/external/openssh/ |
D | kexgen.c | 57 const struct sshbuf *shared_secret, in kex_gen_hash() argument 79 (r = sshbuf_putb(b, shared_secret)) != 0) { in kex_gen_hash() 143 struct sshbuf *shared_secret = NULL; in input_kex_gen_reply() local 179 r = kex_dh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 182 r = kex_ecdh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 186 r = kex_c25519_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 190 &shared_secret); in input_kex_gen_reply() 210 shared_secret, in input_kex_gen_reply() 218 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_gen_reply() 230 sshbuf_free(shared_secret); in input_kex_gen_reply() [all …]
|
D | kexgexs.c | 131 struct sshbuf *shared_secret = NULL; in input_kex_dh_gex_init() local 147 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_dh_gex_init() 151 if ((r = kex_dh_compute_key(kex, dh_client_pub, shared_secret)) != 0) in input_kex_dh_gex_init() 175 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_init() 192 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_init() 199 sshbuf_free(shared_secret); in input_kex_dh_gex_init()
|
D | kexgexc.c | 148 struct sshbuf *shared_secret = NULL; in input_kex_dh_gex_reply() local 173 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_dh_gex_reply() 177 if ((r = kex_dh_compute_key(kex, dh_server_pub, shared_secret)) != 0) in input_kex_dh_gex_reply() 197 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_dh_gex_reply() 205 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_reply() 212 sshbuf_free(shared_secret); in input_kex_dh_gex_reply()
|
D | kexdh.c | 74 BIGNUM *shared_secret = NULL; in kex_dh_compute_key() local 94 (shared_secret = BN_new()) == NULL) { in kex_dh_compute_key() 99 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in kex_dh_compute_key() 106 r = sshbuf_put_bignum2(out, shared_secret); in kex_dh_compute_key() 109 BN_clear_free(shared_secret); in kex_dh_compute_key()
|
D | kexecdh.c | 142 BIGNUM *shared_secret = NULL; in kex_ecdh_dec_key_group() local 175 (shared_secret = BN_new()) == NULL) { in kex_ecdh_dec_key_group() 180 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in kex_ecdh_dec_key_group() 187 if ((r = sshbuf_put_bignum2(buf, shared_secret)) != 0) in kex_ecdh_dec_key_group() 193 BN_clear_free(shared_secret); in kex_ecdh_dec_key_group()
|
D | kexgex.c | 59 const u_char *shared_secret, size_t secretlen, in kexgex_hash() argument 86 (r = sshbuf_put(b, shared_secret, secretlen)) != 0) { in kexgex_hash()
|
/external/libwebsockets/lib/jose/jwe/ |
D | jwe-ecdh-es-aeskw.c | 202 uint8_t shared_secret[LWS_JWE_LIMIT_KEY_ELEMENT_BYTES], in lws_jwe_encrypt_ecdh() local 204 int m, n, ret = -1, ot = *temp_len, ss_len = sizeof(shared_secret), in lws_jwe_encrypt_ecdh() 239 if (lws_genecdh_compute_shared_secret(&ecctx, shared_secret, &ss_len)) { in lws_jwe_encrypt_ecdh() 268 derived, shared_secret, ss_len)) { in lws_jwe_encrypt_ecdh() 371 lws_explicit_bzero(shared_secret, ekbytes); in lws_jwe_encrypt_ecdh() 455 uint8_t shared_secret[LWS_JWE_LIMIT_KEY_ELEMENT_BYTES], in lws_jwe_auth_and_decrypt_ecdh() local 460 int n, ret = -1, ss_len = sizeof(shared_secret); in lws_jwe_auth_and_decrypt_ecdh() 505 if (lws_genecdh_compute_shared_secret(&ecctx, shared_secret, &ss_len)) { in lws_jwe_auth_and_decrypt_ecdh() 526 derived, shared_secret, ss_len)) { in lws_jwe_auth_and_decrypt_ecdh() 568 (uint8_t *)shared_secret, in lws_jwe_auth_and_decrypt_ecdh() [all …]
|
/external/boringssl/src/crypto/hpke/ |
D | hpke.c | 155 const uint8_t *shared_secret, in hpke_key_schedule() argument 223 if (!hpke_labeled_extract(hpke->hkdf_md, secret, &secret_len, shared_secret, in hpke_key_schedule() 347 uint8_t shared_secret[SHA256_DIGEST_LENGTH]; in EVP_HPKE_CTX_setup_base_s_x25519_for_test() local 348 if (!hpke_encap(hpke, shared_secret, peer_public_value, ephemeral_private, in EVP_HPKE_CTX_setup_base_s_x25519_for_test() 350 !hpke_key_schedule(hpke, HPKE_MODE_BASE, shared_secret, in EVP_HPKE_CTX_setup_base_s_x25519_for_test() 351 sizeof(shared_secret), info, info_len, NULL, 0, NULL, in EVP_HPKE_CTX_setup_base_s_x25519_for_test() 371 uint8_t shared_secret[SHA256_DIGEST_LENGTH]; in EVP_HPKE_CTX_setup_base_r_x25519() local 372 if (!hpke_decap(hpke, shared_secret, enc, public_key, private_key) || in EVP_HPKE_CTX_setup_base_r_x25519() 373 !hpke_key_schedule(hpke, HPKE_MODE_BASE, shared_secret, in EVP_HPKE_CTX_setup_base_r_x25519() 374 sizeof(shared_secret), info, info_len, NULL, 0, NULL, in EVP_HPKE_CTX_setup_base_r_x25519() [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_client.c | 67 const u8 *shared_secret, 135 const u8 *shared_secret; member 285 const u8 *shared_secret, in radius_client_register() argument 453 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit() 668 const u8 *shared_secret, in radius_client_list_add() argument 691 entry->shared_secret = shared_secret; in radius_client_list_add() 751 const u8 *shared_secret; in radius_client_send() local 762 conf->acct_server->shared_secret == NULL) { in radius_client_send() 769 shared_secret = conf->acct_server->shared_secret; in radius_client_send() 771 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send() [all …]
