/external/openssh/ |
kexdhc.c | 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 123 if ((shared_secret = BN_new()) == NULL) 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexdhs.c | 53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 116 if ((shared_secret = BN_new()) == NULL) 118 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 134 shared_secret, 165 kex_derive_keys(kex, hash, hashlen, shared_secret); 166 BN_clear_free(shared_secret);
|
kexecdhc.c | 55 BIGNUM *shared_secret; local 121 if ((shared_secret = BN_new()) == NULL) 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexecdhs.c | 57 BIGNUM *shared_secret; local 103 /* Calculate shared_secret */ 113 if ((shared_secret = BN_new()) == NULL) 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 132 shared_secret, 163 kex_derive_keys(kex, hash, hashlen, shared_secret); 164 BN_clear_free(shared_secret);
|
kexgexc.c | 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 161 if ((shared_secret = BN_new()) == NULL) 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 183 shared_secret, 203 kex_derive_keys(kex, hash, hashlen, shared_secret); 204 BN_clear_free(shared_secret);
|
kexgexs.c | 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 153 if ((shared_secret = BN_new()) == NULL) 155 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 177 shared_secret, 209 kex_derive_keys(kex, hash, hashlen, shared_secret); 210 BN_clear_free(shared_secret);
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.h | 32 const u8 *shared_secret; member in struct:radius_das_conf
|
radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
radius_das.c | 24 u8 *shared_secret; member in struct:radius_das_data 191 if (radius_msg_verify_das_req(msg, das->shared_secret, 254 if (radius_msg_finish_das_resp(reply, das->shared_secret, 309 if (conf->port == 0 || conf->shared_secret == NULL || 325 das->shared_secret = os_malloc(conf->shared_secret_len); 326 if (das->shared_secret == NULL) { 330 os_memcpy(das->shared_secret, conf->shared_secret, 362 os_free(das->shared_secret);
|
radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 515 const u8 *shared_secret, 538 entry->shared_secret = shared_secret; 626 const u8 *shared_secret; local 645 shared_secret = conf->acct_server->shared_secret [all...] |
radius_server.c | 86 char *shared_secret; member in struct:radius_client 599 (u8 *) client->shared_secret, 614 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 659 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 955 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1068 os_free(prev->shared_secret); 1179 entry->shared_secret = os_strdup(pos); 1180 if (entry->shared_secret == NULL) { 1185 entry->shared_secret_len = os_strlen(entry->shared_secret); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|