/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
H A D | tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; 337 conn->fd->secret = (void *) conn; 419 /* NSS does not export master secret or client/server random. */
|
H A D | tls_openssl.c | 3404 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3408 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 3423 s->s3->server_random, secret);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 1128 const u8 *secret; local 1131 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1133 if (secret == NULL) { 1134 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1153 os_memcpy(data->shared_secret, secret, secret_len);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 354 if (secret) { 368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 410 addr[3] = secret; 423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument 442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 448 addr[1] = secret; 462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
H A D | radius.h | 217 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 219 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 221 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 224 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 226 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 229 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 231 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 239 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 250 const u8 *secret, size_ [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
H A D | tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 903 int port, const char *secret, 935 as->shared_secret = (u8 *) os_strdup(secret); 936 as->shared_secret_len = os_strlen(secret); 1146 "[-s<AS secret>]\\\n" 1161 " -s<AS secret> = shared secret with the authentication " 901 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; 337 conn->fd->secret = (void *) conn; 419 /* NSS does not export master secret or client/server random. */
|
H A D | tls_openssl.c | 3404 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3408 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 3423 s->s3->server_random, secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 1128 const u8 *secret; local 1131 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1133 if (secret == NULL) { 1134 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1153 os_memcpy(data->shared_secret, secret, secret_len);
|