/external/wpa_supplicant/ |
H A D | radius_client.h | 27 u8 *shared_secret; member in struct:hostapd_radius_server 85 u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_client.c | 38 u8 *shared_secret, size_t shared_secret_len, 56 u8 *shared_secret; member in struct:radius_msg_list 109 u8 *shared_secret, 353 RadiusType msg_type, u8 *shared_secret, 378 entry->shared_secret = shared_secret; 444 u8 *shared_secret; local 462 shared_secret = conf->acct_server->shared_secret; 464 radius_msg_finish_acct(msg, shared_secret, shared_secret_le 105 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 351 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 715 radius_client_update_acct_msgs(struct radius_client_data *radius, u8 *shared_secret, size_t shared_secret_len) argument [all...] |
H A D | eapol_test.c | 407 os_free(e->radius_conf->auth_server->shared_secret); 566 u8 *shared_secret, size_t shared_secret_len) 570 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 603 u8 *shared_secret, size_t shared_secret_len, 617 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 644 ieee802_1x_get_keys(e, msg, req, shared_secret, 697 as->shared_secret = (u8 *) os_strdup(secret); 564 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len) argument 602 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 49 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius_client.h | 27 u8 *shared_secret; member in struct:hostapd_radius_server 88 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_client.c | 38 const u8 *shared_secret, 57 u8 *shared_secret; member in struct:radius_msg_list 110 const u8 *shared_secret, 354 RadiusType msg_type, u8 *shared_secret, 379 entry->shared_secret = shared_secret; 445 u8 *shared_secret; local 463 shared_secret = conf->acct_server->shared_secret; 465 radius_msg_finish_acct(msg, shared_secret, shared_secret_le 106 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 352 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 716 radius_client_update_acct_msgs(struct radius_client_data *radius, u8 *shared_secret, size_t shared_secret_len) argument [all...] |
H A D | radius_server.c | 73 char *shared_secret; member in struct:radius_client 395 (u8 *) client->shared_secret, 411 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 456 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 753 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 869 os_free(prev->shared_secret); 980 entry->shared_secret = os_strdup(pos); 981 if (entry->shared_secret == NULL) { 986 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 50 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 439 const u8 *shared_secret, size_t shared_secret_len, 451 shared_secret == NULL || nonce == NULL || prf == NULL) 481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | eapol_test.c | 454 os_free(e->radius_conf->auth_server->shared_secret); 620 const u8 *shared_secret, 625 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 668 const u8 *shared_secret, size_t shared_secret_len, 682 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 709 ieee802_1x_get_keys(e, msg, req, shared_secret, 763 as->shared_secret = (u8 *) os_strdup(secret); 618 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 667 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|