HomeSort by relevance Sort by last modified time
    Searched defs:password_len (Results 1 - 20 of 20) sorted by null

  /external/wpa_supplicant/
eap_otp.c 44 size_t password_len, len; local
57 password = eap_get_config_otp(sm, &password_len);
61 password = eap_get_config_password(sm, &password_len);
79 password_len, EAP_CODE_RESPONSE, req->identifier,
83 os_memcpy(rpos, password, password_len);
85 password, password_len);
eap_gtc.c 59 size_t password_len, identity_len, len, plen; local
86 password = eap_get_config_otp(sm, &password_len);
90 password = eap_get_config_password(sm, &password_len);
107 plen = password_len;
124 os_memcpy(rpos, password, password_len);
eap_md5.c 45 size_t len, challenge_len, password_len; local
49 password = eap_get_config_password(sm, &password_len);
104 elen[1] = password_len;
eap_leap.c 74 size_t identity_len, password_len; local
79 password = eap_get_config_password(sm, &password_len);
126 nt_challenge_response(challenge, password, password_len, rpos);
201 size_t password_len; local
205 password = eap_get_config_password(sm, &password_len);
242 nt_password_hash(password, password_len, pw_hash);
278 size_t len, password_len; local
281 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
340 password = eap_get_config_password(sm, &password_len);
    [all...]
eap_mschapv2.c 183 const u8 *password, size_t password_len,
196 password, password_len);
199 password, password_len, nt_response);
204 generate_authenticator_response(password, password_len,
212 nt_password_hash(password, password_len, password_hash);
230 size_t username_len, identity_len, password_len; local
236 password = eap_get_config_password(sm, &password_len);
284 password, password_len,
380 config->password_len = config->new_password_len;
573 size_t username_len, password_len, new_password_len local
    [all...]
config_ssid.h 258 * password_len - Length of password field
260 size_t password_len; member in struct:wpa_ssid
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 42 size_t len, challenge_len, password_len; local
44 password = eap_get_config_password(sm, &password_len);
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
eap_otp.c 40 size_t password_len, len; local
51 password = eap_get_config_otp(sm, &password_len);
55 password = eap_get_config_password(sm, &password_len);
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
83 password = eap_get_config_otp(sm, &password_len);
87 password = eap_get_config_password(sm, &password_len);
104 plen = password_len;
119 wpabuf_put_data(resp, password, password_len);
eap_config.h 71 * password_len - Length of password field
73 size_t password_len; member in struct:eap_peer_config
eap_ikev2.c 68 size_t identity_len, password_len; local
93 password = eap_get_config_password(sm, &password_len);
95 data->ikev2.shared_secret = os_malloc(password_len);
98 os_memcpy(data->ikev2.shared_secret, password, password_len);
99 data->ikev2.shared_secret_len = password_len;
eap_leap.c 72 size_t identity_len, password_len, len; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
126 nt_challenge_response(challenge, password, password_len, rpos);
196 size_t password_len, len; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
238 nt_password_hash(password, password_len, pw_hash);
274 size_t password_len; local
277 password = eap_get_config_password(sm, &password_len);
334 size_t elen[5], password_len; local
340 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_pax.c 58 size_t identity_len, password_len; local
61 password = eap_get_config_password(sm, &password_len);
68 if (password_len != EAP_PAX_AK_LEN) {
eap_psk.c 41 size_t identity_len, password_len; local
43 password = eap_get_config_password(sm, &password_len);
44 if (!password || password_len != 16) {
eap_sake.c 77 size_t identity_len, password_len; local
79 password = eap_get_config_password(sm, &password_len);
80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
eap_gpsk.c 87 size_t identity_len, password_len; local
89 password = eap_get_config_password(sm, &password_len);
111 data->psk = os_malloc(password_len);
116 os_memcpy(data->psk, password, password_len);
117 data->psk_len = password_len;
eap_mschapv2.c 161 size_t identity_len, password_len; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
213 password_len, pwhash, auth_challenge,
309 config->password_len = 16;
318 config->password_len = config->new_password_len;
503 size_t username_len, password_len, new_password_len; local
510 password = eap_get_config_password2(sm, &password_len, &pwhash);
543 password, password_len, cp->encr_password))
558 password, password_len, cp->encr_hash);
eap_ttls.c 646 size_t identity_len, password_len; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
695 password_len, pwhash, challenge,
731 size_t identity_len, password_len; local
737 password = eap_get_config_password2(sm, &password_len, &pwhash);
781 nt_challenge_response(challenge, password, password_len,
784 password, password_len);
821 size_t identity_len, password_len; local
826 password = eap_get_config_password(sm, &password_len);
830 msg = wpabuf_alloc(identity_len + password_len + 100)
881 size_t identity_len, password_len; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.h 38 size_t password_len; member in struct:eap_user
eap_ttls.c 250 size_t password_len = dlen; local
251 while (password_len > 0 &&
252 password[password_len - 1] == '\0') {
253 password_len--;
257 password, password_len);
259 parse->user_password_len = password_len;
660 if (sm->user->password_len != user_password_len ||
679 size_t password_len)
685 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
689 (unsigned long) password_len);
    [all...]

Completed in 720 milliseconds