/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() 244 unsigned char *secret, int secret_len, in chapms2_verify_response() 323 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() 333 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() 541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, in ChapMS_NT() 556 char *secret, int secret_len, u_char NTResponse[24]) in ChapMS2_NT() 576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, in ChapMS_LANMan() 644 (char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() 692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) in Set_Start_Key() [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response()
|
D | auth.c | 1694 char secret[MAXWORDLEN]; local 1744 char secret[MAXWORDLEN]; local 1910 get_secret(unit, client, server, secret, secret_len, am_server) in get_secret() argument 1976 get_srp_secret(unit, client, server, secret, am_server) in get_srp_secret() argument 2310 scan_authfile(f, client, server, secret, addrs, opts, filename, flags) in scan_authfile() argument
|
D | chap-new.c | 403 unsigned char secret[MAXSECRETLEN]; in chap_verify_response() local 431 char secret[MAXSECRETLEN+1]; in chap_respond() local
|
D | eap.c | 1319 char secret[MAXWORDLEN]; local 1729 char secret[MAXSECRETLEN]; local
|
/external/ipsec-tools/src/racoon/ |
D | safefile.c | 48 safefile(path, secret) in safefile() argument
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() 209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local 395 static int rc_check_reply (AUTH_HDR *auth, int bufferlen, char *secret, in rc_check_reply()
|
D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) in rc_find_server()
|
D | radiusclient.h | 358 char secret[MAX_SECRET_LENGTH + 1]; member
|
/external/wpa_supplicant/ |
D | radius.c | 289 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len) in radius_msg_finish() 319 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() 360 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, in radius_msg_finish_acct() 581 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_msg_auth() 629 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, in radius_msg_verify() 778 const u8 *secret, size_t secret_len, size_t *reslen) in decrypt_ms_key() 850 const u8 *secret, size_t secret_len, in encrypt_ms_key() 899 u8 *secret, size_t secret_len) in radius_msg_get_ms_keys() 940 u8 *secret, size_t secret_len) in radius_msg_get_cisco_keys() 970 const u8 *secret, size_t secret_len, in radius_msg_add_mppe_keys() [all …]
|
D | sha1.c | 229 int tls_prf(const u8 *secret, size_t secret_len, const char *label, in tls_prf()
|
D | eapol_test.c | 666 int port, const char *secret) in wpa_init_conf()
|
D | tls_openssl.c | 2101 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, in tls_sess_sec_cb()
|
/external/tcpdump/ |
D | print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member 356 u_char *secret; in esp_print() local
|
/external/dbus/dbus/ |
D | dbus-keyring.c | 101 DBusString secret; /**< the actual key */ member
|
/external/mtpd/ |
D | l2tp.c | 103 static char *secret; variable
|