/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/external/boringssl/src/ssl/ |
H A D | t1_enc.cc | 158 const uint8_t *secret, size_t secret_len, 172 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || 228 const uint8_t *secret, size_t secret_len, const char *label, 240 size_t secret_half = secret_len - (secret_len / 2); 247 /* Note that, if |secret_len| is odd, the two halves share a byte. */ 248 secret = secret + (secret_len - secret_half); 249 secret_len = secret_half; 254 if (!tls1_P_hash(out, out_len, digest, secret, secret_len, 264 size_t secret_len, cons 157 tls1_P_hash(uint8_t *out, size_t out_len, const EVP_MD *md, const uint8_t *secret, size_t secret_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len, const uint8_t *seed3, size_t seed3_len) argument 227 tls1_prf(const EVP_MD *digest, uint8_t *out, size_t out_len, const uint8_t *secret, size_t secret_len, const char *label, size_t label_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len) argument 263 ssl3_prf(uint8_t *out, size_t out_len, const uint8_t *secret, size_t secret_len, const char *label, size_t label_len, const uint8_t *seed1, size_t seed1_len, const uint8_t *seed2, size_t seed2_len) argument [all...] |
H A D | tls13_enc.cc | 69 const uint8_t *secret, size_t secret_len, 91 int ret = HKDF_expand(out, len, digest, secret, secret_len, hkdf_label, 248 size_t secret_len; local 251 secret_len = ssl->s3->read_traffic_secret_len; 254 secret_len = ssl->s3->write_traffic_secret_len; 257 if (!hkdf_expand_label(secret, digest, secret, secret_len, 260 secret_len)) { 264 return tls13_set_traffic_key(ssl, direction, secret, secret_len); 68 hkdf_expand_label(uint8_t *out, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *label, size_t label_len, const uint8_t *hash, size_t hash_len, size_t len) argument
|
H A D | ssl_ecdh.cc | 112 size_t secret_len = (EC_GROUP_get_degree(group.get()) + 7) / 8; local 113 bssl::UniquePtr<uint8_t> secret((uint8_t *)OPENSSL_malloc(secret_len)); 114 if (!secret || !BN_bn2bin_padded(secret.get(), secret_len, x)) { 119 *out_secret_len = secret_len;
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 366 size_t secret_len) 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 397 size_t secret_len, const u8 *req_authenticator) 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 425 len[3] = secret_len; 438 size_t secret_len, 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 463 len[1] = secret_len; 477 size_t secret_len) 487 len[1] = secret_len; 365 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 396 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 437 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument 476 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 497 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 518 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 540 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) argument 794 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 844 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 977 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1056 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1105 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1154 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1183 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1285 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1339 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1552 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 366 size_t secret_len) 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 397 size_t secret_len, const u8 *req_authenticator) 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 425 len[3] = secret_len; 438 size_t secret_len, 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 463 len[1] = secret_len; 477 size_t secret_len) 487 len[1] = secret_len; 365 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 396 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 437 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument 476 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 497 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 518 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 540 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) argument 794 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 844 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 977 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1056 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1105 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1154 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1183 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1285 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1339 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1552 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 366 size_t secret_len) 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 397 size_t secret_len, const u8 *req_authenticator) 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 425 len[3] = secret_len; 438 size_t secret_len, 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 463 len[1] = secret_len; 477 size_t secret_len) 487 len[1] = secret_len; 365 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 396 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 437 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument 476 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 497 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 518 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 540 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) argument 794 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 844 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 977 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1056 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1105 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1154 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1183 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1285 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1339 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1552 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
H A D | ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
H A D | ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
H A D | ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
/external/ppp/pppd/ |
H A D | chap-new.c | 419 int secret_len; local 422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, 442 int secret_len; local 463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 464 secret_len = 0; /* assume null secret if can't find one */ 473 secret, secret_len, cs->priv); 474 memset(secret, 0, secret_len);
|
/external/syslinux/core/lwip/src/netif/ppp/ |
H A D | chap.c | 427 int secret_len; local 474 secret, &secret_len, 0)) { 475 secret_len = 0; /* assume null secret if can't find one */ 494 MD5Update(&mdContext, (u_char*)secret, secret_len); 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 524 int secret_len, old_state; local 589 secret, &secret_len, 1)) { 602 MD5Update(&mdContext, (u_char*)secret, secret_len);
|
/external/syslinux/gpxe/src/net/ |
H A D | tls.c | 158 * @v secret_len Length of secret 165 void *secret, size_t secret_len, 168 uint8_t secret_copy[secret_len]; 177 memcpy ( secret_copy, secret, secret_len ); 180 DBGC2_HD ( tls, secret, secret_len ); 183 hmac_init ( digest, digest_ctx, secret, &secret_len ); 187 hmac_final ( digest, digest_ctx, secret, &secret_len, a ); 194 hmac_init ( digest, digest_ctx, secret, &secret_len ); 201 secret, &secret_len, out_tmp ); 212 secret, &secret_len, 163 tls_p_hash_va( struct tls_session *tls, struct digest_algorithm *digest, void *secret, size_t secret_len, void *out, size_t out_len, va_list seeds ) argument 231 tls_prf( struct tls_session *tls, void *secret, size_t secret_len, void *out, size_t out_len, ... ) argument [all...] |
/external/dhcpcd-6.8.2/ |
H A D | dhcpcd.h | 138 size_t secret_len; member in struct:dhcpcd_ctx
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|