Home
last modified time | relevance | path

Searched refs:secret_len (Results 1 – 25 of 39) sorted by relevance

12

/external/ppp/pppd/
Dchap_ms.c194 unsigned char *secret, int secret_len, in chapms_verify_response() argument
216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response()
242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument
257 (char *)secret, secret_len, md, in chapms2_verify_response()
319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument
324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response()
385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument
404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response()
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument
583 int mdlen = secret_len; in NTPasswordHash()
[all …]
Dchap-md5.c58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
Dchap-new.c419 int secret_len; in chap_verify_response() local
422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { in chap_verify_response()
427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response()
442 int secret_len; in chap_respond() local
463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { in chap_respond()
464 secret_len = 0; /* assume null secret if can't find one */ in chap_respond()
473 secret, secret_len, cs->priv); in chap_respond()
474 memset(secret, 0, secret_len); in chap_respond()
Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
/external/wpa_supplicant_8/src/radius/
Dradius.h241 size_t secret_len);
243 size_t secret_len, const u8 *req_authenticator);
245 size_t secret_len,
248 size_t secret_len);
250 size_t secret_len,
253 size_t secret_len);
255 size_t secret_len,
264 size_t secret_len, struct radius_msg *sent_msg,
267 size_t secret_len, const u8 *req_auth);
273 const u8 *secret, size_t secret_len);
[all …]
Dradius.c368 size_t secret_len) in radius_msg_finish() argument
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
399 size_t secret_len, const u8 *req_authenticator) in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
427 len[3] = secret_len; in radius_msg_finish_srv()
440 size_t secret_len, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
465 len[1] = secret_len; in radius_msg_finish_das_resp()
479 size_t secret_len) in radius_msg_finish_acct() argument
489 len[1] = secret_len; in radius_msg_finish_acct()
[all …]
/external/boringssl/src/crypto/fipsmodule/tls/
Dkdf.c69 const uint8_t *secret, size_t secret_len, in tls1_P_hash() argument
83 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || in tls1_P_hash()
139 const uint8_t *secret, size_t secret_len, in CRYPTO_tls1_prf() argument
151 size_t secret_half = secret_len - (secret_len / 2); in CRYPTO_tls1_prf()
158 secret += secret_len - secret_half; in CRYPTO_tls1_prf()
159 secret_len = secret_half; in CRYPTO_tls1_prf()
163 return tls1_P_hash(out, out_len, digest, secret, secret_len, label, label_len, in CRYPTO_tls1_prf()
Dinternal.h29 const uint8_t *secret, size_t secret_len,
/external/wpa_supplicant_8/src/crypto/
Dsha256-tlsprf.c29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256()
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256()
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
63 L_S1 = L_S2 = (secret_len + 1) / 2; in tls_prf_sha1_md5()
66 if (secret_len & 1) { in tls_prf_sha1_md5()
Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
Dsha512.h23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
Dsha384.h23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
/external/boringssl/src/crypto/hkdf/
Dhkdf.c27 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() argument
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
43 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF_extract() argument
50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract()
/external/wpa_supplicant_8/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
24 len[1] = secret_len; in chap_md5()
Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/boringssl/src/ssl/
Dtls13_enc.cc70 const uint8_t *secret, size_t secret_len, in hkdf_expand_label() argument
92 return HKDF_expand(out, len, digest, secret, secret_len, hkdf_label.data(), in hkdf_expand_label()
342 size_t secret_len; in tls13_rotate_traffic_key() local
345 secret_len = ssl->s3->read_traffic_secret_len; in tls13_rotate_traffic_key()
348 secret_len = ssl->s3->write_traffic_secret_len; in tls13_rotate_traffic_key()
352 if (!hkdf_expand_label(secret, digest, secret, secret_len, in tls13_rotate_traffic_key()
355 secret_len)) { in tls13_rotate_traffic_key()
360 secret, secret_len); in tls13_rotate_traffic_key()
/external/boringssl/src/include/openssl/
Dhkdf.h36 const uint8_t *secret, size_t secret_len,
46 size_t secret_len, const uint8_t *salt,
/external/wpa_supplicant_8/src/tls/
Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
/external/wpa_supplicant_8/src/common/
Ddpp.c349 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument
353 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
357 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
361 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
1471 len[num_elem] = auth->secret_len; in dpp_derive_ke()
2089 size_t secret_len; in dpp_auth_init() local
2161 EVP_PKEY_derive(ctx, NULL, &secret_len) != 1 || in dpp_auth_init()
2162 secret_len > DPP_MAX_SHARED_SECRET_LEN || in dpp_auth_init()
2163 EVP_PKEY_derive(ctx, auth->Mx, &secret_len) != 1) { in dpp_auth_init()
2169 auth->secret_len = secret_len; in dpp_auth_init()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Dikev2.h50 size_t IDr_len, size_t *secret_len);

12