Searched defs:shared_secret (Results 26 - 50 of 53) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_auth.c179 hapd->conf->radius->auth_server->shared_secret,
419 const u8 *shared_secret,
435 msg, &passphraselen, shared_secret, shared_secret_len,
470 * @shared_secret: RADIUS shared secret
471 * @shared_secret_len: Length of shared_secret in octets
478 const u8 *shared_secret, size_t shared_secret_len,
500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Dieee802_1x.c1189 const u8 *shared_secret,
1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
1518 * @shared_secret: RADIUS shared secret
1519 * @shared_secret_len: Length of shared_secret in octets
1525 const u8 *shared_secret, size_t shared_secret_len,
1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret,
1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
H A Dikev2_common.c369 const u8 *shared_secret, size_t shared_secret_len,
381 shared_secret == NULL || nonce == NULL || prf == NULL)
411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_das.c21 u8 *shared_secret; member in struct:radius_das_data
223 if (radius_msg_verify_das_req(msg, das->shared_secret,
287 if (radius_msg_finish_das_resp(reply, das->shared_secret,
342 if (conf->port == 0 || conf->shared_secret == NULL ||
358 das->shared_secret = os_malloc(conf->shared_secret_len);
359 if (das->shared_secret == NULL) {
363 os_memcpy(das->shared_secret, conf->shared_secret,
395 os_free(das->shared_secret);
H A Dradius_client.c67 const u8 *shared_secret,
128 * shared_secret - Shared secret with the target RADIUS server
130 const u8 *shared_secret; member in struct:radius_msg_list
133 * shared_secret_len - shared_secret length in octets
268 const u8 *shared_secret,
539 const u8 *shared_secret,
562 entry->shared_secret = shared_secret;
649 const u8 *shared_secret; local
668 shared_secret
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11_auth.c179 hapd->conf->radius->auth_server->shared_secret,
419 const u8 *shared_secret,
435 msg, &passphraselen, shared_secret, shared_secret_len,
470 * @shared_secret: RADIUS shared secret
471 * @shared_secret_len: Length of shared_secret in octets
478 const u8 *shared_secret, size_t shared_secret_len,
500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Dieee802_1x.c1189 const u8 *shared_secret,
1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
1518 * @shared_secret: RADIUS shared secret
1519 * @shared_secret_len: Length of shared_secret in octets
1525 const u8 *shared_secret, size_t shared_secret_len,
1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret,
1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
H A Dikev2_common.c369 const u8 *shared_secret, size_t shared_secret_len,
381 shared_secret == NULL || nonce == NULL || prf == NULL)
411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/src/radius/
H A Dradius_das.c21 u8 *shared_secret; member in struct:radius_das_data
223 if (radius_msg_verify_das_req(msg, das->shared_secret,
287 if (radius_msg_finish_das_resp(reply, das->shared_secret,
342 if (conf->port == 0 || conf->shared_secret == NULL ||
358 das->shared_secret = os_malloc(conf->shared_secret_len);
359 if (das->shared_secret == NULL) {
363 os_memcpy(das->shared_secret, conf->shared_secret,
395 os_free(das->shared_secret);
H A Dradius_client.c67 const u8 *shared_secret,
128 * shared_secret - Shared secret with the target RADIUS server
130 const u8 *shared_secret; member in struct:radius_msg_list
133 * shared_secret_len - shared_secret length in octets
268 const u8 *shared_secret,
539 const u8 *shared_secret,
562 entry->shared_secret = shared_secret;
649 const u8 *shared_secret; local
668 shared_secret
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c179 hapd->conf->radius->auth_server->shared_secret,
419 const u8 *shared_secret,
435 msg, &passphraselen, shared_secret, shared_secret_len,
470 * @shared_secret: RADIUS shared secret
471 * @shared_secret_len: Length of shared_secret in octets
478 const u8 *shared_secret, size_t shared_secret_len,
500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Dieee802_1x.c1189 const u8 *shared_secret,
1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
1518 * @shared_secret: RADIUS shared secret
1519 * @shared_secret_len: Length of shared_secret in octets
1525 const u8 *shared_secret, size_t shared_secret_len,
1553 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret,
1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
H A Dikev2_common.c369 const u8 *shared_secret, size_t shared_secret_len,
381 shared_secret == NULL || nonce == NULL || prf == NULL)
411 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_das.c21 u8 *shared_secret; member in struct:radius_das_data
223 if (radius_msg_verify_das_req(msg, das->shared_secret,
287 if (radius_msg_finish_das_resp(reply, das->shared_secret,
342 if (conf->port == 0 || conf->shared_secret == NULL ||
358 das->shared_secret = os_malloc(conf->shared_secret_len);
359 if (das->shared_secret == NULL) {
363 os_memcpy(das->shared_secret, conf->shared_secret,
395 os_free(das->shared_secret);
H A Dradius_client.c67 const u8 *shared_secret,
128 * shared_secret - Shared secret with the target RADIUS server
130 const u8 *shared_secret; member in struct:radius_msg_list
133 * shared_secret_len - shared_secret length in octets
268 const u8 *shared_secret,
539 const u8 *shared_secret,
562 entry->shared_secret = shared_secret;
649 const u8 *shared_secret; local
668 shared_secret
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
536 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
935 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
/external/chromium_org/remoting/client/jni/
H A Dchromoting_jni_instance.cc152 const std::string& shared_secret) {
159 token_fetcher_proxy_->OnTokenFetched(token, shared_secret);
334 host_id_, response.client_id(), response.shared_secret()));
150 HandleOnThirdPartyTokenFetched( const std::string& token, const std::string& shared_secret) argument
H A Dchromoting_jni_runtime.cc152 jstring shared_secret) {
158 ConvertJavaStringToUTF8(env, shared_secret)));
149 OnThirdPartyTokenFetched(JNIEnv* env, jclass clazz, jstring token, jstring shared_secret) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Deapol_test.c616 os_free(e->radius_conf->auth_server->shared_secret);
785 const u8 *shared_secret,
792 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
796 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
843 const u8 *shared_secret, size_t shared_secret_len,
858 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
881 ieee802_1x_get_keys(e, msg, req, shared_secret,
935 as->shared_secret = (u8 *) os_strdup(secret);
783 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
842 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/chromium_org/remoting/client/plugin/
H A Dchromoting_instance.cc504 data->SetString("sharedSecret", pairing_response.shared_secret());
530 const std::string& shared_secret,
533 secret_fetched_callback.Run(shared_secret);
674 std::string shared_secret; local
675 if (!data.GetString("sharedSecret", &shared_secret)) {
680 base::Bind(&ChromotingInstance::FetchSecretFromString, shared_secret);
974 std::string shared_secret; local
976 !data.GetString("sharedSecret", &shared_secret)) {
981 token_fetcher_proxy_->OnTokenFetched(token, shared_secret);
529 FetchSecretFromString( const std::string& shared_secret, bool pairing_supported, const protocol::SecretFetchedCallback& secret_fetched_callback) argument

Completed in 1444 milliseconds

123