/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_key_agreement.c | 38 uint8_t *shared_secret, in mbedtls_test_transparent_key_agreement() 53 memcpy(shared_secret, mbedtls_test_driver_key_agreement_hooks.forced_output, in mbedtls_test_transparent_key_agreement() 67 shared_secret, shared_secret_size, in mbedtls_test_transparent_key_agreement() 74 shared_secret, shared_secret_size, in mbedtls_test_transparent_key_agreement() 82 (void) shared_secret; in mbedtls_test_transparent_key_agreement() 95 shared_secret, shared_secret_size, in mbedtls_test_transparent_key_agreement() 104 shared_secret, in mbedtls_test_transparent_key_agreement() 113 (void) shared_secret; in mbedtls_test_transparent_key_agreement() 131 uint8_t *shared_secret, in mbedtls_test_opaque_key_agreement() 141 (void) shared_secret; in mbedtls_test_opaque_key_agreement() 31 mbedtls_test_transparent_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_transparent_key_agreement() argument 124 mbedtls_test_opaque_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_opaque_key_agreement() argument [all...] |
/third_party/libwebsockets/lib/jose/jwe/ |
H A D | jwe-ecdh-es-aeskw.c | 202 uint8_t shared_secret[LWS_JWE_LIMIT_KEY_ELEMENT_BYTES], in lws_jwe_encrypt_ecdh() local 204 int m, n, ret = -1, ot = *temp_len, ss_len = sizeof(shared_secret), in lws_jwe_encrypt_ecdh() 239 if (lws_genecdh_compute_shared_secret(&ecctx, shared_secret, &ss_len)) { in lws_jwe_encrypt_ecdh() 268 derived, shared_secret, ss_len)) { in lws_jwe_encrypt_ecdh() 371 lws_explicit_bzero(shared_secret, (unsigned int)ekbytes); in lws_jwe_encrypt_ecdh() 455 uint8_t shared_secret[LWS_JWE_LIMIT_KEY_ELEMENT_BYTES], in lws_jwe_auth_and_decrypt_ecdh() local 460 int n, ret = -1, ss_len = sizeof(shared_secret); in lws_jwe_auth_and_decrypt_ecdh() 505 if (lws_genecdh_compute_shared_secret(&ecctx, shared_secret, &ss_len)) { in lws_jwe_auth_and_decrypt_ecdh() 526 derived, shared_secret, ss_len)) { in lws_jwe_auth_and_decrypt_ecdh() 563 /* decrypt the EKEY to end up with CEK in "shared_secret" */ in lws_jwe_auth_and_decrypt_ecdh() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_client.c | 67 const u8 *shared_secret, 133 * shared_secret - Shared secret with the target RADIUS server 135 const u8 *shared_secret; member 138 * shared_secret_len - shared_secret length in octets 285 const u8 *shared_secret, in radius_client_register() 453 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit() 668 const u8 *shared_secret, in radius_client_list_add() 691 entry->shared_secret = shared_secret; in radius_client_list_add() 751 const u8 *shared_secret; in radius_client_send() local 281 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) radius_client_register() argument 665 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) radius_client_list_add() argument 1040 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) radius_client_update_acct_msgs() argument [all...] |
H A D | radius_das.c | 21 u8 *shared_secret; member 432 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive() 486 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive() 541 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 560 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init() 562 if (das->shared_secret == NULL) { in radius_das_init() 596 os_free(das->shared_secret); in radius_das_deinit()
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_server.c | 114 char *shared_secret; member 1140 (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1309 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1355 (u8 *) client->shared_secret, in radius_server_macacl() 1393 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl() 1438 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject() 1732 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp() 1776 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp() 1931 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth() 2043 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct() [all...] |
H A D | radius_das.h | 46 const u8 *shared_secret; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_client.c | 68 const u8 *shared_secret, 134 * shared_secret - Shared secret with the target RADIUS server 136 const u8 *shared_secret; member 139 * shared_secret_len - shared_secret length in octets 286 const u8 *shared_secret, in radius_client_register() 454 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit() 675 const u8 *shared_secret, in radius_client_list_add() 698 entry->shared_secret = shared_secret; in radius_client_list_add() 758 const u8 *shared_secret; in radius_client_send() local 282 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) radius_client_register() argument 672 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) radius_client_list_add() argument 1056 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) radius_client_update_acct_msgs() argument [all...] |
H A D | radius_das.c | 21 u8 *shared_secret; member 432 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive() 486 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive() 541 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 560 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init() 562 if (das->shared_secret == NULL) { in radius_das_init() 596 os_free(das->shared_secret); in radius_das_deinit()
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member 44 * shared_secret_len - Length of shared_secret in octets 246 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_server.c | 109 char *shared_secret; member 973 (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1142 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1188 (u8 *) client->shared_secret, in radius_server_macacl() 1226 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl() 1271 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject() 1565 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp() 1609 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp() 1764 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth() 1876 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct() [all...] |
H A D | radius_das.h | 46 const u8 *shared_secret; member
|
/third_party/mbedtls/tests/include/test/drivers/ |
