Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 64) sorted by relevance

123

/hostap-latest/src/radius/
Dradius.h272 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
274 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
276 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
279 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
281 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
284 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
286 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
295 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
298 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
305 const u8 *secret, size_t secret_len);
[all …]
Dradius.c461 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
464 if (secret) { in radius_msg_finish()
471 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
486 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
499 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
510 addr[3] = secret; in radius_msg_finish_srv()
523 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
537 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
544 addr[1] = secret; in radius_msg_finish_das_resp()
558 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/hostap-latest/tests/hwsim/
Dradius_das.py14 secret=None, authenticator=None, **attributes): argument
15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
29 + self.secret).digest()
34 secret=None, authenticator=None, **attributes): argument
35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
46 + self.secret).digest()
Dtest_radius.py505 secret=b"secret", dict=dict)
510 req = radius_das.DisconnectPacket(dict=dict, secret=b"incorrect",
522 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
532 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
543 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
550 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
557 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
563 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
569 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
575 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
[all …]
Dhostapd.wpa_psk1 00:00:00:00:00:00 secret passphrase
2 02:00:00:00:00:00 very secret
/hostap-latest/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
Dsha256-kdf.c32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha384-kdf.c32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
Dsha512-kdf.c32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
64 S1 = secret; in tls_prf_sha1_md5()
65 S2 = secret + L_S1; in tls_prf_sha1_md5()
Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
Dsha384.h23 int tls_prf_sha384(const u8 *secret, size_t secret_len,
26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
Dcrypto_wolfssl.c995 byte *secret; in dh5_init_fixed() local
1003 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
1004 if (!secret) in dh5_init_fixed()
1012 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed()
1018 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed()
1028 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
1039 struct wpabuf *secret; in dh5_derive_shared() local
1042 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared()
1043 if (!secret) in dh5_derive_shared()
1046 if (wc_DhAgree(ctx, wpabuf_mhead(secret), &secret_sz, in dh5_derive_shared()
[all …]
Dcrypto_internal-modexp.c46 u8 *secret, size_t *len) in crypto_dh_derive_secret() argument
82 prime, prime_len, secret, len); in crypto_dh_derive_secret()
/hostap-latest/wlantest/
Dwlantest.c58 dl_list_init(&wt->secret); in wlantest_init()
104 dl_list_for_each_safe(s, sn, &wt->secret, in wlantest_deinit()
140 static void add_secret(struct wlantest *wt, const char *secret) in add_secret() argument
143 size_t len = os_strlen(secret); in add_secret()
150 os_memcpy(s->secret, secret, len); in add_secret()
151 dl_list_add(&wt->secret, &s->list); in add_secret()
Dwired.c125 dl_list_for_each(s, &wt->secret, struct wlantest_radius_secret, list) { in process_radius_access_accept()
128 (u8 *) s->secret, in process_radius_access_accept()
129 os_strlen(s->secret)); in process_radius_access_accept()
/hostap-latest/hostapd/
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/hostap-latest/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
23 addr[1] = secret; in chap_md5()
Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/hostap-latest/src/pasn/
Dpasn_responder.c305 struct wpabuf *secret) in pasn_derive_keys() argument
350 wpabuf_head(secret), wpabuf_len(secret), in pasn_derive_keys()
608 struct wpabuf *wrapped_data = NULL, *secret = NULL; in handle_auth_pasn_1() local
748 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in handle_auth_pasn_1()
751 if (!secret) { in handle_auth_pasn_1()
821 pasn->secret = secret; in handle_auth_pasn_1()
879 &pasn_params, wrapped_data, secret); in handle_auth_pasn_1()
904 wpabuf_free(secret); in handle_auth_pasn_1()
Dpasn_initiator.c1067 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpa_pasn_auth_rx() local
1206 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in wpa_pasn_auth_rx()
1210 if (!secret) { in wpa_pasn_auth_rx()
1234 wpabuf_head(secret), wpabuf_len(secret), in wpa_pasn_auth_rx()
1253 wpabuf_free(secret); in wpa_pasn_auth_rx()
1254 secret = NULL; in wpa_pasn_auth_rx()
1349 wpabuf_free(secret); in wpa_pasn_auth_rx()
/hostap-latest/wpa_supplicant/doc/docbook/
Deapol_test.sgml26 <arg>-s<replaceable>shared secret</replaceable></arg>
115 <term>-s AS secret</term>
117 <listitem><para>Shared secret with the authentication server.
/hostap-latest/src/tls/
Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
/hostap-latest/src/common/
Ddpp_i.h92 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len,
98 u8 *secret, size_t *secret_len);

123