Home
last modified time | relevance | path

Searched refs:shared_secret (Results 1 – 25 of 37) sorted by relevance

12

/external/openssh/
Dkexc25519s.c60 struct sshbuf *shared_secret = NULL; in input_kex_c25519_init() local
99 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_c25519_init()
104 shared_secret)) < 0) in input_kex_c25519_init()
121 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_init()
149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_init()
157 sshbuf_free(shared_secret); in input_kex_c25519_init()
Dkexc25519c.c77 struct sshbuf *shared_secret = NULL; in input_kex_c25519_reply() local
121 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_c25519_reply()
126 shared_secret)) < 0) in input_kex_c25519_reply()
140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_reply()
159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_reply()
168 sshbuf_free(shared_secret); in input_kex_c25519_reply()
Dkexecdhs.c69 BIGNUM *shared_secret = NULL; in input_kex_ecdh_init() local
127 (shared_secret = BN_new()) == NULL) { in input_kex_ecdh_init()
133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init()
156 shared_secret, in input_kex_ecdh_init()
187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_init()
201 if (shared_secret) in input_kex_ecdh_init()
202 BN_clear_free(shared_secret); in input_kex_ecdh_init()
Dkexecdhc.c105 BIGNUM *shared_secret = NULL; in input_kex_ecdh_reply() local
161 (shared_secret = BN_new()) == NULL) { in input_kex_ecdh_reply()
167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply()
187 shared_secret, in input_kex_ecdh_reply()
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_reply()
220 if (shared_secret) in input_kex_ecdh_reply()
221 BN_clear_free(shared_secret); in input_kex_ecdh_reply()
Dkexdhs.c98 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; in input_kex_dh_init() local
150 (shared_secret = BN_new()) == NULL) { in input_kex_dh_init()
155 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_init()
176 shared_secret, in input_kex_dh_init()
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_init()
218 if (shared_secret) in input_kex_dh_init()
219 BN_clear_free(shared_secret); in input_kex_dh_init()
Dkexdhc.c107 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; in input_kex_dh() local
158 (shared_secret = BN_new()) == NULL) { in input_kex_dh()
163 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh()
182 shared_secret, in input_kex_dh()
201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh()
213 if (shared_secret) in input_kex_dh()
214 BN_clear_free(shared_secret); in input_kex_dh()
Dkexgexs.c127 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; in input_kex_dh_gex_init() local
179 (shared_secret = BN_new()) == NULL) { in input_kex_dh_gex_init()
184 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_init()
207 shared_secret, in input_kex_dh_gex_init()
237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_init()
248 if (shared_secret) in input_kex_dh_gex_init()
249 BN_clear_free(shared_secret); in input_kex_dh_gex_init()
Dkexgexc.c150 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; in input_kex_dh_gex_reply() local
206 (shared_secret = BN_new()) == NULL) { in input_kex_dh_gex_reply()
211 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_reply()
234 shared_secret, in input_kex_dh_gex_reply()
253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_reply()
265 if (shared_secret) in input_kex_dh_gex_reply()
266 BN_clear_free(shared_secret); in input_kex_dh_gex_reply()
Dkexdh.c54 const BIGNUM *shared_secret, in kex_dh_hash() argument
76 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kex_dh_hash()
Dkexecdh.c60 const BIGNUM *shared_secret, in kex_ecdh_hash() argument
82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kex_ecdh_hash()
Dkexgex.c57 const BIGNUM *shared_secret, in kexgex_hash() argument
84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kexgex_hash()
Dkex.c885 const struct sshbuf *shared_secret, u_char **keyp) in derive_key() argument
904 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || in derive_key()
923 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || in derive_key()
949 const struct sshbuf *shared_secret) in kex_derive_keys() argument
958 shared_secret, &keys[i])) != 0) { in kex_derive_keys()
979 struct sshbuf *shared_secret; in kex_derive_keys_bn() local
982 if ((shared_secret = sshbuf_new()) == NULL) in kex_derive_keys_bn()
984 if ((r = sshbuf_put_bignum2(shared_secret, secret)) == 0) in kex_derive_keys_bn()
985 r = kex_derive_keys(ssh, hash, hashlen, shared_secret); in kex_derive_keys_bn()
986 sshbuf_free(shared_secret); in kex_derive_keys_bn()
Dkexc25519.c94 const u_char *shared_secret, size_t secretlen, in kex_c25519_hash() argument
