Searched refs:secret_len (Results 1 - 25 of 66) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument
48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument
48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument
48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, (u_char *)secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap_ms.c194 unsigned char *secret, int secret_len,
216 ChapMS(challenge, (char *)secret, secret_len, md);
242 unsigned char *secret, int secret_len,
257 (char *)secret, secret_len, md,
319 unsigned char *challenge, char *secret, int secret_len,
324 ChapMS(challenge, secret, secret_len, response);
385 unsigned char *challenge, char *secret, int secret_len,
404 our_name, secret, secret_len, response, auth_response,
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
583 int mdlen = secret_len;
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
241 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
318 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
384 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
607 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
621 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
641 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
708 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
757 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
872 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
888 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
922 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.h231 size_t secret_len);
233 size_t secret_len, const u8 *req_authenticator);
235 size_t secret_len,
238 size_t secret_len);
240 size_t secret_len,
243 size_t secret_len);
245 size_t secret_len,
254 size_t secret_len, struct radius_msg *sent_msg,
257 size_t secret_len, const u8 *req_auth);
263 const u8 *secret, size_t secret_len);
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius.h231 size_t secret_len);
233 size_t secret_len, const u8 *req_authenticator);
235 size_t secret_len,
238 size_t secret_len);
240 size_t secret_len,
243 size_t secret_len);
245 size_t secret_len,
254 size_t secret_len, struct radius_msg *sent_msg,
257 size_t secret_len, const u8 *req_auth);
263 const u8 *secret, size_t secret_len);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.h231 size_t secret_len);
233 size_t secret_len, const u8 *req_authenticator);
235 size_t secret_len,
238 size_t secret_len);
240 size_t secret_len,
243 size_t secret_len);
245 size_t secret_len,
254 size_t secret_len, struct radius_msg *sent_msg,
257 size_t secret_len, const u8 *req_auth);
263 const u8 *secret, size_t secret_len);
[all...]
/external/boringssl/include/openssl/
H A Dhkdf.h36 const uint8_t *secret, size_t secret_len,
46 size_t secret_len, const uint8_t *salt,
/external/boringssl/src/include/openssl/
H A Dhkdf.h36 const uint8_t *secret, size_t secret_len,
46 size_t secret_len, const uint8_t *salt,
/external/syslinux/core/lwip/src/netif/ppp/
H A Dchpms.c134 int secret_len,
308 int secret_len,
321 for (i = 0; i < secret_len; i++) {
325 MDupdate(&md4Context, unicodePassword, secret_len * 2 * 8); /* Unicode is 2 bytes/char, *8 for bit count */
347 int secret_len,
356 for (i = 0; i < secret_len; i++) {
366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) argument
374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret));
379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response);
382 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len,
305 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument
344 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument
[all...]
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c27 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt,
43 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) {
26 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
42 HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len) argument

Completed in 1273 milliseconds

123