Searched refs:secret_len (Results 1 - 18 of 18) sorted by relevance

/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
43 if (secret_len & 1)
66 L_S1 = L_S2 = (secret_len + 1) / 2;
69 if (secret_len & 1) {
H A Dsha256.h20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dtls_openssl.c2878 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument
2899 *secret_len = SSL_MAX_MASTER_KEY_LENGTH;
/freebsd-10.0-release/contrib/wpa/src/radius/
H A Dradius.h199 size_t secret_len);
201 size_t secret_len, const u8 *req_authenticator);
203 size_t secret_len,
206 size_t secret_len);
208 size_t secret_len);
210 size_t secret_len);
218 size_t secret_len, struct radius_msg *sent_msg,
221 size_t secret_len, const u8 *req_auth);
228 const u8 *secret, size_t secret_len);
231 const u8 *secret, size_t secret_len);
[all...]
H A Dradius.c345 size_t secret_len)
361 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
376 size_t secret_len, const u8 *req_authenticator)
393 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
404 len[3] = secret_len;
417 size_t secret_len,
435 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
442 len[1] = secret_len;
456 size_t secret_len)
466 len[1] = secret_len;
344 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
375 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
416 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument
455 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
476 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
498 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
747 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
797 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
945 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1017 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1066 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1107 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1136 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1210 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1412 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Dikev2.h50 size_t IDr_len, size_t *secret_len);
H A Dikev2.c1129 size_t secret_len; local
1132 data->IDr_len, &secret_len);
1150 data->shared_secret = os_malloc(secret_len);
1153 os_memcpy(data->shared_secret, secret, secret_len);
1154 data->shared_secret_len = secret_len;
H A Deap_server_ikev2.c32 size_t *secret_len)
49 *secret_len = sm->user->password_len;
30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_common.c309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
H A Dtlsv1_common.h258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
/freebsd-10.0-release/crypto/openssh/
H A Dauth2-jpake.c277 u_int secret_len, salt_len; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
363 bzero(secret, secret_len);
H A Dsshconnect2.c1021 u_int secret_len; local
1042 &secret, &secret_len) != 0)
1050 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL)
1052 bzero(secret, secret_len);
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dssl_sess.c921 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, argument
H A Dssl.h383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);

Completed in 142 milliseconds