| /hostap-latest/radius_example/ |
| D | radius_example.c | 34 const u8 *shared_secret, in receive_auth() argument 75 ctx->conf.auth_server->shared_secret, in start_example() 122 srv->shared_secret = (u8 *) os_strdup("radius"); in main() 146 os_free(srv->shared_secret); in main()
|
| /hostap-latest/src/radius/ |
| D | radius_client.c | 70 const u8 *shared_secret, 138 const u8 *shared_secret; member 294 const u8 *shared_secret, in radius_client_register() argument 485 radius_msg_finish_acct(entry->msg, entry->shared_secret, in radius_client_retransmit() 722 const u8 *shared_secret, in radius_client_list_add() argument 745 entry->shared_secret = shared_secret; in radius_client_list_add() 851 const u8 *shared_secret; in radius_client_send() local 872 conf->acct_server->shared_secret == NULL) { in radius_client_send() 879 shared_secret = conf->acct_server->shared_secret; in radius_client_send() 881 radius_msg_finish_acct(msg, shared_secret, shared_secret_len); in radius_client_send() [all …]
|
| D | radius_das.c | 21 u8 *shared_secret; member 442 if (radius_msg_verify_das_req(msg, das->shared_secret, in radius_das_receive() 496 if (radius_msg_finish_das_resp(reply, das->shared_secret, in radius_das_receive() 551 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 570 das->shared_secret = os_memdup(conf->shared_secret, in radius_das_init() 572 if (das->shared_secret == NULL) { in radius_das_init() 606 os_free(das->shared_secret); in radius_das_deinit()
|
| D | radius_client.h | 46 u8 *shared_secret; member 271 const u8 *shared_secret, size_t shared_secret_len,
|
| D | radius_server.c | 109 char *shared_secret; member 978 (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1147 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_encapsulate_eap() 1193 (u8 *) client->shared_secret, in radius_server_macacl() 1236 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_macacl() 1286 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret, in radius_server_reject() 1580 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_disconnect_resp() 1624 if (radius_msg_verify(msg, (const u8 *) client->shared_secret, in radius_server_receive_coa_resp() 1779 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret, in radius_server_receive_auth() 1891 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret, in radius_server_receive_acct() [all …]
|
| D | radius_das.h | 46 const u8 *shared_secret; member
|
| /hostap-latest/src/eap_server/ |
| D | ikev2.c | 28 os_free(data->shared_secret); in ikev2_initiator_deinit() 618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1140 os_free(data->shared_secret); in ikev2_build_sa_auth() 1141 data->shared_secret = os_malloc(16); in ikev2_build_sa_auth() 1142 if (data->shared_secret == NULL) in ikev2_build_sa_auth() 1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth() 1148 os_free(data->shared_secret); in ikev2_build_sa_auth() 1149 data->shared_secret = os_memdup(secret, secret_len); in ikev2_build_sa_auth() 1150 if (data->shared_secret == NULL) in ikev2_build_sa_auth()
|
| D | ikev2.h | 43 u8 *shared_secret; member
|
| /hostap-latest/src/ap/ |
| D | ieee802_11_auth.c | 143 hapd->conf->radius->auth_server->shared_secret, in hostapd_radius_acl_query() 410 const u8 *shared_secret, in decode_tunnel_passwords() argument 426 msg, &passphraselen, shared_secret, shared_secret_len, in decode_tunnel_passwords() 487 const u8 *shared_secret, size_t shared_secret_len, in hostapd_acl_recv_radius() argument 512 msg, shared_secret, shared_secret_len, req, in hostapd_acl_recv_radius() 563 decode_tunnel_passwords(hapd, shared_secret, shared_secret_len, in hostapd_acl_recv_radius()
|
| D | accounting.c | 413 const u8 *shared_secret, size_t shared_secret_len, in accounting_receive() argument 421 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { in accounting_receive()
|
