Searched defs:shared_secret (Results 1 - 25 of 51) sorted by relevance

123

/external/openssh/
H A Dkexc25519c.c77 struct sshbuf *shared_secret = NULL; local
121 if ((shared_secret = sshbuf_new()) == NULL) {
126 shared_secret)) < 0)
140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret),
159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
168 sshbuf_free(shared_secret);
H A Dkexdh.c54 const BIGNUM *shared_secret,
76 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexdhc.c107 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
158 (shared_secret = BN_new()) == NULL) {
163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
182 shared_secret,
201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
213 if (shared_secret)
214 BN_clear_free(shared_secret);
H A Dkexecdh.c60 const BIGNUM *shared_secret,
82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexc25519.c94 const u_char *shared_secret, size_t secretlen,
116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) {
85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
H A Dkexc25519s.c60 struct sshbuf *shared_secret = NULL; local
99 if ((shared_secret = sshbuf_new()) == NULL) {
104 shared_secret)) < 0)
121 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret),
149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
157 sshbuf_free(shared_secret);
H A Dkexdhs.c98 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
150 (shared_secret = BN_new()) == NULL) {
155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
176 shared_secret,
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
218 if (shared_secret)
219 BN_clear_free(shared_secret);
H A Dkexecdhc.c105 BIGNUM *shared_secret = NULL; local
161 (shared_secret = BN_new()) == NULL) {
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
187 shared_secret,
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
220 if (shared_secret)
221 BN_clear_free(shared_secret);
H A Dkexecdhs.c69 BIGNUM *shared_secret = NULL; local
124 /* Calculate shared_secret */
127 (shared_secret = BN_new()) == NULL) {
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
156 shared_secret,
187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
201 if (shared_secret)
202 BN_clear_free(shared_secret);
H A Dkexgex.c57 const BIGNUM *shared_secret,
84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {
45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexgexc.c150 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
206 (shared_secret = BN_new()) == NULL) {
211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
234 shared_secret,
253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
265 if (shared_secret)
266 BN_clear_free(shared_secret);
H A Dkexgexs.c127 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
179 (shared_secret = BN_new()) == NULL) {
184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
207 shared_secret,
237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
248 if (shared_secret)
249 BN_clear_free(shared_secret);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h43 u8 *shared_secret; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_client.h39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_das.h42 const u8 *shared_secret; member in struct:radius_das_conf
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h43 u8 *shared_secret; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/src/radius/
H A Dradius_client.h39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_das.h42 const u8 *shared_secret; member in struct:radius_das_conf
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h43 u8 *shared_secret; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_client.h39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_das.h42 const u8 *shared_secret; member in struct:radius_das_conf
/external/wpa_supplicant_8/hostapd/src/ap/
H A Daccounting.c403 * @shared_secret: RADIUS shared secret
404 * @shared_secret_len: Length of shared_secret in octets
410 const u8 *shared_secret, size_t shared_secret_len,
418 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
409 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Dieee802_11_auth.c172 hapd->conf->radius->auth_server->shared_secret,
428 const u8 *shared_secret,
444 msg, &passphraselen, shared_secret, shared_secret_len,
497 * @shared_secret: RADIUS shared secret
498 * @shared_secret_len: Length of shared_secret in octets
505 const u8 *shared_secret, size_t shared_secret_len,
528 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
577 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
427 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
504 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member in struct:eap_eke_session
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data

Completed in 211 milliseconds

123