Home
last modified time | relevance | path

Searched refs:secret_len (Results 1 – 25 of 73) sorted by relevance

123

/third_party/lwip/src/netif/ppp/
Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument
273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response()
298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument
313 (const char *)secret, secret_len, md, in chapms2_verify_response()
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() argument
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() argument
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument
577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash()
[all …]
Dchap-md5.c62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument
108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius.h241 size_t secret_len);
243 size_t secret_len, const u8 *req_authenticator);
245 size_t secret_len,
248 size_t secret_len);
250 size_t secret_len,
253 size_t secret_len);
255 size_t secret_len,
264 size_t secret_len, struct radius_msg *sent_msg,
267 size_t secret_len, const u8 *req_auth);
273 const u8 *secret, size_t secret_len);
[all …]
Dradius.c368 size_t secret_len) in radius_msg_finish() argument
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
427 len[3] = secret_len; in radius_msg_finish_srv()
440 size_t secret_len, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
465 len[1] = secret_len; in radius_msg_finish_das_resp()
479 size_t secret_len) in radius_msg_finish_acct() argument
489 len[1] = secret_len; in radius_msg_finish_acct()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius.h244 size_t secret_len);
246 size_t secret_len, const u8 *req_authenticator);
248 size_t secret_len,
251 size_t secret_len);
253 size_t secret_len,
256 size_t secret_len);
258 size_t secret_len,
267 size_t secret_len, struct radius_msg *sent_msg,
270 size_t secret_len, const u8 *req_auth);
276 const u8 *secret, size_t secret_len);
[all …]
Dradius.c368 size_t secret_len) in radius_msg_finish() argument
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
427 len[3] = secret_len; in radius_msg_finish_srv()
440 size_t secret_len, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
465 len[1] = secret_len; in radius_msg_finish_das_resp()
479 size_t secret_len) in radius_msg_finish_acct() argument
489 len[1] = secret_len; in radius_msg_finish_acct()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/
Dmasking.cc29 …asking::GetMasking(std::vector<float> *noise, int noise_len, const uint8_t *secret, int secret_len,
31 if ((secret_len != KEY_LENGTH_16 && secret_len != KEY_LENGTH_32) || secret == NULL) {
47 AESEncrypt encrypt(secret, secret_len, ivec, AES_IV_SIZE, AES_CTR);
/third_party/mbedtls/programs/ssl/
Dssl_test_common_source.c30 size_t secret_len, in eap_tls_key_derivation() argument
40 if( secret_len != sizeof( keys->master_secret ) ) in eap_tls_key_derivation()
52 size_t secret_len, in nss_keylog_export() argument
81 for( j = 0; j < secret_len; j++ ) in nss_keylog_export()
122 size_t secret_len, in dtls_srtp_key_derivation() argument
132 if( secret_len != sizeof( keys->master_secret ) ) in dtls_srtp_key_derivation()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Ddpp_auth.c421 size_t secret_len; in dpp_auth_build_resp_ok() local
484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok()
488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok()
489 auth->Nx_len = auth->secret_len; in dpp_auth_build_resp_ok()
491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok()
675 size_t secret_len; in dpp_auth_req_rx() local
782 if (dpp_ecdh(own_bi->pubkey, pi, auth->Mx, &secret_len) < 0) in dpp_auth_req_rx()
784 auth->secret_len = secret_len; in dpp_auth_req_rx()
787 auth->Mx, auth->secret_len); in dpp_auth_req_rx()
788 auth->Mx_len = auth->secret_len; in dpp_auth_req_rx()
[all …]
/third_party/mbedtls/library/
Dssl_tls13_keys.h118 const unsigned char *secret, size_t secret_len,
157 const unsigned char *server_secret, size_t secret_len,
206 const unsigned char *secret, size_t secret_len,

123