Searched defs:secret (Results 1 - 20 of 20) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/crypto/jpake/
H A Djpaketest.c120 BIGNUM *secret = BN_new(); local
H A Djpake.c27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
[all...]
/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dchap-md5.c61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
H A Dauth.c1904 get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server) argument
[all...]
H A Dchap-new.c416 unsigned char secret[MAXSECRETLEN]; local
442 char secret[MAXSECRETLEN+1]; local
[all...]
H A Dpppapi.c236 pppapi_pppol2tp_create(struct netif *pppif, struct netif *netif, ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
H A Dpppol2tp.c109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
[all...]
H A Dchap_ms.c572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) argument
594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) argument
612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) argument
744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) argument
873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Deap.c1315 char secret[MAXSECRETLEN]; local
1729 char secret[MAXSECRETLEN]; local
[all...]
/barrelfish-master/include/lwip2/netif/ppp/
H A Dchap-md5.c61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
H A Dpppapi.h80 const u8_t *secret; member in struct:pppapi_msg_msg::__anon156::__anon160
H A Dauth.c1904 get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server) argument
[all...]
H A Dchap-new.c416 unsigned char secret[MAXSECRETLEN]; local
442 char secret[MAXSECRETLEN+1]; local
[all...]
H A Dpppapi.c236 pppapi_pppol2tp_create(struct netif *pppif, struct netif *netif, ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
H A Dpppol2tp.c109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
[all...]
H A Dchap_ms.c572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) argument
594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) argument
612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) argument
744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) argument
873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dpppol2tp.h172 const u8_t *secret; /* Secret string */ member in struct:pppol2tp_pcb_s
H A Deap.c1315 char secret[MAXSECRETLEN]; local
1729 char secret[MAXSECRETLEN]; local
[all...]
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dssl_sess.c843 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, argument
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dapps.c2630 void jpake_client_auth(BIO *out, BIO *conn, const char *secret) argument
2659 void jpake_server_auth(BIO *out, BIO *conn, const char *secret) argument
2468 jpake_init(const char *us, const char *them, const char *secret) argument

Completed in 328 milliseconds