/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-kdf.c | 18 * @secret_len: Length of the key in bytes 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 18 * @secret_len: Length of the key in bytes 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-kdf.c | 18 * @secret_len: Length of the key in bytes 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 26 const uint8_t *secret, size_t secret_len, 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { 24 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, (u_char *)secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.c | 419 int secret_len; local 422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, 442 int secret_len; local 463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 464 secret_len = 0; /* assume null secret if can't find one */ 473 secret, secret_len, cs->priv); 474 memset(secret, 0, secret_len);
|
H A D | chap_ms.c | 194 unsigned char *secret, int secret_len, 216 ChapMS(challenge, (char *)secret, secret_len, md); 242 unsigned char *secret, int secret_len, 257 (char *)secret, secret_len, md, 319 unsigned char *challenge, char *secret, int secret_len, 324 ChapMS(challenge, secret, secret_len, response); 385 unsigned char *challenge, char *secret, int secret_len, 404 our_name, secret, secret_len, response, auth_response, 579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 583 int mdlen = secret_len; 193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 241 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 318 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 384 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 607 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 621 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 641 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 708 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 757 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 872 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 888 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 922 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
/external/boringssl/src/ssl/ |
H A D | s3_enc.c | 167 size_t secret_len, const char *label, size_t label_len, 196 EVP_DigestUpdate(&sha1, secret, secret_len); 210 EVP_DigestUpdate(&md5, secret, secret_len); 166 ssl3_prf(SSL *s, uint8_t *out, size_t out_len, const uint8_t *secret, size_t secret_len, const char *label, size_t label_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len) argument
|
H A D | t1_enc.c | 156 const uint8_t *secret, size_t secret_len, 171 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || 224 size_t secret_len, const char *label, size_t label_len, 256 len = secret_len / count; 258 secret_len = 0; 264 /* If |count| is 2 and |secret_len| is odd, |secret| is partitioned into 266 if (!tls1_P_hash(tmp, out_len, md, S1, len + (secret_len & 1), 155 tls1_P_hash(uint8_t *out, size_t out_len, const EVP_MD *md, const uint8_t *secret, size_t secret_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len, const uint8_t *seed3, size_t seed3_len) argument 223 tls1_prf(SSL *s, uint8_t *out, size_t out_len, const uint8_t *secret, size_t secret_len, const char *label, size_t label_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ikev2.c | 32 size_t *secret_len) 49 *secret_len = sm->user->password_len; 30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
|
H A D | ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ikev2.c | 32 size_t *secret_len) 49 *secret_len = sm->user->password_len; 30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ikev2.c | 32 size_t *secret_len) 49 *secret_len = sm->user->password_len; 30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|