/external/openssh/ |
H A D | kexc25519c.c | 77 struct sshbuf *shared_secret = NULL; local 121 if ((shared_secret = sshbuf_new()) == NULL) { 126 shared_secret)) < 0) 140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) 168 sshbuf_free(shared_secret);
|
H A D | kexdh.c | 54 const BIGNUM *shared_secret, 76 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexdhc.c | 107 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 158 (shared_secret = BN_new()) == NULL) { 163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 182 shared_secret, 201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 213 if (shared_secret) 214 BN_clear_free(shared_secret);
|
H A D | kexecdh.c | 60 const BIGNUM *shared_secret, 82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 94 const u_char *shared_secret, size_t secretlen, 116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) { 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519s.c | 60 struct sshbuf *shared_secret = NULL; local 99 if ((shared_secret = sshbuf_new()) == NULL) { 104 shared_secret)) < 0) 121 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), 149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) 157 sshbuf_free(shared_secret);
|
H A D | kexdhs.c | 98 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 150 (shared_secret = BN_new()) == NULL) { 155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 176 shared_secret, 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 218 if (shared_secret) 219 BN_clear_free(shared_secret);
|
H A D | kexecdhc.c | 105 BIGNUM *shared_secret = NULL; local 161 (shared_secret = BN_new()) == NULL) { 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 187 shared_secret, 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 220 if (shared_secret) 221 BN_clear_free(shared_secret);
|
H A D | kexecdhs.c | 69 BIGNUM *shared_secret = NULL; local 124 /* Calculate shared_secret */ 127 (shared_secret = BN_new()) == NULL) { 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 156 shared_secret, 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 201 if (shared_secret) 202 BN_clear_free(shared_secret);
|
H A D | kexgex.c | 57 const BIGNUM *shared_secret, 84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { 45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexgexc.c | 150 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 206 (shared_secret = BN_new()) == NULL) { 211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 234 shared_secret, 253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 265 if (shared_secret) 266 BN_clear_free(shared_secret);
|
H A D | kexgexs.c | 127 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 179 (shared_secret = BN_new()) == NULL) { 184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 207 shared_secret, 237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) 248 if (shared_secret) 249 BN_clear_free(shared_secret);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.h | 42 const u8 *shared_secret; member in struct:radius_das_conf
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.h | 42 const u8 *shared_secret; member in struct:radius_das_conf
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.h | 42 const u8 *shared_secret; member in struct:radius_das_conf
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 403 * @shared_secret: RADIUS shared secret 404 * @shared_secret_len: Length of shared_secret in octets 410 const u8 *shared_secret, size_t shared_secret_len, 418 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 409 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | ieee802_11_auth.c | 172 hapd->conf->radius->auth_server->shared_secret, 428 const u8 *shared_secret, 444 msg, &passphraselen, shared_secret, shared_secret_len, 497 * @shared_secret: RADIUS shared secret 498 * @shared_secret_len: Length of shared_secret in octets 505 const u8 *shared_secret, size_t shared_secret_len, 528 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 577 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 427 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 504 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|