| D | ieee802_1x.c | 1579 const u8 *shared_secret, in ieee802_1x_get_keys() argument 1590 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 2025 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument 2045 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 1)) { in ieee802_1x_receive_auth() 2121 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, in ieee802_1x_receive_auth()
|
| D | ap_config.c | 568 os_free(servers[i].shared_secret); in hostapd_config_free_radius()
|
| D | hostapd.c | 1341 das_conf.shared_secret = conf->radius_das_shared_secret; in hostapd_bss_radius_init()
|
| /hostap-latest/src/eap_common/ |
| D | eap_eke_common.c | 413 NULL, 0, sess->shared_secret) < 0) in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() 508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ka() 553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_msk() 724 os_memset(sess->shared_secret, 0, EAP_EKE_MAX_HASH_LEN); in eap_eke_session_clean()
|
| D | ikev2_common.c | 372 const u8 *shared_secret, size_t shared_secret_len, in ikev2_derive_auth_data() argument 384 shared_secret == NULL || nonce == NULL || prf == NULL) in ikev2_derive_auth_data() 414 if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1, in ikev2_derive_auth_data()
|
| D | eap_eke_common.h | 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; member
|
| D | ikev2_common.h | 289 const u8 *shared_secret, size_t shared_secret_len,
|
| /hostap-latest/wpa_supplicant/ |
| D | eapol_test.c | 675 os_free(e->radius_conf->auth_server->shared_secret); in test_eapol_clean() 861 const u8 *shared_secret, in ieee802_1x_get_keys() argument 868 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 872 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 919 const u8 *shared_secret, size_t shared_secret_len, in ieee802_1x_receive_auth() argument 933 } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, in ieee802_1x_receive_auth() 956 ieee802_1x_get_keys(e, msg, req, shared_secret, in ieee802_1x_receive_auth() 1059 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
|
| /hostap-latest/src/eap_peer/ |
| D | ikev2.h | 44 u8 *shared_secret; member
|
| D | eap_ikev2.c | 93 data->ikev2.shared_secret = os_memdup(password, password_len); in eap_ikev2_init() 94 if (data->ikev2.shared_secret == NULL) in eap_ikev2_init()
|
| D | ikev2.c | 24 os_free(data->shared_secret); in ikev2_responder_deinit() 552 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret() 1004 &data->keys, 0, data->shared_secret, in ikev2_build_auth()
|
| /hostap-latest/src/crypto/ |
| D | crypto_openssl.c | 4962 u8 *shared_secret) in hpke_extract_and_expand() argument 4982 shared_secret, ctx->n_secret) < 0) in hpke_extract_and_expand() 4990 static int hpke_key_schedule(struct hpke_context *ctx, const u8 *shared_secret, in hpke_key_schedule() argument 5012 if (hpke_labeled_extract(ctx, false, shared_secret, ctx->n_secret, in hpke_key_schedule() 5037 u8 *shared_secret, u8 *enc) in hpke_encap() argument 5086 wpabuf_len(pk_rm), shared_secret); in hpke_encap() 5163 u8 shared_secret[HPKE_MAX_SHARED_SECRET_LEN]; in hpke_base_seal_int() local 5172 if (hpke_encap(ctx, peer_pub, shared_secret, enc) < 0) in hpke_base_seal_int() 5177 if (hpke_key_schedule(ctx, shared_secret, info, info_len) < 0) in hpke_base_seal_int() 5193 forced_memzero(shared_secret, sizeof(shared_secret)); in hpke_base_seal_int() [all …]
|
| /hostap-latest/hostapd/ |
| D | config_file.c | 2915 os_free(bss->radius->auth_server->shared_secret); in hostapd_config_fill() 2916 bss->radius->auth_server->shared_secret = (u8 *) os_strdup(pos); in hostapd_config_fill() 2980 os_free(bss->radius->acct_server->shared_secret); in hostapd_config_fill() 2981 bss->radius->acct_server->shared_secret = (u8 *) os_strdup(pos); in hostapd_config_fill()
|
| D | README | 180 auth_server_{addr,port,shared_secret} options. In addition,
|
| /hostap-latest/tests/hwsim/ |
| D | test_ap_wps.py | 6627 shared_secret = pow(peer_public, own_private, group_5_prime) 6628 ss = zeropad_str(format(shared_secret, "02x"), 192)
|