/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 24 len[1] = secret_len;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
tls_openssl.c | [all...] |
/external/ppp/pppd/ |
chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len);
|
chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) 523 int mdlen = secret_len; [all...] |
chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
chap-new.c | 404 int secret_len; local 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 427 int secret_len; local 448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 449 secret_len = 0; /* assume null secret if can't find one */ 458 secret, secret_len, cs->priv); 459 memset(secret, 0, secret_len);
|
eap.c | 1318 int secret_len; local 1728 int secret_len; local [all...] |
auth.c | [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.h | 199 size_t secret_len); 201 size_t secret_len, const u8 *req_authenticator); 203 size_t secret_len, 206 size_t secret_len); 208 size_t secret_len); 210 size_t secret_len); 218 size_t secret_len, struct radius_msg *sent_msg, 221 size_t secret_len, const u8 *req_auth); 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_t secret_len); [all...] |
radius.c | 345 size_t secret_len) 361 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 376 size_t secret_len, const u8 *req_authenticator) 393 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 404 len[3] = secret_len; 417 size_t secret_len, 435 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 442 len[1] = secret_len; 456 size_t secret_len) 466 len[1] = secret_len; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
eap_server_ikev2.c | 32 size_t *secret_len) 49 *secret_len = sm->user->password_len;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/external/openssh/ |
auth2-jpake.c | 277 u_int secret_len, salt_len; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 363 bzero(secret, secret_len);
|
sshconnect2.c | 989 u_int secret_len; local 1010 &secret, &secret_len) != 0) 1018 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL) 1020 bzero(secret, secret_len); [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_sess.c | 914 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, [all...] |
/external/openssl/ssl/ |
ssl_sess.c | 914 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl.h | 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); [all...] |