/external/openssh/ |
kexdhc.c | 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 123 if ((shared_secret = BN_new()) == NULL) 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexdhs.c | 53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 116 if ((shared_secret = BN_new()) == NULL) 118 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 134 shared_secret, 165 kex_derive_keys(kex, hash, hashlen, shared_secret); 166 BN_clear_free(shared_secret);
|
kexecdhc.c | 55 BIGNUM *shared_secret; local 121 if ((shared_secret = BN_new()) == NULL) 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexecdhs.c | 57 BIGNUM *shared_secret; local 103 /* Calculate shared_secret */ 113 if ((shared_secret = BN_new()) == NULL) 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 132 shared_secret, 163 kex_derive_keys(kex, hash, hashlen, shared_secret); 164 BN_clear_free(shared_secret);
|
kexgexc.c | 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 161 if ((shared_secret = BN_new()) == NULL) 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 183 shared_secret, 203 kex_derive_keys(kex, hash, hashlen, shared_secret); 204 BN_clear_free(shared_secret);
|
kexgexs.c | 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 153 if ((shared_secret = BN_new()) == NULL) 155 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 177 shared_secret, 209 kex_derive_keys(kex, hash, hashlen, shared_secret); 210 BN_clear_free(shared_secret);
|
kexdh.c | 49 BIGNUM *shared_secret, 72 buffer_put_bignum2(&b, shared_secret);
|
kexecdh.c | 77 const BIGNUM *shared_secret, 99 buffer_put_bignum2(&b, shared_secret);
|
kexgex.c | 51 BIGNUM *shared_secret, 82 buffer_put_bignum2(&b, shared_secret);
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_client.h | 27 u8 *shared_secret; member in struct:hostapd_radius_server 88 const u8 *shared_secret, size_t shared_secret_len,
|
radius_client.c | 38 const u8 *shared_secret, 57 u8 *shared_secret; member in struct:radius_msg_list 110 const u8 *shared_secret, 354 RadiusType msg_type, u8 *shared_secret, 379 entry->shared_secret = shared_secret; 445 u8 *shared_secret; local 463 shared_secret = conf->acct_server->shared_secret; 465 radius_msg_finish_acct(msg, shared_secret, shared_secret_len) [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 515 const u8 *shared_secret, 538 entry->shared_secret = shared_secret; 626 const u8 *shared_secret; local 645 shared_secret = conf->acct_server->shared_secret [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
chrome_ex_oauthsimple.js | 46 * shared_secret is the shared secret (duh). 48 * Both the api_key and shared_secret are generally provided by the site 65 shared_secret:'xyz-5309' 79 * @param shared_secret (string) The shared secret. This value is also usually provided by the site you wish to use. 81 OAuthSimple = function (consumer_key,shared_secret) 85 if (shared_secret == undefined) 86 throw("Missing argument: shared_secret (shared secret) for OAuthSimple. This is usually provided by the hosting site."); 94 if (shared_secret !== undefined) { 95 this._secrets['shared_secret'] = shared_secret; [all...] |
chrome_ex_oauth.js | 185 shared_secret : this.consumer_secret, 216 shared_secret : this.consumer_secret, 493 shared_secret : this.consumer_secret 557 shared_secret : this.consumer_secret,
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
chrome_ex_oauthsimple.js | 46 * shared_secret is the shared secret (duh). 48 * Both the api_key and shared_secret are generally provided by the site 65 shared_secret:'xyz-5309' 79 * @param shared_secret (string) The shared secret. This value is also usually provided by the site you wish to use. 81 OAuthSimple = function (consumer_key,shared_secret) 85 if (shared_secret == undefined) 86 throw("Missing argument: shared_secret (shared secret) for OAuthSimple. This is usually provided by the hosting site."); 94 if (shared_secret !== undefined) { 95 this._secrets['shared_secret'] = shared_secret; [all...] |
chrome_ex_oauth.js | 185 shared_secret : this.consumer_secret, 216 shared_secret : this.consumer_secret, 493 shared_secret : this.consumer_secret 557 shared_secret : this.consumer_secret,
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
chrome_ex_oauthsimple.js | 46 * shared_secret is the shared secret (duh). 48 * Both the api_key and shared_secret are generally provided by the site 65 shared_secret:'xyz-5309' 79 * @param shared_secret (string) The shared secret. This value is also usually provided by the site you wish to use. 81 OAuthSimple = function (consumer_key,shared_secret) 85 if (shared_secret == undefined) 86 throw("Missing argument: shared_secret (shared secret) for OAuthSimple. This is usually provided by the hosting site."); 94 if (shared_secret !== undefined) { 95 this._secrets['shared_secret'] = shared_secret; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.h | 50 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.h | 49 u8 *shared_secret; member in struct:ikev2_initiator_data
|
ikev2.c | 33 os_free(data->shared_secret); 624 &data->keys, 0, data->shared_secret, 1074 &data->keys, 1, data->shared_secret, 1146 os_free(data->shared_secret); 1147 data->shared_secret = os_malloc(16); 1148 if (data->shared_secret == NULL) 1151 if (os_get_random(data->shared_secret, 16)) 1154 os_free(data->shared_secret); 1155 data->shared_secret = os_malloc(secret_len); 1156 if (data->shared_secret == NULL [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
ikev2.c | 28 os_free(data->shared_secret); 619 &data->keys, 0, data->shared_secret, 1069 &data->keys, 1, data->shared_secret, 1141 os_free(data->shared_secret); 1142 data->shared_secret = os_malloc(16); 1143 if (data->shared_secret == NULL) 1146 if (random_get_bytes(data->shared_secret, 16)) 1149 os_free(data->shared_secret); 1150 data->shared_secret = os_malloc(secret_len); 1151 if (data->shared_secret == NULL [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 137 hapd->conf->radius->auth_server->shared_secret, 396 * @shared_secret: RADIUS shared secret 397 * @shared_secret_len: Length of shared_secret in octets 404 const u8 *shared_secret, size_t shared_secret_len, 427 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 474 hapd->conf->radius->auth_server->shared_secret,
|