H A D | key_agreement.h | 58 uint8_t *shared_secret, 69 uint8_t *shared_secret,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ieee802_11_auth.c | 131 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query() 373 const u8 *shared_secret, in decode_tunnel_passwords() 389 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords() 442 * @shared_secret: RADIUS shared secret 443 * @shared_secret_len: Length of shared_secret in octets 450 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() 473 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius() 521 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius() 372 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) decode_tunnel_passwords() argument 449 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) hostapd_acl_recv_radius() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ieee802_11_auth.c | 172 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query() 438 const u8 *shared_secret, in decode_tunnel_passwords() 454 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords() 507 * @shared_secret: RADIUS shared secret 508 * @shared_secret_len: Length of shared_secret in octets 515 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() 537 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius() 584 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius() 437 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) decode_tunnel_passwords() argument 514 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) hostapd_acl_recv_radius() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.c | 413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() 508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka() 553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk() 724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.c | 413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() 508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka() 553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk() 724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | ikev2.c | 28 os_free(data->shared_secret); in ikev2_initiator_deinit() 618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1140 os_free(data->shared_secret); in ikev2_build_sa_auth() 1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth() 1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth() 1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth() 1148 os_free(data->shared_secret); in ikev2_build_sa_auth() 1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth() 1150 if (data->shared_secret in ikev2_build_sa_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | ikev2.c | 28 os_free(data->shared_secret); in ikev2_initiator_deinit() 618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1140 os_free(data->shared_secret); in ikev2_build_sa_auth() 1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth() 1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth() 1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth() 1148 os_free(data->shared_secret); in ikev2_build_sa_auth() 1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth() 1150 if (data->shared_secret in ikev2_build_sa_auth() [all...] |
/third_party/mbedtls/3rdparty/p256-m/ |
H A D | p256-m_driver_entrypoints.c | 175 uint8_t *shared_secret, in p256_transparent_key_agreement() 195 int ret = p256_ecdh_shared_secret(shared_secret, key_buffer, peer_key_p256m); in p256_transparent_key_agreement() 168 p256_transparent_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) p256_transparent_key_agreement() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | eapol_test.c | 671 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean() 843 const u8 *shared_secret, in ieee802_1x_get_keys() 850 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 854 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 901 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() 916 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth() 939 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth() 1037 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf() 841 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) ieee802_1x_get_keys() argument 900 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) ieee802_1x_receive_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | eapol_test.c | 671 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean() 841 const u8 *shared_secret, in ieee802_1x_get_keys() 848 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 852 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 899 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() 914 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth() 937 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth() 1036 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf() 839 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) ieee802_1x_get_keys() argument 898 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) ieee802_1x_receive_auth() argument
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_ffdh.h | 26 * \param[out] shared_secret The buffer to which the shared secret 28 * \param[in] shared_secret_size Size of the \p shared_secret buffer in 46 uint8_t *shared_secret,
|
H A D | psa_crypto_ffdh.c | 263 uint8_t *shared_secret, in mbedtls_psa_ffdh_key_agreement() 301 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret, in mbedtls_psa_ffdh_key_agreement() 257 mbedtls_psa_ffdh_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *peer_key, size_t peer_key_length, const uint8_t *key_buffer, size_t key_buffer_size, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_psa_ffdh_key_agreement() argument
|
H A D | ssl_tls13_keys.c | 1472 unsigned char *shared_secret = NULL; in ssl_tls13_key_schedule_stage_handshake() local 1501 shared_secret = mbedtls_calloc(1, shared_secret_len); in ssl_tls13_key_schedule_stage_handshake() 1502 if (shared_secret == NULL) { in ssl_tls13_key_schedule_stage_handshake() 1509 shared_secret, shared_secret_len, &shared_secret_len); in ssl_tls13_key_schedule_stage_handshake() 1537 shared_secret, shared_secret_len, in ssl_tls13_key_schedule_stage_handshake() 1549 if (shared_secret != NULL) { in ssl_tls13_key_schedule_stage_handshake() 1550 mbedtls_zeroize_and_free(shared_secret, shared_secret_len); in ssl_tls13_key_schedule_stage_handshake()
|