Home
last modified time | relevance | path

Searched refs:secret_len (Results 1 - 25 of 136) sorted by relevance

123456

/third_party/lwip/src/netif/ppp/
H A Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response()
273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response() local
298 const unsigned char *secret, int secret_len, in chapms2_verify_response()
313 (const char *)secret, secret_len, md, in chapms2_verify_response() local
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response()
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response()
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument
577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash()
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument
582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument
594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument
612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument
690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument
714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument
744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument
838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument
873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument
[all...]
H A Dchap-md5.c62 const unsigned char *secret, int secret_len, in chap_md5_verify_response()
79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius.h241 size_t secret_len);
243 size_t secret_len, const u8 *req_authenticator);
245 size_t secret_len,
248 size_t secret_len);
250 size_t secret_len,
253 size_t secret_len);
255 size_t secret_len,
264 size_t secret_len, struct radius_msg *sent_msg,
267 size_t secret_len, const u8 *req_auth);
273 const u8 *secret, size_t secret_len);
[all...]
H A Dradius.c368 size_t secret_len) in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv()
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
427 len[3] = secret_len; in radius_msg_finish_srv()
440 size_t secret_len, in radius_msg_finish_das_resp()
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
465 len[1] = secret_len; in radius_msg_finish_das_resp()
479 size_t secret_len) in radius_msg_finish_acct()
489 len[1] = secret_len; in radius_msg_finish_acct()
367 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_finish() argument
398 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_srv() argument
439 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) radius_msg_finish_das_resp() argument
478 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_finish_acct() argument
499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument
520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument
542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument
799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument
981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument
1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument
1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument
1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument
1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument
1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument
1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument
1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius.h244 size_t secret_len);
246 size_t secret_len, const u8 *req_authenticator);
248 size_t secret_len,
251 size_t secret_len);
253 size_t secret_len,
256 size_t secret_len);
258 size_t secret_len,
267 size_t secret_len, struct radius_msg *sent_msg,
270 size_t secret_len, const u8 *req_auth);
276 const u8 *secret, size_t secret_len);
[all...]
H A Dradius.c368 size_t secret_len) in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv()
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
427 len[3] = secret_len; in radius_msg_finish_srv()
440 size_t secret_len, in radius_msg_finish_das_resp()
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
465 len[1] = secret_len; in radius_msg_finish_das_resp()
479 size_t secret_len) in radius_msg_finish_acct()
489 len[1] = secret_len; in radius_msg_finish_acct()
367 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_finish() argument
398 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_srv() argument
439 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) radius_msg_finish_das_resp() argument
478 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_finish_acct() argument
499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument
520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument
542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument
799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument
981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument
1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument
1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument
1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument
1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument
1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument
1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument
1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument
[all...]
/third_party/openssl/demos/keyexch/
H A Dx25519.c56 size_t secret_len; member
158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after()
168 if (local_peer->secret_len != 32) { /* unreachable */ in keyexch_x25519_after()
174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after()
182 &local_peer->secret_len) == 0) { in keyexch_x25519_after()
188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after()
196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after()
241 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519()
248 peer1.secret_len) != 0) { in keyexch_x25519()
256 OPENSSL_clear_free(peer1.secret, peer1.secret_len); in keyexch_x25519()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
H A Dsha384-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
H A Dsha512-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
H A Dsha384-tlsprf.c18 * @secret_len: Length of the key in bytes
29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
H A Dsha384-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
H A Dsha512-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
/third_party/mbedtls/programs/ssl/
H A Dssl_test_common_source.c18 size_t secret_len, in eap_tls_key_derivation()
29 if (secret_len != sizeof(keys->master_secret)) { in eap_tls_key_derivation()
42 size_t secret_len, in nss_keylog_export()
71 for (j = 0; j < secret_len; j++) { in nss_keylog_export()
112 size_t secret_len, in dtls_srtp_key_derivation()
123 if (secret_len != sizeof(keys->master_secret)) { in dtls_srtp_key_derivation()
15 eap_tls_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) eap_tls_key_derivation() argument
39 nss_keylog_export(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) nss_keylog_export() argument
109 dtls_srtp_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) dtls_srtp_key_derivation() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_auth.c421 size_t secret_len; in dpp_auth_build_resp_ok() local
484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok()
488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok()
489 auth->Nx_len = auth->secret_len; in dpp_auth_build_resp_ok()
491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok()
675 size_t secret_len; in dpp_auth_req_rx() local
782 if (dpp_ecdh(own_bi->pubkey, pi, auth->Mx, &secret_len) < 0) in dpp_auth_req_rx()
784 auth->secret_len = secret_len; in dpp_auth_req_rx()
787 auth->Mx, auth->secret_len); in dpp_auth_req_rx()
1171 size_t secret_len; dpp_auth_init() local
1407 size_t secret_len; dpp_auth_resp_rx() local
[all...]
/third_party/mbedtls/library/
H A Dssl_tls13_keys.h105 * \p secret_len Bytes.
106 * \param secret_len The length of \p secret in Bytes.
125 const unsigned char *secret, size_t secret_len,
146 * \p secret_len Bytes
149 * \p secret_len Bytes
150 * \param secret_len Length of the secrets \p client_secret and
165 const unsigned char *server_secret, size_t secret_len,
183 * \p secret_len Bytes.
184 * \param secret_len The length of \p secret in Bytes.
211 const unsigned char *secret, size_t secret_len,
[all...]

Completed in 12 milliseconds

123456