/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 31 len[1] = secret_len;
|
H A D | chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
H A D | sha256.h | 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
H A D | sha256.h | 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
H A D | sha256.h | 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 523 int mdlen = secret_len; 193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 199 size_t secret_len); 201 size_t secret_len, const u8 *req_authenticator); 203 size_t secret_len, 206 size_t secret_len); 208 size_t secret_len); 210 size_t secret_len); 218 size_t secret_len, struct radius_msg *sent_msg, 221 size_t secret_len, const u8 *req_auth); 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_t secret_len); [all...] |
H A D | radius.c | 345 size_t secret_len) 361 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 376 size_t secret_len, const u8 *req_authenticator) 393 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 404 len[3] = secret_len; 417 size_t secret_len, 435 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 442 len[1] = secret_len; 456 size_t secret_len) 466 len[1] = secret_len; 344 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 375 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 416 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument 455 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 476 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 498 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 747 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 797 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 945 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1017 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1066 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1107 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1136 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1210 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1411 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.h | 199 size_t secret_len); 201 size_t secret_len, const u8 *req_authenticator); 203 size_t secret_len, 206 size_t secret_len); 208 size_t secret_len); 210 size_t secret_len); 218 size_t secret_len, struct radius_msg *sent_msg, 221 size_t secret_len, const u8 *req_auth); 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_t secret_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.h | 199 size_t secret_len); 201 size_t secret_len, const u8 *req_authenticator); 203 size_t secret_len, 206 size_t secret_len); 208 size_t secret_len); 210 size_t secret_len); 218 size_t secret_len, struct radius_msg *sent_msg, 221 size_t secret_len, const u8 *req_auth); 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_t secret_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.h | 211 size_t secret_len); 213 size_t secret_len, const u8 *req_authenticator); 215 size_t secret_len); 223 size_t secret_len, struct radius_msg *sent_msg, 226 size_t secret_len, const u8 *req_auth); 233 const u8 *secret, size_t secret_len); 236 const u8 *secret, size_t secret_len); 239 const u8 *secret, size_t secret_len, 245 const u8 *secret, size_t secret_len);
|