/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 98 nt_password_hash(password, password_len, password_hash);
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_leap.c | 72 size_t identity_len, password_len, len; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 126 nt_challenge_response(challenge, password, password_len, rpos); 196 size_t password_len, len; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 238 nt_password_hash(password, password_len, pw_hash); 274 size_t password_len; local 277 password = eap_get_config_password(sm, &password_len); 334 size_t elen[5], password_len; local 340 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) ||
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_leap.c | 73 size_t identity_len, password_len, len; local 79 password = eap_get_config_password2(sm, &password_len, &pwhash); 127 nt_challenge_response(challenge, password, password_len, rpos); 197 size_t password_len, len; local 202 password = eap_get_config_password2(sm, &password_len, &pwhash); 242 if (nt_password_hash(password, password_len, pw_hash) || 281 size_t password_len; local 284 password = eap_get_config_password(sm, &password_len); 341 size_t elen[5], password_len; local 347 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
/external/wpa_supplicant/ |
eap_otp.c | 44 size_t password_len, len; local 57 password = eap_get_config_otp(sm, &password_len); 61 password = eap_get_config_password(sm, &password_len); 79 password_len, EAP_CODE_RESPONSE, req->identifier, 83 os_memcpy(rpos, password, password_len); 85 password, password_len);
|
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len,
|
eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 86 password = eap_get_config_otp(sm, &password_len); 90 password = eap_get_config_password(sm, &password_len); 107 plen = password_len; 124 os_memcpy(rpos, password, password_len);
|
ms_funcs.c | 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 64 if (password_len > 256) 68 for (i = 0; i < password_len; i++) { 73 len = password_len * 2; 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 215 * @password_len: Length of password 224 void generate_authenticator_response(const u8 *password, size_t password_len, [all...] |
eap_leap.c | 74 size_t identity_len, password_len; local 79 password = eap_get_config_password(sm, &password_len); 126 nt_challenge_response(challenge, password, password_len, rpos); 201 size_t password_len; local 205 password = eap_get_config_password(sm, &password_len); 242 nt_password_hash(password, password_len, pw_hash); 278 size_t len, password_len; local 281 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 340 password = eap_get_config_password(sm, &password_len); [all...] |
eap_md5.c | 45 size_t len, challenge_len, password_len; local 49 password = eap_get_config_password(sm, &password_len); 104 elen[1] = password_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
ms_funcs.c | 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 64 if (password_len > 256) 65 password_len = 256; 68 for (i = 0; i < password_len; i++) { 73 len = password_len * 2; 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 215 * @password_len: Length of passwor [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 int generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 int nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
ms_funcs.c | 57 * @password_len: Length of password 61 int nt_password_hash(const u8 *password, size_t password_len, 67 if (password_len > 256) 68 password_len = 256; 71 for (i = 0; i < password_len; i++) { 76 len = password_len * 2; 121 * @password_len: Length of password 127 const u8 *password, size_t password_len, 135 if (nt_password_hash(password, password_len, password_hash)) 229 * @password_len: Length of passwor [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
pkcs_5_1.c | 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|