/external/openssh/ |
D | kexc25519s.c | 59 struct sshbuf *shared_secret = NULL; in input_kex_c25519_init() local 98 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_c25519_init() 103 shared_secret)) < 0) in input_kex_c25519_init() 120 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_init() 148 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_init() 156 sshbuf_free(shared_secret); in input_kex_c25519_init()
|
D | kexc25519c.c | 77 struct sshbuf *shared_secret = NULL; in input_kex_c25519_reply() local 121 if ((shared_secret = sshbuf_new()) == NULL) { in input_kex_c25519_reply() 126 shared_secret)) < 0) in input_kex_c25519_reply() 140 sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), in input_kex_c25519_reply() 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_reply() 168 sshbuf_free(shared_secret); in input_kex_c25519_reply()
|
D | kexecdhs.c | 69 BIGNUM *shared_secret = NULL; in input_kex_ecdh_init() local 127 (shared_secret = BN_new()) == NULL) { in input_kex_ecdh_init() 133 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_init() 156 shared_secret, in input_kex_ecdh_init() 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_init() 201 if (shared_secret) in input_kex_ecdh_init() 202 BN_clear_free(shared_secret); in input_kex_ecdh_init()
|
D | kexecdhc.c | 105 BIGNUM *shared_secret = NULL; in input_kex_ecdh_reply() local 161 (shared_secret = BN_new()) == NULL) { in input_kex_ecdh_reply() 167 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { in input_kex_ecdh_reply() 187 shared_secret, in input_kex_ecdh_reply() 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_reply() 220 if (shared_secret) in input_kex_ecdh_reply() 221 BN_clear_free(shared_secret); in input_kex_ecdh_reply()
|
D | kexdhc.c | 100 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; in input_kex_dh() local 151 (shared_secret = BN_new()) == NULL) { in input_kex_dh() 156 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh() 174 shared_secret, in input_kex_dh() 193 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh() 205 if (shared_secret) in input_kex_dh() 206 BN_clear_free(shared_secret); in input_kex_dh()
|
D | kexdhs.c | 91 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; in input_kex_dh_init() local 143 (shared_secret = BN_new()) == NULL) { in input_kex_dh_init() 148 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_init() 168 shared_secret, in input_kex_dh_init() 198 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_init() 210 if (shared_secret) in input_kex_dh_init() 211 BN_clear_free(shared_secret); in input_kex_dh_init()
|
D | kexgexs.c | 150 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; in input_kex_dh_gex_init() local 202 (shared_secret = BN_new()) == NULL) { in input_kex_dh_gex_init() 207 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_init() 230 shared_secret, in input_kex_dh_gex_init() 260 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_init() 271 if (shared_secret) in input_kex_dh_gex_init() 272 BN_clear_free(shared_secret); in input_kex_dh_gex_init()
|
D | kexgexc.c | 157 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; in input_kex_dh_gex_reply() local 213 (shared_secret = BN_new()) == NULL) { in input_kex_dh_gex_reply() 218 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { in input_kex_dh_gex_reply() 241 shared_secret, in input_kex_dh_gex_reply() 260 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_reply() 272 if (shared_secret) in input_kex_dh_gex_reply() 273 BN_clear_free(shared_secret); in input_kex_dh_gex_reply()
|
D | kex.c | 679 const struct sshbuf *shared_secret, u_char **keyp) in derive_key() argument 698 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || in derive_key() 717 ssh_digest_update_buffer(hashctx, shared_secret) != 0 || in derive_key() 744 const struct sshbuf *shared_secret) in kex_derive_keys() argument 753 shared_secret, &keys[i])) != 0) { in kex_derive_keys() 774 struct sshbuf *shared_secret; in kex_derive_keys_bn() local 777 if ((shared_secret = sshbuf_new()) == NULL) in kex_derive_keys_bn() 779 if ((r = sshbuf_put_bignum2(shared_secret, secret)) == 0) in kex_derive_keys_bn() 780 r = kex_derive_keys(ssh, hash, hashlen, shared_secret); in kex_derive_keys_bn() 781 sshbuf_free(shared_secret); in kex_derive_keys_bn()
|
D | kexecdh.c | 60 const BIGNUM *shared_secret, in kex_ecdh_hash() argument 82 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kex_ecdh_hash()
|
D | kexdh.c | 53 const BIGNUM *shared_secret, in kex_dh_hash() argument 75 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kex_dh_hash()
