/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 86 char *shared_secret; member in struct:radius_client 606 (u8 *) client->shared_secret, 621 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 666 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 962 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1075 os_free(prev->shared_secret); 1186 entry->shared_secret = os_strdup(pos); 1187 if (entry->shared_secret == NULL) { 1192 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 86 char *shared_secret; member in struct:radius_client 606 (u8 *) client->shared_secret, 621 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 666 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 962 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1075 os_free(prev->shared_secret); 1186 entry->shared_secret = os_strdup(pos); 1187 if (entry->shared_secret == NULL) { 1192 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 86 char *shared_secret; member in struct:radius_client 606 (u8 *) client->shared_secret, 621 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 666 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 962 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1075 os_free(prev->shared_secret); 1186 entry->shared_secret = os_strdup(pos); 1187 if (entry->shared_secret == NULL) { 1192 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ikev2.c | 89 data->ikev2.shared_secret = os_malloc(password_len); 90 if (data->ikev2.shared_secret == NULL) 92 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | ikev2.c | 24 os_free(data->shared_secret); 585 &data->keys, 1, data->shared_secret, 1050 &data->keys, 0, data->shared_secret,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 89 data->ikev2.shared_secret = os_malloc(password_len); 90 if (data->ikev2.shared_secret == NULL) 92 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | ikev2.c | 24 os_free(data->shared_secret); 585 &data->keys, 1, data->shared_secret, 1050 &data->keys, 0, data->shared_secret,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 89 data->ikev2.shared_secret = os_malloc(password_len); 90 if (data->ikev2.shared_secret == NULL) 92 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | ikev2.c | 24 os_free(data->shared_secret); 585 &data->keys, 1, data->shared_secret, 1050 &data->keys, 0, data->shared_secret,
|
/external/chromium_org/remoting/host/ |
H A D | pairing_registry_delegate_win_unittest.cc | 122 EXPECT_TRUE(unprivileged_pairing.shared_secret().empty());
|
H A D | client_session.cc | 185 pairing_response.set_shared_secret(pairing.shared_secret());
|
/external/openssh/ |
H A D | kex.c | 479 BIGNUM *shared_secret) 493 buffer_put_bignum2(&b, shared_secret); 529 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument 536 shared_secret); 478 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 392 * @shared_secret: RADIUS shared secret 393 * @shared_secret_len: Length of shared_secret in octets 399 const u8 *shared_secret, size_t shared_secret_len, 407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_1x.c | 1054 const u8 *shared_secret, 1062 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1242 * @shared_secret: RADIUS shared secret 1243 * @shared_secret_len: Length of shared_secret in octets 1249 const u8 *shared_secret, size_t shared_secret_len, 1277 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 1359 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1051 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 1248 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | accounting.c | 392 * @shared_secret: RADIUS shared secret 393 * @shared_secret_len: Length of shared_secret in octets 399 const u8 *shared_secret, size_t shared_secret_len, 407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_1x.c | 1054 const u8 *shared_secret, 1062 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1242 * @shared_secret: RADIUS shared secret 1243 * @shared_secret_len: Length of shared_secret in octets 1249 const u8 *shared_secret, size_t shared_secret_len, 1277 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 1359 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1051 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 1248 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | accounting.c | 392 * @shared_secret: RADIUS shared secret 393 * @shared_secret_len: Length of shared_secret in octets 399 const u8 *shared_secret, size_t shared_secret_len, 407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/chromium_org/remoting/client/jni/ |
H A D | chromoting_jni_instance.cc | 176 response.shared_secret()));
|
/external/chromium_org/remoting/protocol/ |
H A D | protocol_mock_objects.h | 178 MOCK_METHOD0(shared_secret, const std::string&());
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 293 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | ikev2_common.c | 434 const u8 *shared_secret, size_t shared_secret_len, 446 shared_secret == NULL || nonce == NULL || prf == NULL) 476 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 293 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | ikev2_common.c | 434 const u8 *shared_secret, size_t shared_secret_len, 446 shared_secret == NULL || nonce == NULL || prf == NULL) 476 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 293 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | ikev2_common.c | 434 const u8 *shared_secret, size_t shared_secret_len, 446 shared_secret == NULL || nonce == NULL || prf == NULL) 476 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|