/system/keymaster/ |
ecies_kem.cpp | 90 Buffer shared_secret; local 92 &shared_secret)) { 109 Buffer actual_secret(z.available_read() + shared_secret.available_read()); 111 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read()); 144 Buffer shared_secret; local 145 if (!key_exchange_->CalculateSharedKey(encrypted_key, encrypted_key_len, &shared_secret)) { 164 Buffer actual_secret(z.available_read() + shared_secret.available_read()); 166 actual_secret.write(shared_secret.peek_read(), shared_secret.available_read()) [all...] |
nist_curve_key_exchange_test.cpp | 135 const char* shared_secret; member in struct:keymaster::test::NistCurveTest 187 string shared_secret = hex2str(test.shared_secret); local 204 EXPECT_EQ(shared_secret.size(), computed_shared_secret.available_read()); 205 EXPECT_EQ(0, memcmp(shared_secret.data(), computed_shared_secret.peek_read(), 206 shared_secret.size()));
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/src/radius/ |
radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 236 if (radius_msg_verify_das_req(msg, das->shared_secret, 300 if (radius_msg_finish_das_resp(reply, das->shared_secret, 355 if (conf->port == 0 || conf->shared_secret == NULL || 371 das->shared_secret = os_malloc(conf->shared_secret_len); 372 if (das->shared_secret == NULL) { 376 os_memcpy(das->shared_secret, conf->shared_secret, 408 os_free(das->shared_secret);
|
radius_das.h | 42 const u8 *shared_secret; member in struct:radius_das_conf
|
radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 280 const u8 *shared_secret, 445 radius_msg_finish_acct(entry->msg, entry->shared_secret, 648 const u8 *shared_secret, 671 entry->shared_secret = shared_secret; 728 const u8 *shared_secret; local [all...] |
radius_server.c | 105 char *shared_secret; member in struct:radius_client 780 (u8 *) client->shared_secret, 836 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 879 (u8 *) client->shared_secret, 917 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 962 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/ImageMagick/MagickCore/ |
distribute-cache.c | 185 *shared_secret; 207 shared_secret=GetPolicyValue("shared-secret"); 208 if (shared_secret == (char *) NULL) 210 shared_secret=DestroyString(shared_secret); 215 shared_secret=DestroyString(shared_secret); 776 *shared_secret; 813 shared_secret=GetPolicyValue("shared-secret"); 814 if (shared_secret == (char *) NULL 182 *shared_secret; local 771 *shared_secret; local [all...] |