/freebsd-9.3-release/crypto/openssh/ |
H A D | kexc25519c.c | 55 Buffer shared_secret; local 96 buffer_init(&shared_secret); 97 kexc25519_shared_key(client_key, server_pubkey, &shared_secret); 109 buffer_ptr(&shared_secret), buffer_len(&shared_secret), 126 buffer_ptr(&shared_secret), buffer_len(&shared_secret)); 127 buffer_free(&shared_secret);
|
H A D | kexc25519s.c | 52 Buffer shared_secret; local 79 buffer_init(&shared_secret); 80 kexc25519_shared_key(server_key, client_pubkey, &shared_secret); 93 buffer_ptr(&shared_secret), buffer_len(&shared_secret), 123 buffer_ptr(&shared_secret), buffer_len(&shared_secret)); 124 buffer_free(&shared_secret);
|
H A D | kexdhc.c | 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 123 if ((shared_secret = BN_new()) == NULL) 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
H A D | kexdhs.c | 49 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 109 if ((shared_secret = BN_new()) == NULL) 111 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 127 shared_secret, 157 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 158 BN_clear_free(shared_secret);
|
H A D | kexecdhc.c | 55 BIGNUM *shared_secret; local 118 if ((shared_secret = BN_new()) == NULL) 120 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 136 shared_secret, 155 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 156 BN_clear_free(shared_secret);
|
H A D | kexecdhs.c | 52 BIGNUM *shared_secret; local 92 /* Calculate shared_secret */ 102 if ((shared_secret = BN_new()) == NULL) 104 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 121 shared_secret, 151 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 152 BN_clear_free(shared_secret);
|
H A D | kexgexc.c | 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 161 if ((shared_secret = BN_new()) == NULL) 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 183 shared_secret, 203 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 204 BN_clear_free(shared_secret);
|
H A D | kexgexs.c | 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 149 if ((shared_secret = BN_new()) == NULL) 151 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 173 shared_secret, 204 kex_derive_keys_bn(kex, hash, hashlen, shared_secret); 205 BN_clear_free(shared_secret);
|
H A D | kexdh.c | 51 BIGNUM *shared_secret, 72 buffer_put_bignum2(&b, shared_secret); 43 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexecdh.c | 60 const BIGNUM *shared_secret, 81 buffer_put_bignum2(&b, shared_secret); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 53 BIGNUM *shared_secret, 83 buffer_put_bignum2(&b, shared_secret); 43 kexgex_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexc25519.c | 86 const u_char *shared_secret, u_int secretlen, 107 buffer_append(&b, shared_secret, secretlen); 77 kex_c25519_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, u_int secretlen, u_char **hash, u_int *hashlen) argument
|
H A D | kex.c | 563 const u_char *shared_secret, u_int slen) 577 buffer_append(&b, shared_secret, slen); 621 const u_char *shared_secret, u_int slen) 628 shared_secret, slen); 646 Buffer shared_secret; local 648 buffer_init(&shared_secret); 649 buffer_put_bignum2(&shared_secret, secret); 651 buffer_ptr(&shared_secret), buffer_len(&shared_secret)); 652 buffer_free(&shared_secret); 562 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, const u_char *shared_secret, u_int slen) argument 620 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, const u_char *shared_secret, u_int slen) argument [all...] |
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_client.h | 45 * shared_secret - Shared secret for authenticating RADIUS messages 47 u8 *shared_secret; member in struct:hostapd_radius_server 50 * shared_secret_len - Length of shared_secret in octets 247 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_client.c | 73 const u8 *shared_secret, 134 * shared_secret - Shared secret with the target RADIUS server 136 const u8 *shared_secret; member in struct:radius_msg_list 139 * shared_secret_len - shared_secret length in octets 274 const u8 *shared_secret, 521 const u8 *shared_secret, 544 entry->shared_secret = shared_secret; 632 const u8 *shared_secret; local 651 shared_secret 270 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 518 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 919 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
H A D | radius_server.c | 92 char *shared_secret; member in struct:radius_client 575 (u8 *) client->shared_secret, 590 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 635 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 935 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1048 os_free(prev->shared_secret); 1159 entry->shared_secret = os_strdup(pos); 1160 if (entry->shared_secret == NULL) { 1165 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.h | 50 u8 *shared_secret; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 95 data->ikev2.shared_secret = os_malloc(password_len); 96 if (data->ikev2.shared_secret == NULL) 98 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.h | 49 u8 *shared_secret; member in struct:ikev2_initiator_data
|
H A D | ikev2.c | 33 os_free(data->shared_secret); 624 &data->keys, 0, data->shared_secret, 1074 &data->keys, 1, data->shared_secret, 1146 os_free(data->shared_secret); 1147 data->shared_secret = os_malloc(16); 1148 if (data->shared_secret == NULL) 1151 if (os_get_random(data->shared_secret, 16)) 1154 os_free(data->shared_secret); 1155 data->shared_secret = os_malloc(secret_len); 1156 if (data->shared_secret [all...] |
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 450 os_free(e->radius_conf->auth_server->shared_secret); 616 const u8 *shared_secret, 621 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 625 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 664 const u8 *shared_secret, size_t shared_secret_len, 679 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 702 ieee802_1x_get_keys(e, msg, req, shared_secret, 756 as->shared_secret = (u8 *) os_strdup(secret); 614 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 663 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 134 hapd->conf->radius->auth_server->shared_secret, 385 * @shared_secret: RADIUS shared secret 386 * @shared_secret_len: Length of shared_secret in octets 393 const u8 *shared_secret, size_t shared_secret_len, 415 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 392 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | accounting.c | 419 * @shared_secret: RADIUS shared secret 420 * @shared_secret_len: Length of shared_secret in octets 426 const u8 *shared_secret, size_t shared_secret_len, 434 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 425 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 299 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | ikev2_common.c | 439 const u8 *shared_secret, size_t shared_secret_len, 451 shared_secret == NULL || nonce == NULL || prf == NULL) 481 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|