Searched refs:shared_secret (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/
H A Dkexdhc.c50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
123 if ((shared_secret = BN_new()) == NULL)
125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
139 shared_secret,
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
159 BN_clear_free(shared_secret);
H A Dkexecdhc.c55 BIGNUM *shared_secret; local
118 if ((shared_secret = BN_new()) == NULL)
120 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
136 shared_secret,
155 kex_derive_keys(kex, hash, hashlen, shared_secret);
156 BN_clear_free(shared_secret);
H A Dkexdhs.c53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
113 if ((shared_secret = BN_new()) == NULL)
115 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
131 shared_secret,
161 kex_derive_keys(kex, hash, hashlen, shared_secret);
162 BN_clear_free(shared_secret);
H A Dkexecdhs.c57 BIGNUM *shared_secret; local
97 /* Calculate shared_secret */
107 if ((shared_secret = BN_new()) == NULL)
109 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
126 shared_secret,
156 kex_derive_keys(kex, hash, hashlen, shared_secret);
157 BN_clear_free(shared_secret);
H A Dkexgexc.c52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
161 if ((shared_secret = BN_new()) == NULL)
163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
183 shared_secret,
203 kex_derive_keys(kex, hash, hashlen, shared_secret);
204 BN_clear_free(shared_secret);
H A Dkexgexs.c56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
149 if ((shared_secret = BN_new()) == NULL)
151 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
173 shared_secret,
204 kex_derive_keys(kex, hash, hashlen, shared_secret);
205 BN_clear_free(shared_secret);
H A Dkexdh.c49 BIGNUM *shared_secret,
72 buffer_put_bignum2(&b, shared_secret);
41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexecdh.c59 const BIGNUM *shared_secret,
81 buffer_put_bignum2(&b, shared_secret);
49 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexgex.c51 BIGNUM *shared_secret,
82 buffer_put_bignum2(&b, shared_secret);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkex.c551 BIGNUM *shared_secret)
565 buffer_put_bignum2(&b, shared_secret);
601 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
608 shared_secret);
550 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
/freebsd-10.0-release/contrib/wpa/src/radius/
H A Dradius_das.h32 const u8 *shared_secret; member in struct:radius_das_conf
H A Dradius_client.h39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,
H A Dradius_das.c24 u8 *shared_secret; member in struct:radius_das_data
191 if (radius_msg_verify_das_req(msg, das->shared_secret,
254 if (radius_msg_finish_das_resp(reply, das->shared_secret,
309 if (conf->port == 0 || conf->shared_secret == NULL ||
325 das->shared_secret = os_malloc(conf->shared_secret_len);
326 if (das->shared_secret == NULL) {
330 os_memcpy(das->shared_secret, conf->shared_secret,
362 os_free(das->shared_secret);
H A Dradius_client.c67 const u8 *shared_secret,
128 * shared_secret - Shared secret with the target RADIUS server
130 const u8 *shared_secret; member in struct:radius_msg_list
133 * shared_secret_len - shared_secret length in octets
268 const u8 *shared_secret,
515 const u8 *shared_secret,
538 entry->shared_secret = shared_secret;
626 const u8 *shared_secret; local
645 shared_secret
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
512 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument
913 radius_client_update_acct_msgs(struct radius_client_data *radius, const u8 *shared_secret, size_t shared_secret_len) argument
[all...]
H A Dradius_server.c86 char *shared_secret; member in struct:radius_client
599 (u8 *) client->shared_secret,
614 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
659 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
955 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
1068 os_free(prev->shared_secret);
1179 entry->shared_secret = os_strdup(pos);
1180 if (entry->shared_secret == NULL) {
1185 entry->shared_secret_len = os_strlen(entry->shared_secret);
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Dikev2.h44 u8 *shared_secret; member in struct:ikev2_responder_data
H A Deap_ikev2.c89 data->ikev2.shared_secret = os_malloc(password_len);
90 if (data->ikev2.shared_secret == NULL)
92 os_memcpy(data->ikev2.shared_secret, password, password_len);
H A Dikev2.c24 os_free(data->shared_secret);
585 &data->keys, 1, data->shared_secret,
1050 &data->keys, 0, data->shared_secret,
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Dikev2.h43 u8 *shared_secret; member in struct:ikev2_initiator_data
H A Dikev2.c28 os_free(data->shared_secret);
619 &data->keys, 0, data->shared_secret,
1069 &data->keys, 1, data->shared_secret,
1141 os_free(data->shared_secret);
1142 data->shared_secret = os_malloc(16);
1143 if (data->shared_secret == NULL)
1146 if (random_get_bytes(data->shared_secret, 16))
1149 os_free(data->shared_secret);
1150 data->shared_secret = os_malloc(secret_len);
1151 if (data->shared_secret
[all...]
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dieee802_11_auth.c178 hapd->conf->radius->auth_server->shared_secret,
417 const u8 *shared_secret,
433 msg, &passphraselen, shared_secret, shared_secret_len,
468 * @shared_secret: RADIUS shared secret
469 * @shared_secret_len: Length of shared_secret in octets
476 const u8 *shared_secret, size_t shared_secret_len,
499 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
544 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len,
416 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
475 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
H A Daccounting.c392 * @shared_secret: RADIUS shared secret
393 * @shared_secret_len: Length of shared_secret in octets
399 const u8 *shared_secret, size_t shared_secret_len,
407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Deapol_test.c531 os_free(e->radius_conf->auth_server->shared_secret);
700 const u8 *shared_secret,
705 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
709 keys = radius_msg_get_cisco_keys(msg, req, shared_secret,
748 const u8 *shared_secret, size_t shared_secret_len,
763 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len,
786 ieee802_1x_get_keys(e, msg, req, shared_secret,
840 as->shared_secret = (u8 *) os_strdup(secret);
698 ieee802_1x_get_keys(struct eapol_test_data *e, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
747 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data) argument
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Dikev2_common.h293 const u8 *shared_secret, size_t shared_secret_len,
H A Dikev2_common.c434 const u8 *shared_secret, size_t shared_secret_len,
446 shared_secret == NULL || nonce == NULL || prf == NULL)
476 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument

Completed in 188 milliseconds

12