Home
last modified time | relevance | path

Searched refs:shared_secret (Results 1 – 23 of 23) sorted by relevance

/external/wpa_supplicant_8/src/radius/
Dradius_client.c67 const u8 *shared_secret,
130 const u8 *shared_secret; member
280 const u8 *shared_secret, in radius_client_register() argument
445 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit()
648 const u8 *shared_secret, in radius_client_list_add() argument
671 entry->shared_secret = shared_secret; in radius_client_list_add()
728 const u8 *shared_secret; in radius_client_send() local
739 conf->acct_server->shared_secret == NULL) { in radius_client_send()
746 shared_secret = conf->acct_server->shared_secret; in radius_client_send()
748 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send()
[all …]
Dradius_das.c21 u8 *shared_secret; member
236 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive()
300 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive()
355 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init()
371 das->shared_secret = os_malloc(conf->shared_secret_len); in radius_das_init()
372 if (das->shared_secret == NULL) { in radius_das_init()
376 os_memcpy(das->shared_secret, conf->shared_secret, in radius_das_init()
408 os_free(das->shared_secret); in radius_das_deinit()
Dradius_client.h41 u8 *shared_secret; member
241 const u8 *shared_secret, size_t shared_secret_len,
Dradius_server.c105 char *shared_secret; member
780 (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
836 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap()
879 (u8 *) client->shared_secret, in radius_server_macacl()
917 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl()
962 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject()
1275 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth()
1387 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct()
1403 radius_msg_finish_acct_resp(resp, (u8 *) client->shared_secret, in radius_server_receive_acct()
1523 os_free(prev->shared_secret); in radius_server_free_clients()
[all …]
Dradius_das.h42 const u8 *shared_secret; member
/external/ImageMagick/MagickCore/
Ddistribute-cache.c182 *shared_secret; in ConnectPixelCacheServer() local
204 shared_secret=GetPolicyValue("shared-secret"); in ConnectPixelCacheServer()
205 if (shared_secret == (char *) NULL) in ConnectPixelCacheServer()
207 shared_secret=DestroyString(shared_secret); in ConnectPixelCacheServer()
212 shared_secret=DestroyString(shared_secret); in ConnectPixelCacheServer()
771 *shared_secret; in DistributePixelCacheClient() local
808 shared_secret=GetPolicyValue("shared-secret"); in DistributePixelCacheClient()
809 if (shared_secret == (char *) NULL) in DistributePixelCacheClient()
812 (void) CopyMagickString((char *) p,shared_secret,MagickPathExtent); in DistributePixelCacheClient()
813 p+=strlen(shared_secret); in DistributePixelCacheClient()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c28 os_free(data->shared_secret); in ikev2_initiator_deinit()
619 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret()
1069 &data->keys, 1, data->shared_secret, in ikev2_build_auth()
1141 os_free(data->shared_secret); in ikev2_build_sa_auth()
1142 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth()
1143 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
1146 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth()
1149 os_free(data->shared_secret); in ikev2_build_sa_auth()
1150 data->shared_secret = os_malloc(secret_len); in ikev2_build_sa_auth()
1151 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
[all …]
Dikev2.h43 u8 *shared_secret; member
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c172 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query()
428 const u8 *shared_secret, in decode_tunnel_passwords() argument
444 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords()
504 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument
527 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in hostapd_acl_recv_radius()
576 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
Daccounting.c415 const u8 *shared_secret, size_t shared_secret_len, in accounting_receive() argument
423 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in accounting_receive()
Dieee802_1x.c1317 const u8 *shared_secret, in ieee802_1x_get_keys() argument
1325 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
1658 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument
1692 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth()
1801 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, in ieee802_1x_receive_auth()
Dap_config.c348 os_free(servers[i].shared_secret); in hostapd_config_free_radius()
Dhostapd.c1033 das_conf.shared_secret = conf->radius_das_shared_secret; in hostapd_setup_bss()
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c435 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret()
438 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
482 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki()
530 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka()
575 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk()
746 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
Deap_eke_common.h68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member
Dikev2_common.c372 const u8 *shared_secret, size_t shared_secret_len, in ikev2_derive_auth_data() argument
384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data()
414 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, in ikev2_derive_auth_data()
Dikev2_common.h289 const u8 *shared_secret, size_t shared_secret_len,
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.h44 u8 *shared_secret; member
Deap_ikev2.c94 data->ikev2.shared_secret = os_malloc(password_len); in eap_ikev2_init()
95 if (data->ikev2.shared_secret == NULL) in eap_ikev2_init()
97 os_memcpy(data->ikev2.shared_secret, password, password_len); in eap_ikev2_init()
Dikev2.c24 os_free(data->shared_secret); in ikev2_responder_deinit()
551 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret()
1003 &data->keys, 0, data->shared_secret, in ikev2_build_auth()
/external/wpa_supplicant_8/wpa_supplicant/
Deapol_test.c675 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean()
846 const u8 *shared_secret, in ieee802_1x_get_keys() argument
853 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
857 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
904 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument
919 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth()
942 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth()
1040 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
/external/wpa_supplicant_8/hostapd/
Dconfig_file.c2327 os_free(bss->radius->auth_server->shared_secret); in hostapd_config_fill()
2328 bss->radius->auth_server->shared_secret = (u8 *) os_strdup(pos); in hostapd_config_fill()
2361 os_free(bss->radius->acct_server->shared_secret); in hostapd_config_fill()
2362 bss->radius->acct_server->shared_secret = (u8 *) os_strdup(pos); in hostapd_config_fill()
DREADME181 auth_server_{addr,port,shared_secret} options. In addition,