/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() argument 216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response() 242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument 257 (char *)secret, secret_len, md, in chapms2_verify_response() 319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument 324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response() 385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument 404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response() 579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument 583 int mdlen = secret_len; in NTPasswordHash() [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
|
D | chap-new.c | 419 int secret_len; in chap_verify_response() local 422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { in chap_verify_response() 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response() 442 int secret_len; in chap_respond() local 463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { in chap_respond() 464 secret_len = 0; /* assume null secret if can't find one */ in chap_respond() 473 secret, secret_len, cs->priv); in chap_respond() 474 memset(secret, 0, secret_len); in chap_respond()
|
D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
D | eap.c | 1318 int secret_len; local 1443 rhostname, secret, &secret_len, 0)) { 1451 MD5_Update(&mdContext, (u_char *)secret, secret_len); 1728 int secret_len; local 1869 esp->es_server.ea_name, secret, &secret_len, 1)) { 1876 MD5_Update(&mdContext, (u_char *)secret, secret_len);
|
D | auth.c | 1720 get_secret(unit, client, server, secret, secret_len, am_server) in get_secret() argument 1725 int *secret_len; 1774 *secret_len = len;
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.h | 225 size_t secret_len); 227 size_t secret_len, const u8 *req_authenticator); 229 size_t secret_len, 232 size_t secret_len); 234 size_t secret_len, 237 size_t secret_len); 239 size_t secret_len); 247 size_t secret_len, struct radius_msg *sent_msg, 250 size_t secret_len, const u8 *req_auth); 257 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 363 size_t secret_len) in radius_msg_finish() argument 379 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 394 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument 411 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 422 len[3] = secret_len; in radius_msg_finish_srv() 435 size_t secret_len, in radius_msg_finish_das_resp() argument 453 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 460 len[1] = secret_len; in radius_msg_finish_das_resp() 474 size_t secret_len) in radius_msg_finish_acct() argument 484 len[1] = secret_len; in radius_msg_finish_acct() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha256-tlsprf.c | 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256() 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256() 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 43 if (secret_len & 1) in tls_prf_sha1_md5() 66 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5() 69 if (secret_len & 1) { in tls_prf_sha1_md5()
|
D | sha256-kdf.c | 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 24 len[1] = secret_len; in chap_md5()
|
D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 const uint8_t *secret, size_t secret_len, in HKDF() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
|
/external/boringssl/src/ssl/ |
D | t1_enc.c | 156 const uint8_t *secret, size_t secret_len, in tls1_P_hash() argument 171 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || in tls1_P_hash() 224 size_t secret_len, const char *label, size_t label_len, in tls1_prf() argument 256 len = secret_len / count; in tls1_prf() 258 secret_len = 0; in tls1_prf() 266 if (!tls1_P_hash(tmp, out_len, md, S1, len + (secret_len & 1), in tls1_prf()
|
D | s3_enc.c | 167 size_t secret_len, const char *label, size_t label_len, in ssl3_prf() argument 196 EVP_DigestUpdate(&sha1, secret, secret_len); in ssl3_prf() 210 EVP_DigestUpdate(&md5, secret, secret_len); in ssl3_prf()
|
D | internal.h | 853 size_t secret_len, const char *label, size_t label_len, 1012 size_t secret_len, const char *label, size_t label_len,
|
/external/boringssl/src/include/openssl/ |
D | hkdf.h | 33 const uint8_t *secret, size_t secret_len,
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
D | tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
D | ikev2.c | 1129 size_t secret_len; in ikev2_build_sa_auth() local 1132 data->IDr_len, &secret_len); in ikev2_build_sa_auth() 1150 data->shared_secret = os_malloc(secret_len); in ikev2_build_sa_auth() 1153 os_memcpy(data->shared_secret, secret, secret_len); in ikev2_build_sa_auth() 1154 data->shared_secret_len = secret_len; in ikev2_build_sa_auth()
|
D | eap_server_ikev2.c | 32 size_t *secret_len) in eap_ikev2_get_shared_secret() argument 49 *secret_len = sm->user->password_len; in eap_ikev2_get_shared_secret()
|