Searched refs:secret_len (Results 1 - 25 of 26) sorted by relevance

12

/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
24 len[1] = secret_len;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
H A Deap_teap_common.c70 static int eap_teap_tls_prf(const u8 *secret, size_t secret_len, argument
75 return tls_prf_sha256(secret, secret_len, label, seed, seed_len,
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dsha256-tlsprf.c18 * @secret_len: Length of the key in bytes
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0)
H A Dsha256-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha512-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha384-kdf.c18 * @secret_len: Length of the key in bytes
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha1-tlsprf.c19 * @secret_len: Length of the key in bytes
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
63 L_S1 = L_S2 = (secret_len + 1) / 2;
66 if (secret_len & 1) {
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha512.h23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
H A Dsha384.h23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
H A Dcrypto_openssl.c2001 size_t secret_len; local
2052 EVP_PKEY_derive(ctx, NULL, &secret_len) != 1) {
2059 secret = wpabuf_alloc(secret_len);
2062 if (EVP_PKEY_derive(ctx, wpabuf_put(secret, 0), &secret_len) != 1) {
2068 if (secret->size != secret_len)
2070 "OpenSSL: EVP_PKEY_derive(2) changed secret_len %d -> %d",
2071 (int) secret->size, (int) secret_len);
2072 wpabuf_put(secret, secret_len);
H A Dtls_wolfssl.c2075 static int tls_sess_sec_cb(WOLFSSL *s, void *secret, int *secret_len, void *arg) argument
2103 *secret_len = SECRET_LEN;
H A Dtls_openssl.c5333 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument
5337 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len,
5379 *secret_len = SSL_MAX_MASTER_KEY_LENGTH;
/freebsd-11-stable/contrib/wpa/src/radius/
H A Dradius.h241 size_t secret_len);
243 size_t secret_len, const u8 *req_authenticator);
245 size_t secret_len,
248 size_t secret_len);
250 size_t secret_len,
253 size_t secret_len);
255 size_t secret_len,
264 size_t secret_len, struct radius_msg *sent_msg,
267 size_t secret_len, const u8 *req_auth);
273 const u8 *secret, size_t secret_len);
[all...]
H A Dradius.c368 size_t secret_len)
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
399 size_t secret_len, const u8 *req_authenticator)
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
427 len[3] = secret_len;
440 size_t secret_len,
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
465 len[1] = secret_len;
479 size_t secret_len)
489 len[1] = secret_len;
367 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
398 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
439 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument
478 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) argument
799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.h50 size_t IDr_len, size_t *secret_len);
H A Dikev2.c1128 size_t secret_len; local
1131 data->IDr_len, &secret_len);
1149 data->shared_secret = os_memdup(secret, secret_len);
1152 data->shared_secret_len = secret_len;
H A Deap_server_ikev2.c32 size_t *secret_len)
49 *secret_len = sm->user->password_len;
30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
H A Dtlsv1_common.h260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
/freebsd-11-stable/contrib/wpa/src/common/
H A Ddpp.c405 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, argument
409 return hmac_sha256_kdf(secret, secret_len, NULL,
413 return hmac_sha384_kdf(secret, secret_len, NULL,
417 return hmac_sha512_kdf(secret, secret_len, NULL,
614 u8 *secret, size_t *secret_len)
620 *secret_len = 0;
642 if (EVP_PKEY_derive(ctx, NULL, secret_len) != 1) {
648 if (*secret_len > DPP_MAX_SHARED_SECRET_LEN) {
650 int level = *secret_len > 200 ? MSG_ERROR : MSG_DEBUG;
654 * cases. For example, group 19 has shown cases where secret_len
613 dpp_ecdh(EVP_PKEY *own, EVP_PKEY *peer, u8 *secret, size_t *secret_len) argument
2230 size_t secret_len; local
2825 size_t secret_len; local
3080 size_t secret_len; local
3641 size_t secret_len; local
[all...]
H A Ddpp.h205 size_t secret_len; member in struct:dpp_authentication
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_sess.c1038 int *secret_len,
1035 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument

Completed in 153 milliseconds

12