openssh/ |
auth2-jpake.c | 277 u_int secret_len, salt_len; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 363 bzero(secret, secret_len);
|