Searched refs:secret (Results 1 - 25 of 37) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dchap.c22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
30 addr[1] = secret;
H A Dchap.h20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/ipsec-tools/src/racoon/
H A Dsafefile.c48 safefile(path, secret)
50 int secret;
83 /* secret file should not be read by others */
84 if (secret) {
/external/ppp/pppd/plugins/radius/
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
H A Dconfig.c450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
H A Dradius.c200 * 1 -- we are ALWAYS willing to supply a secret. :-)
344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */
746 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
754 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
810 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
825 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
[all...]
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
H A Dchap_ms.c194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
535 MD4Update(&md4Context, (unsigned char *)secret, mdle
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dauth.c766 error("No secret found for PAP login");
1261 "but I couldn't find any suitable secret (password) for it to use to do so.");
1348 char secret[MAXWORDLEN];
1380 * Open the file of pap secrets and scan for a suitable secret
1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1393 warn("no PAP secret found for %s", user);
1396 * If the secret is "@login", it means to check
1399 int login_secret = strcmp(secret, "@login") == 0;
1402 /* login option or secret is @login */
1406 if (secret[
1694 char secret[MAXWORDLEN]; local
1744 char secret[MAXWORDLEN]; local
[all...]
H A Dchap-new.c403 unsigned char secret[MAXSECRETLEN]; local
406 /* Get the secret that the peer is supposed to know */
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
408 error("No CHAP secret found for authenticating %q", name);
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
414 memset(secret, 0, sizeof(secret));
431 char secret[MAXSECRETLEN+1]; local
447 /* get secret for authenticating ourselves with the specified host */
448 if (!get_secret(0, cs->name, rname, secret,
[all...]
H A Deap.c83 static char *pn_secret = NULL; /* Pseudonym generating secret */
103 { "srp-pn-secret", o_string, &pn_secret,
104 "Long term pseudonym generation secret" },
312 * Set DES key according to pseudonym-generating secret and current
1319 char secret[MAXWORDLEN]; local
1439 * Get the secret for authenticating ourselves with
1443 rhostname, secret, &secret_len, 0)) {
1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname);
1451 MD5_Update(&mdContext, secret, secret_len);
1452 BZERO(secret, sizeo
1729 char secret[MAXSECRETLEN]; local
[all...]
/external/openssl/crypto/jpake/
H A Djpaketest.c120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
H A Djpake.c28 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
78 const BIGNUM *secret)
85 ctx->secret = BN_dup(secret);
106 BN_clear_free(ctx->secret);
118 const BIGNUM *secret)
122 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
332 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
370 BN_sub(t2, ctx->p.q, ctx->secret);
75 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
116 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
[all...]
H A Djpake.h60 const BIGNUM *secret);
/external/tcpdump/
H A Dprint-esp.c78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret
[all...]
/external/wpa_supplicant/
H A Dradius.h206 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len);
207 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
209 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret,
217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
228 u8 *secret, size_t secret_len);
231 u8 *secret, size_t secret_len);
234 const u8 *secret, size_t secret_len,
240 u8 *secret, size_t secret_len);
H A Dradius.c289 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len) argument
291 if (secret) {
305 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
319 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument
337 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
347 addr[3] = secret;
360 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, argument
370 addr[1] = secret;
581 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, argument
613 hmac_md5(secret, secret_le
629 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
776 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
848 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
898 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument
939 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument
968 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1042 radius_msg_add_attr_user_password(struct radius_msg *msg, u8 *data, size_t data_len, u8 *secret, size_t secret_len) argument
[all...]
H A Dsha1.h28 int tls_prf(const u8 *secret, size_t secret_len, const char *label,
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius.h210 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
212 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
214 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
222 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
225 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
233 const u8 *secret, size_t secret_len);
236 const u8 *secret, size_t secret_len);
239 const u8 *secret, size_t secret_len,
245 const u8 *secret, size_t secret_len);
H A Dradius.c296 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument
299 if (secret) {
313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
327 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument
345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
355 addr[3] = secret;
368 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument
378 addr[1] = secret;
585 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, argument
618 hmac_md5(secret, secret_le
634 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
781 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
853 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
902 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
943 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
972 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1046 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
[all...]
/external/dbus/dbus/
H A Ddbus-keyring.c2 /* dbus-keyring.c Store secret cookies in your homedir
42 * The secret keys are not kept in locked memory, and are written to a
101 DBusString secret; /**< the actual key */ member in struct:__anon721
172 _dbus_string_free (&keys[i].secret);
357 if (!_dbus_string_init (&keys[n_keys-1].secret))
369 &keys[n_keys-1].secret,
373 _dbus_string_free (&keys[n_keys-1].secret);
491 _dbus_verbose ("could not parse secret key ID at start of line\n");
497 _dbus_verbose ("invalid secret key ID at start of line\n");
507 _dbus_verbose ("could not parse secret ke
[all...]
/external/mtpd/
H A Dl2tp.c103 static char *secret; variable
266 if (!secret || !vector || length < 2) {
276 MD5_Update(&ctx, secret, secret_length);
284 MD5_Update(&ctx, secret, secret_length);
340 secret = argv[2];
379 MD5_Update(&ctx, secret, secret_length);
387 if (secret) {
401 if (secret) {
564 .usage = "<server> <port> [secret]",
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dsha1.h28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
/external/openssl/apps/
H A Dapps.h342 void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
343 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);

Completed in 179 milliseconds

12