Searched refs:secret_len (Results 1 - 21 of 21) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dchap.c22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
31 len[1] = secret_len;
H A Dchap.h20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap_ms.c194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
523 int mdlen = secret_len;
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
H A Dchap-new.c404 int secret_len; local
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
427 int secret_len; local
448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) {
449 secret_len = 0; /* assume null secret if can't find one */
458 secret, secret_len, cs->priv);
459 memset(secret, 0, secret_len);
H A Deap.c1318 int secret_len; local
1443 rhostname, secret, &secret_len, 0)) {
1451 MD5_Update(&mdContext, secret, secret_len);
1728 int secret_len; local
1869 esp->es_server.ea_name, secret, &secret_len, 1)) {
1876 MD5_Update(&mdContext, secret, secret_len);
H A Dauth.c1910 get_secret(unit, client, server, secret, secret_len, am_server)
1915 int *secret_len;
1964 *secret_len = len;
/external/wpa_supplicant/
H A Dradius.h206 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len);
208 size_t secret_len, const u8 *req_authenticator);
210 size_t secret_len);
218 size_t secret_len, struct radius_msg *sent_msg,
221 size_t secret_len, const u8 *req_auth);
228 u8 *secret, size_t secret_len);
231 u8 *secret, size_t secret_len);
234 const u8 *secret, size_t secret_len,
240 u8 *secret, size_t secret_len);
H A Dradius.c289 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len) argument
305 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
320 size_t secret_len, const u8 *req_authenticator)
337 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
348 len[3] = secret_len;
361 size_t secret_len)
371 len[1] = secret_len;
582 size_t secret_len, const u8 *req_auth)
613 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth);
630 size_t secret_len, struc
319 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
360 radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, size_t secret_len) argument
581 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
629 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
776 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
848 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
898 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument
939 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument
968 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1042 radius_msg_add_attr_user_password(struct radius_msg *msg, u8 *data, size_t data_len, u8 *secret, size_t secret_len) argument
[all...]
H A Dsha1.h28 int tls_prf(const u8 *secret, size_t secret_len, const char *label,
H A Dsha1.c218 * @secret_len: Length of the key in bytes
229 int tls_prf(const u8 *secret, size_t secret_len, const char *label, argument
242 if (secret_len & 1)
265 L_S1 = L_S2 = (secret_len + 1) / 2;
268 if (secret_len & 1) {
H A Dtls_openssl.c2101 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument
2112 *secret_len = conn->pre_shared_secret_len;
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius.h211 size_t secret_len);
213 size_t secret_len, const u8 *req_authenticator);
215 size_t secret_len);
223 size_t secret_len, struct radius_msg *sent_msg,
226 size_t secret_len, const u8 *req_auth);
233 const u8 *secret, size_t secret_len);
236 const u8 *secret, size_t secret_len);
239 const u8 *secret, size_t secret_len,
245 const u8 *secret, size_t secret_len);
H A Dradius.c297 size_t secret_len)
313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
328 size_t secret_len, const u8 *req_authenticator)
345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
356 len[3] = secret_len;
369 size_t secret_len)
379 len[1] = secret_len;
586 size_t secret_len, const u8 *req_auth)
618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth);
635 size_t secret_len, struc
296 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
327 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
368 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
585 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
634 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
781 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
853 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
902 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
943 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
972 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1046 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dsha1.h28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
H A Dsha1.c218 * @secret_len: Length of the key in bytes
229 int tls_prf(const u8 *secret, size_t secret_len, const char *label, argument
242 if (secret_len & 1)
265 L_S1 = L_S2 = (secret_len + 1) / 2;
268 if (secret_len & 1) {
H A Dtls_openssl.c2593 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument
2614 *secret_len = SSL_MAX_MASTER_KEY_LENGTH;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.h56 size_t IDr_len, size_t *secret_len);
H A Dikev2.c1134 size_t secret_len; local
1137 data->IDr_len, &secret_len);
1155 data->shared_secret = os_malloc(secret_len);
1158 os_memcpy(data->shared_secret, secret, secret_len);
1159 data->shared_secret_len = secret_len;
H A Deap_ikev2.c38 size_t *secret_len)
55 *secret_len = sm->user->password_len;
36 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument

Completed in 172 milliseconds