Searched refs:secret_len (Results 1 - 25 of 53) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap_ms.c194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
523 int mdlen = secret_len;
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.h218 size_t secret_len);
220 size_t secret_len, const u8 *req_authenticator);
222 size_t secret_len,
225 size_t secret_len);
227 size_t secret_len,
230 size_t secret_len);
232 size_t secret_len);
240 size_t secret_len, struct radius_msg *sent_msg,
243 size_t secret_len, const u8 *req_auth);
250 const u8 *secret, size_t secret_len);
[all...]
H A Dradius.c352 size_t secret_len)
368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
383 size_t secret_len, const u8 *req_authenticator)
400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
411 len[3] = secret_len;
424 size_t secret_len,
442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
449 len[1] = secret_len;
463 size_t secret_len)
473 len[1] = secret_len;
351 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
382 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
423 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument
462 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius.h218 size_t secret_len);
220 size_t secret_len, const u8 *req_authenticator);
222 size_t secret_len,
225 size_t secret_len);
227 size_t secret_len,
230 size_t secret_len);
232 size_t secret_len);
240 size_t secret_len, struct radius_msg *sent_msg,
243 size_t secret_len, const u8 *req_auth);
250 const u8 *secret, size_t secret_len);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.h218 size_t secret_len);
220 size_t secret_len, const u8 *req_authenticator);
222 size_t secret_len,
225 size_t secret_len);
227 size_t secret_len,
230 size_t secret_len);
232 size_t secret_len);
240 size_t secret_len, struct radius_msg *sent_msg,
243 size_t secret_len, const u8 *req_auth);
250 const u8 *secret, size_t secret_len);
[all...]

Completed in 694 milliseconds

123