116 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) { in kex_c25519_hash()
/external/wpa_supplicant_8/src/radius/
Dradius_client.c67 const u8 *shared_secret,
135 const u8 *shared_secret; member
285 const u8 *shared_secret, in radius_client_register() argument
453 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit()
668 const u8 *shared_secret, in radius_client_list_add() argument
691 entry->shared_secret = shared_secret; in radius_client_list_add()
751 const u8 *shared_secret; in radius_client_send() local
762 conf->acct_server->shared_secret == NULL) { in radius_client_send()
769 shared_secret = conf->acct_server->shared_secret; in radius_client_send()
771 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send()
[all …]
Dradius_das.c21 u8 *shared_secret; member
432 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive()
486 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive()
541 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init()
560 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init()
562 if (das->shared_secret == NULL) { in radius_das_init()
596 os_free(das->shared_secret); in radius_das_deinit()
Dradius_client.h41 u8 *shared_secret; member
241 const u8 *shared_secret, size_t shared_secret_len,
Dradius_server.c114 char *shared_secret; member
1132 (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
1294 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
1340 (u8 *) client->shared_secret, in radius_server_macacl()
1378 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl()
1423 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject()
1717 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp()
1761 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp()
1916 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth()
2028 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct()
[all …]
Dradius_das.h46 const u8 *shared_secret; member
/external/ImageMagick/MagickCore/
Ddistribute-cache.c183 *shared_secret; in ConnectPixelCacheServer() local
205 shared_secret=GetPolicyValue("cache:shared-secret"); in ConnectPixelCacheServer()
206 if (shared_secret == (char *) NULL) in ConnectPixelCacheServer()
208 shared_secret=DestroyString(shared_secret); in ConnectPixelCacheServer()
213 shared_secret=DestroyString(shared_secret); in ConnectPixelCacheServer()
770 *shared_secret; in DistributePixelCacheClient() local
807 shared_secret=GetPolicyValue("cache:shared-secret"); in DistributePixelCacheClient()
808 if (shared_secret == (char *) NULL) in DistributePixelCacheClient()
811 (void) CopyMagickString((char *) p,shared_secret,MagickPathExtent); in DistributePixelCacheClient()
812 p+=strlen(shared_secret); in DistributePixelCacheClient()
[all …]
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c172 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query()
438 const u8 *shared_secret, in decode_tunnel_passwords() argument
454 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords()
515 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument
537 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius()
584 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c28 os_free(data->shared_secret); in ikev2_initiator_deinit()
618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret()
1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth()
1140 os_free(data->shared_secret); in ikev2_build_sa_auth()
1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth()
1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth()
1148 os_free(data->shared_secret); in ikev2_build_sa_auth()
1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth()
1150 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
/external/scapy/scapy/layers/
Dradius.py565 shared_secret): argument
571 radius_hmac = hmac.new(shared_secret, data, hashlib.md5)
1155 def compute_authenticator(self, packed_request_auth, shared_secret): argument
1161 radius_mac = hashlib.md5(data + shared_secret)
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret()
416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki()
508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka()
553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk()
724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
/external/wpa_supplicant_8/wpa_supplicant/
Deapol_test.c675 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean()
847 const u8 *shared_secret, in ieee802_1x_get_keys() argument
854 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
858 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
905 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument
920 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth()
943 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth()
1041 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.h44 u8 *shared_secret; member

12