/third_party/lwip/src/netif/ppp/ |
D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument 273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response() 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() argument 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() argument 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash() [all …]
|
D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument 108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
|
D | chap-new.c | 417 int secret_len; local 420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) { 424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge, 438 int secret_len; local 469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, &secret_len, 0)) { 470 secret_len = 0; /* assume null secret if can't find one */ 479 secret, secret_len, pcb->chap_client.priv); 480 memset(secret, 0, secret_len);
|
/third_party/openssl/demos/keyexch/ |
D | x25519.c | 56 size_t secret_len; member 158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after() 168 if (local_peer->secret_len != 32) { /* unreachable */ in keyexch_x25519_after() 174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after() 182 &local_peer->secret_len) == 0) { in keyexch_x25519_after() 188 BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2); in keyexch_x25519_after() 196 OPENSSL_clear_free(local_peer->secret, local_peer->secret_len); in keyexch_x25519_after() 241 if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) { in keyexch_x25519() 248 peer1.secret_len) != 0) { in keyexch_x25519() 256 OPENSSL_clear_free(peer1.secret, peer1.secret_len); in keyexch_x25519() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius.h | 244 size_t secret_len); 246 size_t secret_len, const u8 *req_authenticator); 248 size_t secret_len, 251 size_t secret_len); 253 size_t secret_len, 256 size_t secret_len); 258 size_t secret_len, 267 size_t secret_len, struct radius_msg *sent_msg, 270 size_t secret_len, const u8 *req_auth); 276 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 368 size_t secret_len) in radius_msg_finish() argument 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 427 len[3] = secret_len; in radius_msg_finish_srv() 440 size_t secret_len, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 465 len[1] = secret_len; in radius_msg_finish_das_resp() 479 size_t secret_len) in radius_msg_finish_acct() argument 489 len[1] = secret_len; in radius_msg_finish_acct() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius.h | 241 size_t secret_len); 243 size_t secret_len, const u8 *req_authenticator); 245 size_t secret_len, 248 size_t secret_len); 250 size_t secret_len, 253 size_t secret_len); 255 size_t secret_len, 264 size_t secret_len, struct radius_msg *sent_msg, 267 size_t secret_len, const u8 *req_auth); 273 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 368 size_t secret_len) in radius_msg_finish() argument 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 427 len[3] = secret_len; in radius_msg_finish_srv() 440 size_t secret_len, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 465 len[1] = secret_len; in radius_msg_finish_das_resp() 479 size_t secret_len) in radius_msg_finish_acct() argument 489 len[1] = secret_len; in radius_msg_finish_acct() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5() 66 if (secret_len & 1) { in tls_prf_sha1_md5()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5() 66 if (secret_len & 1) { in tls_prf_sha1_md5()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_test_common_source.c | 30 size_t secret_len, in eap_tls_key_derivation() argument 40 if( secret_len != sizeof( keys->master_secret ) ) in eap_tls_key_derivation() 52 size_t secret_len, in nss_keylog_export() argument 81 for( j = 0; j < secret_len; j++ ) in nss_keylog_export() 122 size_t secret_len, in dtls_srtp_key_derivation() argument 132 if( secret_len != sizeof( keys->master_secret ) ) in dtls_srtp_key_derivation()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dpp_auth.c | 421 size_t secret_len; in dpp_auth_build_resp_ok() local 484 auth->Nx, &secret_len) < 0) in dpp_auth_build_resp_ok() 488 auth->Nx, auth->secret_len); in dpp_auth_build_resp_ok() 489 auth->Nx_len = auth->secret_len; in dpp_auth_build_resp_ok() 491 if (dpp_derive_k2(auth->Nx, auth->secret_len, auth->k2, in dpp_auth_build_resp_ok() 675 size_t secret_len; in dpp_auth_req_rx() local 782 if (dpp_ecdh(own_bi->pubkey, pi, auth->Mx, &secret_len) < 0) in dpp_auth_req_rx() 784 auth->secret_len = secret_len; in dpp_auth_req_rx() 787 auth->Mx, auth->secret_len); in dpp_auth_req_rx() 788 auth->Mx_len = auth->secret_len; in dpp_auth_req_rx() [all …]
|
/third_party/openssl/doc/man7/ |
D | EVP_KEYEXCH-DH.pod | 88 size_t secret_len = 0; 101 EVP_PKEY_derive(dctx, NULL, &secret_len); 102 secret = OPENSSL_zalloc(secret_len); 104 EVP_PKEY_derive(dctx, secret, &secret_len); 106 OPENSSL_clear_free(secret, secret_len);
|
/third_party/mbedtls/library/ |
D | ssl_tls13_keys.h | 118 const unsigned char *secret, size_t secret_len, 157 const unsigned char *server_secret, size_t secret_len, 206 const unsigned char *secret, size_t secret_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 24 len[1] = secret_len; in chap_md5()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 24 len[1] = secret_len; in chap_md5()
|