Searched defs:shared_secret (Results 1 - 10 of 10) sorted by relevance

/external/wpa_supplicant/
H A Dradius_client.h27 u8 *shared_secret; member in struct:hostapd_radius_server
85 u8 *shared_secret, size_t shared_secret_len,
H A Dradius_client.c38 u8 *shared_secret, size_t shared_secret_len,
56 u8 *shared_secret; member in struct:radius_msg_list
109 u8 *shared_secret,
353 RadiusType msg_type, u8 *shared_secret,
378 entry->shared_secret = shared_secret;
444 u8 *shared_secret; local
462 shared_secret = conf->acct_server->shared_secret;
464 radius_msg_finish_acct(msg, shared_secret, shared_secret_le
105 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
351 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
715 radius_client_update_acct_msgs(struct radius_client_data *radius, u8 *shared_secret, size_t shared_secret_len) argument
[all...]
H A Deapol_test.c407 os_free(e->radius_conf->auth_server->shared_secret);
566 u8 *shared_secret, size_t shared_secret_len)
570 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
574 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
603 u8 *shared_secret, size_t shared_secret_len,
617 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
644 ieee802_1x_get_keys(e, msg, req, shared_secret,
697 as->shared_secret = (u8 *) os_strdup(secret);
564 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len) argument
602 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.h49 u8 *shared_secret; member in struct:ikev2_initiator_data
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius_client.h27 u8 *shared_secret; member in struct:hostapd_radius_server
88 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_client.c38 const u8 *shared_secret,
57 u8 *shared_secret; member in struct:radius_msg_list
110 const u8 *shared_secret,
354 RadiusType msg_type, u8 *shared_secret,
379 entry->shared_secret = shared_secret;
445 u8 *shared_secret; local
463 shared_secret = conf->acct_server->shared_secret;
465 radius_msg_finish_acct(msg, shared_secret, shared_secret_le
106 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
352 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
716 radius_client_update_acct_msgs(struct radius_client_data *radius, u8 *shared_secret, size_t shared_secret_len) argument
[all...]
H A Dradius_server.c73 char *shared_secret; member in struct:radius_client
395 (u8 *) client->shared_secret,
411 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
456 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
753 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
869 os_free(prev->shared_secret);
980 entry->shared_secret = os_strdup(pos);
981 if (entry->shared_secret == NULL) {
986 entry->shared_secret_len = os_strlen(entry->shared_secret);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Dikev2.h50 u8 *shared_secret; member in struct:ikev2_responder_data
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dikev2_common.c439 const u8 *shared_secret, size_t shared_secret_len,
451 shared_secret == NULL || nonce == NULL || prf == NULL)
481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
/external/wpa_supplicant_6/wpa_supplicant/
H A Deapol_test.c454 os_free(e->radius_conf->auth_server->shared_secret);
620 const u8 *shared_secret,
625 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
629 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
668 const u8 *shared_secret, size_t shared_secret_len,
682 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
709 ieee802_1x_get_keys(e, msg, req, shared_secret,
763 as->shared_secret = (u8 *) os_strdup(secret);
618 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
667 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument

Completed in 173 milliseconds