/barrelfish-master/lib/openssl-1.0.0d/crypto/jpake/ |
H A D | jpaketest.c | 120 BIGNUM *secret = BN_new(); local
|
H A D | jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument 115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument [all...] |
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | chap-md5.c | 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
|
H A D | auth.c | 1904 get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server) argument [all...] |
H A D | chap-new.c | 416 unsigned char secret[MAXSECRETLEN]; local 442 char secret[MAXSECRETLEN+1]; local [all...] |
H A D | pppapi.c | 236 pppapi_pppol2tp_create(struct netif *pppif, struct netif *netif, ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
|
H A D | pppol2tp.c | 109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument [all...] |
H A D | chap_ms.c | 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | eap.c | 1315 char secret[MAXSECRETLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | chap-md5.c | 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
|
H A D | pppapi.h | 80 const u8_t *secret; member in struct:pppapi_msg_msg::__anon156::__anon160
|
H A D | auth.c | 1904 get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server) argument [all...] |
H A D | chap-new.c | 416 unsigned char secret[MAXSECRETLEN]; local 442 char secret[MAXSECRETLEN+1]; local [all...] |
H A D | pppapi.c | 236 pppapi_pppol2tp_create(struct netif *pppif, struct netif *netif, ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument
|
H A D | pppol2tp.c | 109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) argument [all...] |
H A D | chap_ms.c | 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | pppol2tp.h | 172 const u8_t *secret; /* Secret string */ member in struct:pppol2tp_pcb_s
|
H A D | eap.c | 1315 char secret[MAXSECRETLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_sess.c | 843 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, argument
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | apps.c | 2630 void jpake_client_auth(BIO *out, BIO *conn, const char *secret) argument 2659 void jpake_server_auth(BIO *out, BIO *conn, const char *secret) argument 2468 jpake_init(const char *us, const char *them, const char *secret) argument
|