/freebsd-11.0-release/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 24 len[1] = secret_len;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | sha256-tlsprf.c | 18 * @secret_len: Length of the key in bytes 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
|
H A D | sha1-tlsprf.c | 19 * @secret_len: Length of the key in bytes 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 43 if (secret_len & 1) 66 L_S1 = L_S2 = (secret_len + 1) / 2; 69 if (secret_len & 1) {
|
H A D | sha256-kdf.c | 18 * @secret_len: Length of the key in bytes 29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument 48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | tls_openssl.c | 3968 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3972 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 4012 *secret_len = SSL_MAX_MASTER_KEY_LENGTH;
|
/freebsd-11.0-release/contrib/wpa/src/radius/ |
H A D | radius.h | 225 size_t secret_len); 227 size_t secret_len, const u8 *req_authenticator); 229 size_t secret_len, 232 size_t secret_len); 234 size_t secret_len, 237 size_t secret_len); 239 size_t secret_len); 247 size_t secret_len, struct radius_msg *sent_msg, 250 size_t secret_len, const u8 *req_auth); 257 const u8 *secret, size_t secret_len); [all...] |
H A D | radius.c | 363 size_t secret_len) 379 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 394 size_t secret_len, const u8 *req_authenticator) 411 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 422 len[3] = secret_len; 435 size_t secret_len, 453 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 460 len[1] = secret_len; 474 size_t secret_len) 484 len[1] = secret_len; 362 radius_msg_finish(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 393 radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 434 radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const struct radius_hdr *req_hdr) argument 473 radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 494 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 515 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 537 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 786 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 982 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1058 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1107 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1156 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1185 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1283 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1337 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1505 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.h | 50 size_t IDr_len, size_t *secret_len);
|
H A D | ikev2.c | 1129 size_t secret_len; local 1132 data->IDr_len, &secret_len); 1150 data->shared_secret = os_malloc(secret_len); 1153 os_memcpy(data->shared_secret, secret, secret_len); 1154 data->shared_secret_len = secret_len;
|
H A D | eap_server_ikev2.c | 32 size_t *secret_len) 49 *secret_len = sm->user->password_len; 30 eap_ikev2_get_shared_secret(void *ctx, const u8 *IDr, size_t IDr_len, size_t *secret_len) argument
|
/freebsd-11.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
H A D | tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/freebsd-11.0-release/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 1035 int *secret_len, 1032 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | ssl.h | 394 int *secret_len,
|