/hostap-latest/src/radius/ |
D | radius.h | 272 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 274 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 276 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 279 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 281 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 284 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 286 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 295 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 298 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 305 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 461 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 464 if (secret) { in radius_msg_finish() 471 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 486 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 499 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 510 addr[3] = secret; in radius_msg_finish_srv() 523 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 537 if (hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 544 addr[1] = secret; in radius_msg_finish_das_resp() 558 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/hostap-latest/tests/hwsim/ |
D | radius_das.py | 14 secret=None, authenticator=None, **attributes): argument 15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 29 + self.secret).digest() 34 secret=None, authenticator=None, **attributes): argument 35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 46 + self.secret).digest()
|
D | test_radius.py | 505 secret=b"secret", dict=dict) 510 req = radius_das.DisconnectPacket(dict=dict, secret=b"incorrect", 522 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 532 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 543 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 550 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 557 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 563 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 569 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 575 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", [all …]
|
D | hostapd.wpa_psk | 1 00:00:00:00:00:00 secret passphrase 2 02:00:00:00:00:00 very secret
|
/hostap-latest/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 64 S1 = secret; in tls_prf_sha1_md5() 65 S2 = secret + L_S1; in tls_prf_sha1_md5()
|
D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
D | sha384.h | 23 int tls_prf_sha384(const u8 *secret, size_t secret_len, 26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
D | crypto_wolfssl.c | 995 byte *secret; in dh5_init_fixed() local 1003 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 1004 if (!secret) in dh5_init_fixed() 1012 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed() 1018 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed() 1028 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 1039 struct wpabuf *secret; in dh5_derive_shared() local 1042 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared() 1043 if (!secret) in dh5_derive_shared() 1046 if (wc_DhAgree(ctx, wpabuf_mhead(secret), &secret_sz, in dh5_derive_shared() [all …]
|
D | crypto_internal-modexp.c | 46 u8 *secret, size_t *len) in crypto_dh_derive_secret() argument 82 prime, prime_len, secret, len); in crypto_dh_derive_secret()
|
/hostap-latest/wlantest/ |
D | wlantest.c | 58 dl_list_init(&wt->secret); in wlantest_init() 104 dl_list_for_each_safe(s, sn, &wt->secret, in wlantest_deinit() 140 static void add_secret(struct wlantest *wt, const char *secret) in add_secret() argument 143 size_t len = os_strlen(secret); in add_secret() 150 os_memcpy(s->secret, secret, len); in add_secret() 151 dl_list_add(&wt->secret, &s->list); in add_secret()
|
D | wired.c | 125 dl_list_for_each(s, &wt->secret, struct wlantest_radius_secret, list) { in process_radius_access_accept() 128 (u8 *) s->secret, in process_radius_access_accept() 129 os_strlen(s->secret)); in process_radius_access_accept()
|
/hostap-latest/hostapd/ |
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/hostap-latest/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 23 addr[1] = secret; in chap_md5()
|
D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/hostap-latest/src/pasn/ |
D | pasn_responder.c | 305 struct wpabuf *secret) in pasn_derive_keys() argument 350 wpabuf_head(secret), wpabuf_len(secret), in pasn_derive_keys() 608 struct wpabuf *wrapped_data = NULL, *secret = NULL; in handle_auth_pasn_1() local 748 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in handle_auth_pasn_1() 751 if (!secret) { in handle_auth_pasn_1() 821 pasn->secret = secret; in handle_auth_pasn_1() 879 &pasn_params, wrapped_data, secret); in handle_auth_pasn_1() 904 wpabuf_free(secret); in handle_auth_pasn_1()
|
D | pasn_initiator.c | 1067 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpa_pasn_auth_rx() local 1206 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in wpa_pasn_auth_rx() 1210 if (!secret) { in wpa_pasn_auth_rx() 1234 wpabuf_head(secret), wpabuf_len(secret), in wpa_pasn_auth_rx() 1253 wpabuf_free(secret); in wpa_pasn_auth_rx() 1254 secret = NULL; in wpa_pasn_auth_rx() 1349 wpabuf_free(secret); in wpa_pasn_auth_rx()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 26 <arg>-s<replaceable>shared secret</replaceable></arg> 115 <term>-s AS secret</term> 117 <listitem><para>Shared secret with the authentication server.
|
/hostap-latest/src/tls/ |
D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
/hostap-latest/src/common/ |
D | dpp_i.h | 92 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, 98 u8 *secret, size_t *secret_len);
|