/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 98 nt_password_hash(password, password_len, password_hash);
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_leap.c | 72 size_t identity_len, password_len, len; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 126 nt_challenge_response(challenge, password, password_len, rpos); 196 size_t password_len, len; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 238 nt_password_hash(password, password_len, pw_hash); 274 size_t password_len; local 277 password = eap_get_config_password(sm, &password_len); 334 size_t elen[5], password_len; local 340 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_config.h | 71 * password_len - Length of password field 73 size_t password_len; member in struct:eap_peer_config
|
eap_mschapv2.c | 161 size_t identity_len, password_len; local 168 password = eap_get_config_password2(sm, &password_len, &pwhash); 213 password_len, pwhash, auth_challenge, 309 config->password_len = 16; 318 config->password_len = config->new_password_len; 503 size_t username_len, password_len, new_password_len; local 510 password = eap_get_config_password2(sm, &password_len, &pwhash); 543 password, password_len, cp->encr_password)) 558 password, password_len, cp->encr_hash);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 74 password, password_len); 77 password, password_len, nt_response); 78 generate_authenticator_response(password, password_len, 93 if (nt_password_hash(password, password_len, password_hash) ||
|
mschapv2.h | 19 const u8 *password, size_t password_len,
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_config.h | 65 * password_len - Length of password field 67 size_t password_len; member in struct:eap_peer_config
|
eap_ttls.c | 407 size_t identity_len, password_len; local 413 password = eap_get_config_password2(sm, &password_len, &pwhash); 456 password_len, pwhash, challenge, 495 size_t identity_len, password_len; local 501 password = eap_get_config_password2(sm, &password_len, &pwhash); 545 nt_challenge_response(challenge, password, password_len, 548 password, password_len); 578 size_t identity_len, password_len; local 583 password = eap_get_config_password(sm, &password_len); 587 msg = wpabuf_alloc(identity_len + password_len + 100) 631 size_t identity_len, password_len; local [all...] |
eap_mschapv2.c | 156 size_t identity_len, password_len; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 208 password_len, pwhash, auth_challenge, 309 config->password_len = 16; 318 config->password_len = config->new_password_len; 503 size_t username_len, password_len, new_password_len; local 510 password = eap_get_config_password2(sm, &password_len, &pwhash); 543 password, password_len, cp->encr_password)) 558 password, password_len, cp->encr_hash);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
ms_funcs.c | 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 64 if (password_len > 256) 65 password_len = 256; 68 for (i = 0; i < password_len; i++) { 73 len = password_len * 2; 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 215 * @password_len: Length of passwor [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
ms_funcs.c | 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 178 if (nt_password_hash(password, password_len, password_hash)) 272 * @password_len: Length of password 282 int generate_authenticator_response(const u8 *password, size_t password_len, 289 if (nt_password_hash(password, password_len, password_hash)) 301 * @password_len: Length of passwor [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
pkcs_5_1.c | 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 73 user->password = os_malloc(eap_user->password_len); 77 eap_user->password_len); 78 user->password_len = eap_user->password_len;
|