|
D | radius_das.c | 21 u8 *shared_secret; member 432 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive() 486 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive() 541 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 560 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init() 562 if (das->shared_secret == NULL) { in radius_das_init() 596 os_free(das->shared_secret); in radius_das_deinit()
|
D | radius_client.h | 41 u8 *shared_secret; member 241 const u8 *shared_secret, size_t shared_secret_len,
|
D | radius_server.c | 109 char *shared_secret; member 973 (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1142 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1188 (u8 *) client->shared_secret, in radius_server_macacl() 1226 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl() 1271 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject() 1565 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp() 1609 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp() 1764 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth() 1876 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct() [all …]
|
D | radius_das.h | 46 const u8 *shared_secret; member
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 131 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query() 373 const u8 *shared_secret, in decode_tunnel_passwords() argument 389 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords() 450 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument 473 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius() 521 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
|
D | accounting.c | 413 const u8 *shared_secret, size_t shared_secret_len, in accounting_receive() argument 421 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in accounting_receive()
|
/external/ImageMagick/MagickCore/ |
D | distribute-cache.c | 181 *shared_secret; in ConnectPixelCacheServer() local 203 shared_secret=GetPolicyValue("cache:shared-secret"); in ConnectPixelCacheServer() 204 if (shared_secret == (char *) NULL) in ConnectPixelCacheServer() 210 shared_secret=DestroyString(shared_secret); in ConnectPixelCacheServer() 761 *shared_secret; in DistributePixelCacheClient() local 796 shared_secret=GetPolicyValue("cache:shared-secret"); in DistributePixelCacheClient() 797 if (shared_secret == (char *) NULL) in DistributePixelCacheClient() 800 (void) CopyMagickString((char *) p,shared_secret,MagickPathExtent); in DistributePixelCacheClient() 801 p+=strlen(shared_secret); in DistributePixelCacheClient() 802 shared_secret=DestroyString(shared_secret); in DistributePixelCacheClient()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 28 os_free(data->shared_secret); in ikev2_initiator_deinit() 618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1140 os_free(data->shared_secret); in ikev2_build_sa_auth() 1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth() 1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth() 1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth() 1148 os_free(data->shared_secret); in ikev2_build_sa_auth() 1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth() 1150 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
|
D | ikev2.h | 43 u8 *shared_secret; member
|
/external/scapy/scapy/layers/ |
D | radius.py | 565 shared_secret): argument 571 radius_hmac = hmac.new(shared_secret, data, hashlib.md5) 1155 def compute_authenticator(self, packed_request_auth, shared_secret): argument 1161 radius_mac = hashlib.md5(data + shared_secret)
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() 508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka() 553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk() 724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
|
D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member
|
D | ikev2_common.c | 372 const u8 *shared_secret, size_t shared_secret_len, in ikev2_derive_auth_data() argument 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 414 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, in ikev2_derive_auth_data()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.h | 44 u8 *shared_secret; member
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eapol_test.c | 671 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean() 841 const u8 *shared_secret, in ieee802_1x_get_keys() argument 848 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 852 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 899 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument 914 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth() 937 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth() 1035 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
|
/external/libwebsockets/include/libwebsockets/ |
D | lws-jwe.h | 164 uint8_t *out, const uint8_t *shared_secret, int sslen);
|