/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 30 addr[1] = secret;
|
H A D | chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/ipsec-tools/src/racoon/ |
H A D | safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/external/ppp/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
H A D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument 492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */ 495 memset (secret, '\0', MAX_SECRET_LENGTH); 501 strncpy (secret, s, (size_t) len); 502 secret[MAX_SECRET_LENGTH] = '\0'; 538 memset (secret, '\0', sizeof (secret));
|
H A D | radius.c | 200 * 1 -- we are ALWAYS willing to supply a secret. :-) 344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */ 746 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 754 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 810 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 825 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); [all...] |
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
H A D | chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 535 MD4Update(&md4Context, (unsigned char *)secret, mdle 193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | auth.c | 766 error("No secret found for PAP login"); 1261 "but I couldn't find any suitable secret (password) for it to use to do so."); 1348 char secret[MAXWORDLEN]; 1380 * Open the file of pap secrets and scan for a suitable secret 1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1393 warn("no PAP secret found for %s", user); 1396 * If the secret is "@login", it means to check 1399 int login_secret = strcmp(secret, "@login") == 0; 1402 /* login option or secret is @login */ 1406 if (secret[ 1694 char secret[MAXWORDLEN]; local 1744 char secret[MAXWORDLEN]; local [all...] |
H A D | chap-new.c | 403 unsigned char secret[MAXSECRETLEN]; local 406 /* Get the secret that the peer is supposed to know */ 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 408 error("No CHAP secret found for authenticating %q", name); 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 414 memset(secret, 0, sizeof(secret)); 431 char secret[MAXSECRETLEN+1]; local 447 /* get secret for authenticating ourselves with the specified host */ 448 if (!get_secret(0, cs->name, rname, secret, [all...] |
H A D | eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 103 { "srp-pn-secret", o_string, &pn_secret, 104 "Long term pseudonym generation secret" }, 312 * Set DES key according to pseudonym-generating secret and current 1319 char secret[MAXWORDLEN]; local 1439 * Get the secret for authenticating ourselves with 1443 rhostname, secret, &secret_len, 0)) { 1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname); 1451 MD5_Update(&mdContext, secret, secret_len); 1452 BZERO(secret, sizeo 1729 char secret[MAXSECRETLEN]; local [all...] |
/external/openssl/crypto/jpake/ |
H A D | jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
H A D | jpake.c | 28 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 78 const BIGNUM *secret) 85 ctx->secret = BN_dup(secret); 106 BN_clear_free(ctx->secret); 118 const BIGNUM *secret) 122 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 332 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 370 BN_sub(t2, ctx->p.q, ctx->secret); 75 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument 116 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument [all...] |
H A D | jpake.h | 60 const BIGNUM *secret);
|
/external/tcpdump/ |
H A D | print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret [all...] |
/external/wpa_supplicant/ |
H A D | radius.h | 206 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len); 207 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 209 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 u8 *secret, size_t secret_len); 231 u8 *secret, size_t secret_len); 234 const u8 *secret, size_t secret_len, 240 u8 *secret, size_t secret_len);
|
H A D | radius.c | 289 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len) argument 291 if (secret) { 305 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 319 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 337 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 347 addr[3] = secret; 360 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, argument 370 addr[1] = secret; 581 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, argument 613 hmac_md5(secret, secret_le 629 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 776 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 848 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 898 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument 939 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, u8 *secret, size_t secret_len) argument 968 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1042 radius_msg_add_attr_user_password(struct radius_msg *msg, u8 *data, size_t data_len, u8 *secret, size_t secret_len) argument [all...] |
H A D | sha1.h | 28 int tls_prf(const u8 *secret, size_t secret_len, const char *label,
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.h | 210 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 212 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 214 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 222 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 225 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 233 const u8 *secret, size_t secret_len); 236 const u8 *secret, size_t secret_len); 239 const u8 *secret, size_t secret_len, 245 const u8 *secret, size_t secret_len);
|
H A D | radius.c | 296 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 299 if (secret) { 313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 327 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, 355 addr[3] = secret; 368 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 378 addr[1] = secret; 585 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, argument 618 hmac_md5(secret, secret_le 634 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 781 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 853 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 902 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 943 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 972 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1046 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument [all...] |
/external/dbus/dbus/ |
H A D | dbus-keyring.c | 2 /* dbus-keyring.c Store secret cookies in your homedir 42 * The secret keys are not kept in locked memory, and are written to a 101 DBusString secret; /**< the actual key */ member in struct:__anon721 172 _dbus_string_free (&keys[i].secret); 357 if (!_dbus_string_init (&keys[n_keys-1].secret)) 369 &keys[n_keys-1].secret, 373 _dbus_string_free (&keys[n_keys-1].secret); 491 _dbus_verbose ("could not parse secret key ID at start of line\n"); 497 _dbus_verbose ("invalid secret key ID at start of line\n"); 507 _dbus_verbose ("could not parse secret ke [all...] |
/external/mtpd/ |
H A D | l2tp.c | 103 static char *secret; variable 266 if (!secret || !vector || length < 2) { 276 MD5_Update(&ctx, secret, secret_length); 284 MD5_Update(&ctx, secret, secret_length); 340 secret = argv[2]; 379 MD5_Update(&ctx, secret, secret_length); 387 if (secret) { 401 if (secret) { 564 .usage = "<server> <port> [secret]",
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | sha1.h | 28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
|
/external/openssl/apps/ |
H A D | apps.h | 342 void jpake_client_auth(BIO *out, BIO *conn, const char *secret); 343 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|