/external/openssh/ |
auth2-jpake.c | 277 u_int secret_len, salt_len; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 363 bzero(secret, secret_len);
|
sshconnect2.c | 989 u_int secret_len; local 1010 &secret, &secret_len) != 0) 1018 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL) 1020 bzero(secret, secret_len); [all...] |
/external/ppp/pppd/ |
chap-new.c | 404 int secret_len; local 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 427 int secret_len; local 448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 449 secret_len = 0; /* assume null secret if can't find one */ 458 secret, secret_len, cs->priv); 459 memset(secret, 0, secret_len);
|
eap.c | 1318 int secret_len; local 1728 int secret_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|