/freebsd-10.0-release/crypto/openssh/ |
H A D | kexdhc.c | 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 123 if ((shared_secret = BN_new()) == NULL) 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
H A D | kexecdhc.c | 55 BIGNUM *shared_secret; local 118 if ((shared_secret = BN_new()) == NULL) 120 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 136 shared_secret, 155 kex_derive_keys(kex, hash, hashlen, shared_secret); 156 BN_clear_free(shared_secret);
|
H A D | kexdhs.c | 53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 113 if ((shared_secret = BN_new()) == NULL) 115 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 131 shared_secret, 161 kex_derive_keys(kex, hash, hashlen, shared_secret); 162 BN_clear_free(shared_secret);
|
H A D | kexecdhs.c | 57 BIGNUM *shared_secret; local 97 /* Calculate shared_secret */ 107 if ((shared_secret = BN_new()) == NULL) 109 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 126 shared_secret, 156 kex_derive_keys(kex, hash, hashlen, shared_secret); 157 BN_clear_free(shared_secret);
|
H A D | kexgexc.c | 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 161 if ((shared_secret = BN_new()) == NULL) 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 183 shared_secret, 203 kex_derive_keys(kex, hash, hashlen, shared_secret); 204 BN_clear_free(shared_secret);
|
H A D | kexgexs.c | 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 149 if ((shared_secret = BN_new()) == NULL) 151 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 173 shared_secret, 204 kex_derive_keys(kex, hash, hashlen, shared_secret); 205 BN_clear_free(shared_secret);
|
H A D | kexdh.c | 49 BIGNUM *shared_secret, 72 buffer_put_bignum2(&b, shared_secret); 41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexecdh.c | 59 const BIGNUM *shared_secret, 81 buffer_put_bignum2(&b, shared_secret); 49 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 51 BIGNUM *shared_secret, 82 buffer_put_bignum2(&b, shared_secret); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kex.c | 551 BIGNUM *shared_secret) 565 buffer_put_bignum2(&b, shared_secret); 601 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument 608 shared_secret); 550 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
|
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius_das.h | 32 const u8 *shared_secret; member in struct:radius_das_conf
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.c | 24 u8 *shared_secret; member in struct:radius_das_data 191 if (radius_msg_verify_das_req(msg, das->shared_secret, 254 if (radius_msg_finish_das_resp(reply, das->shared_secret, 309 if (conf->port == 0 || conf->shared_secret == NULL || 325 das->shared_secret = os_malloc(conf->shared_secret_len); 326 if (das->shared_secret == NULL) { 330 os_memcpy(das->shared_secret, conf->shared_secret, 362 os_free(das->shared_secret);
|
H A D | radius_client.c | 67 const u8 *shared_secret, 128 * shared_secret - Shared secret with the target RADIUS server 130 const u8 *shared_secret; member in struct:radius_msg_list 133 * shared_secret_len - shared_secret length in octets 268 const u8 *shared_secret, 515 const u8 *shared_secret, 538 entry->shared_secret = shared_secret; 626 const u8 *shared_secret; local 645 shared_secret 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 512 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 913 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument [all...] |
H A D | radius_server.c | 86 char *shared_secret; member in struct:radius_client 599 (u8 *) client->shared_secret, 614 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 659 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, 955 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, 1068 os_free(prev->shared_secret); 1179 entry->shared_secret = os_strdup(pos); 1180 if (entry->shared_secret == NULL) { 1185 entry->shared_secret_len = os_strlen(entry->shared_secret);
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.h | 44 u8 *shared_secret; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 89 data->ikev2.shared_secret = os_malloc(password_len); 90 if (data->ikev2.shared_secret == NULL) 92 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | ikev2.c | 24 os_free(data->shared_secret); 585 &data->keys, 1, data->shared_secret, 1050 &data->keys, 0, data->shared_secret,
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.h | 43 u8 *shared_secret; member in struct:ikev2_initiator_data
|
H A D | ikev2.c | 28 os_free(data->shared_secret); 619 &data->keys, 0, data->shared_secret, 1069 &data->keys, 1, data->shared_secret, 1141 os_free(data->shared_secret); 1142 data->shared_secret = os_malloc(16); 1143 if (data->shared_secret == NULL) 1146 if (random_get_bytes(data->shared_secret, 16)) 1149 os_free(data->shared_secret); 1150 data->shared_secret = os_malloc(secret_len); 1151 if (data->shared_secret [all...] |
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 178 hapd->conf->radius->auth_server->shared_secret, 417 const u8 *shared_secret, 433 msg, &passphraselen, shared_secret, shared_secret_len, 468 * @shared_secret: RADIUS shared secret 469 * @shared_secret_len: Length of shared_secret in octets 476 const u8 *shared_secret, size_t shared_secret_len, 499 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, 416 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument 475 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
H A D | accounting.c | 392 * @shared_secret: RADIUS shared secret 393 * @shared_secret_len: Length of shared_secret in octets 399 const u8 *shared_secret, size_t shared_secret_len, 407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 531 os_free(e->radius_conf->auth_server->shared_secret); 700 const u8 *shared_secret, 705 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 709 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 748 const u8 *shared_secret, size_t shared_secret_len, 763 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 786 ieee802_1x_get_keys(e, msg, req, shared_secret, 840 as->shared_secret = (u8 *) os_strdup(secret); 698 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument 747 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 293 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | ikev2_common.c | 434 const u8 *shared_secret, size_t shared_secret_len, 446 shared_secret == NULL || nonce == NULL || prf == NULL) 476 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|