/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 179 hapd->conf->radius->auth_server->shared_secret, 419 const u8 *shared_secret, 435 msg, &passphraselen, shared_secret, shared_secret_len, 470 * @shared_secret: RADIUS shared secret 471 * @shared_secret_len: Length of shared_secret in octets 478 const u8 *shared_secret, size_t shared_secret_len, 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_1x.c | 1189 const u8 *shared_secret, 1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1518 * @shared_secret: RADIUS shared secret 1519 * @shared_secret_len: Length of shared_secret in octets 1525 const u8 *shared_secret, size_t shared_secret_len, 1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 369 const u8 *shared_secret, size_t shared_secret_len, 381 shared_secret == NULL || nonce == NULL || prf == NULL) 411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
H A D | radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 539 const u8 *shared_secret, 562 entry->shared_secret = shared_secret; 649 const u8 *shared_secret; local 668 shared_secret 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 179 hapd->conf->radius->auth_server->shared_secret, 419 const u8 *shared_secret, 435 msg, &passphraselen, shared_secret, shared_secret_len, 470 * @shared_secret: RADIUS shared secret 471 * @shared_secret_len: Length of shared_secret in octets 478 const u8 *shared_secret, size_t shared_secret_len, 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_1x.c | 1189 const u8 *shared_secret, 1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1518 * @shared_secret: RADIUS shared secret 1519 * @shared_secret_len: Length of shared_secret in octets 1525 const u8 *shared_secret, size_t shared_secret_len, 1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 369 const u8 *shared_secret, size_t shared_secret_len, 381 shared_secret == NULL || nonce == NULL || prf == NULL) 411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
H A D | radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 539 const u8 *shared_secret, 562 entry->shared_secret = shared_secret; 649 const u8 *shared_secret; local 668 shared_secret 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 179 hapd->conf->radius->auth_server->shared_secret, 419 const u8 *shared_secret, 435 msg, &passphraselen, shared_secret, shared_secret_len, 470 * @shared_secret: RADIUS shared secret 471 * @shared_secret_len: Length of shared_secret in octets 478 const u8 *shared_secret, size_t shared_secret_len, 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_1x.c | 1189 const u8 *shared_secret, 1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1518 * @shared_secret: RADIUS shared secret 1519 * @shared_secret_len: Length of shared_secret in octets 1525 const u8 *shared_secret, size_t shared_secret_len, 1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 369 const u8 *shared_secret, size_t shared_secret_len, 381 shared_secret == NULL || nonce == NULL || prf == NULL) 411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
H A D | radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 539 const u8 *shared_secret, 562 entry->shared_secret = shared_secret; 649 const u8 *shared_secret; local 668 shared_secret 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
/external/chromium_org/remoting/client/jni/ |
H A D | chromoting_jni_instance.cc | 152 const std::string& shared_secret) { 159 token_fetcher_proxy_->OnTokenFetched(token, shared_secret); 334 host_id_, response.client_id(), response.shared_secret())); 150 HandleOnThirdPartyTokenFetched( const std::string& token, const std::string& shared_secret) argument
|
H A D | chromoting_jni_runtime.cc | 152 jstring shared_secret) { 158 ConvertJavaStringToUTF8(env, shared_secret))); 149 OnThirdPartyTokenFetched(JNIEnv* env, jclass clazz, jstring token, jstring shared_secret) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 616 os_free(e->radius_conf->auth_server->shared_secret); 785 const u8 *shared_secret, 792 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 796 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 843 const u8 *shared_secret, size_t shared_secret_len, 858 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 881 ieee802_1x_get_keys(e, msg, req, shared_secret, 935 as->shared_secret = (u8 *) os_strdup(secret); 783 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 842 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/chromium_org/remoting/client/plugin/ |
H A D | chromoting_instance.cc | 504 data->SetString("sharedSecret", pairing_response.shared_secret()); 530 const std::string& shared_secret, 533 secret_fetched_callback.Run(shared_secret); 674 std::string shared_secret; local 675 if (!data.GetString("sharedSecret", &shared_secret)) { 680 base::Bind(&ChromotingInstance::FetchSecretFromString, shared_secret); 974 std::string shared_secret; local 976 !data.GetString("sharedSecret", &shared_secret)) { 981 token_fetcher_proxy_->OnTokenFetched(token, shared_secret); 529 FetchSecretFromString( const std::string& shared_secret, bool pairing_supported, const protocol::SecretFetchedCallback& secret_fetched_callback) argument
|