|
D | kexgex.c | 57 const BIGNUM *shared_secret, in kexgex_hash() argument 84 (r = sshbuf_put_bignum2(b, shared_secret)) != 0) { in kexgex_hash()
|
D | kexc25519.c | 89 const u_char *shared_secret, size_t secretlen, in kex_c25519_hash() argument 111 (r = sshbuf_put(b, shared_secret, secretlen)) < 0) { in kex_c25519_hash()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_das.c | 21 u8 *shared_secret; member 236 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive() 300 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive() 355 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 371 das->shared_secret = os_malloc(conf->shared_secret_len); in radius_das_init() 372 if (das->shared_secret == NULL) { in radius_das_init() 376 os_memcpy(das->shared_secret, conf->shared_secret, in radius_das_init() 408 os_free(das->shared_secret); in radius_das_deinit()
|
D | radius_client.c | 67 const u8 *shared_secret, 130 const u8 *shared_secret; member 270 const u8 *shared_secret, in radius_client_register() argument 578 const u8 *shared_secret, in radius_client_list_add() argument 601 entry->shared_secret = shared_secret; in radius_client_list_add() 688 const u8 *shared_secret; in radius_client_send() local 704 conf->acct_server->shared_secret == NULL) { in radius_client_send() 711 shared_secret = conf->acct_server->shared_secret; in radius_client_send() 713 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send() 722 conf->auth_server->shared_secret == NULL) { in radius_client_send() [all …]
|
D | radius_client.h | 41 u8 *shared_secret; member 241 const u8 *shared_secret, size_t shared_secret_len,
|
D | radius_server.c | 105 char *shared_secret; member 777 (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 833 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 876 (u8 *) client->shared_secret, in radius_server_macacl() 914 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl() 959 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject() 1272 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth() 1384 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct() 1400 radius_msg_finish_acct_resp(resp, (u8 *) client->shared_secret, in radius_server_receive_acct() 1520 os_free(prev->shared_secret); in radius_server_free_clients() [all …]
|
D | radius_das.h | 42 const u8 *shared_secret; member
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 28 os_free(data->shared_secret); in ikev2_initiator_deinit() 619 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 1069 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1141 os_free(data->shared_secret); in ikev2_build_sa_auth() 1142 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth() 1143 if (data->shared_secret == NULL) in ikev2_build_sa_auth() 1146 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth() 1149 os_free(data->shared_secret); in ikev2_build_sa_auth() 1150 data->shared_secret = os_malloc(secret_len); in ikev2_build_sa_auth() 1151 if (data->shared_secret == NULL) in ikev2_build_sa_auth() [all …]
|
D | ikev2.h | 43 u8 *shared_secret; member
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 179 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query() 419 const u8 *shared_secret, in decode_tunnel_passwords() argument 435 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords() 478 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius() 544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 443 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret() 446 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 490 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() 538 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka() 583 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk() 764 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eapol_test.c | 626 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean() 795 const u8 *shared_secret, in ieee802_1x_get_keys() argument 802 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 806 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 853 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument 868 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth() 891 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth() 948 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.h | 44 u8 *shared_secret; member
|
D | eap_ikev2.c | 94 data->ikev2.shared_secret = os_malloc(password_len); in eap_ikev2_init() 95 if (data->ikev2.shared_secret == NULL) in eap_ikev2_init() 97 os_memcpy(data->ikev2.shared_secret, password, password_len); in eap_ikev2_init()
|