HomeSort by relevance Sort by last modified time
    Searched refs:password_len (Results 1 - 25 of 76) sorted by null

1 2 3 4

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_otp.c 40 size_t password_len, len; local
51 password = eap_get_config_otp(sm, &password_len);
55 password = eap_get_config_password(sm, &password_len);
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
mschapv2.c 43 const u8 *password, size_t password_len,
71 password, password_len);
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
98 nt_password_hash(password, password_len, password_hash);
mschapv2.h 25 const u8 *password, size_t password_len,
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
83 password = eap_get_config_otp(sm, &password_len);
87 password = eap_get_config_password(sm, &password_len);
104 plen = password_len;
119 wpabuf_put_data(resp, password, password_len);
eap_md5.c 42 size_t len, challenge_len, password_len; local
44 password = eap_get_config_password(sm, &password_len);
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
eap_leap.c 72 size_t identity_len, password_len, len; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
126 nt_challenge_response(challenge, password, password_len, rpos);
196 size_t password_len, len; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
238 nt_password_hash(password, password_len, pw_hash);
274 size_t password_len; local
277 password = eap_get_config_password(sm, &password_len);
334 size_t elen[5], password_len; local
340 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_config.h 71 * password_len - Length of password field
73 size_t password_len; member in struct:eap_peer_config
eap_mschapv2.c 161 size_t identity_len, password_len; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
213 password_len, pwhash, auth_challenge,
309 config->password_len = 16;
318 config->password_len = config->new_password_len;
503 size_t username_len, password_len, new_password_len; local
510 password = eap_get_config_password2(sm, &password_len, &pwhash);
543 password, password_len, cp->encr_password))
558 password, password_len, cp->encr_hash);
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
mschapv2.c 37 const u8 *password, size_t password_len,
65 password, password_len);
74 password, password_len);
77 password, password_len, nt_response);
78 generate_authenticator_response(password, password_len,
93 if (nt_password_hash(password, password_len, password_hash) ||
mschapv2.h 19 const u8 *password, size_t password_len,
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
eap_md5.c 36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
eap_leap.c 67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_config.h 65 * password_len - Length of password field
67 size_t password_len; member in struct:eap_peer_config
eap_ttls.c 407 size_t identity_len, password_len; local
413 password = eap_get_config_password2(sm, &password_len, &pwhash);
456 password_len, pwhash, challenge,
495 size_t identity_len, password_len; local
501 password = eap_get_config_password2(sm, &password_len, &pwhash);
545 nt_challenge_response(challenge, password, password_len,
548 password, password_len);
578 size_t identity_len, password_len; local
583 password = eap_get_config_password(sm, &password_len);
587 msg = wpabuf_alloc(identity_len + password_len + 100)
631 size_t identity_len, password_len; local
    [all...]
eap_mschapv2.c 156 size_t identity_len, password_len; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
208 password_len, pwhash, auth_challenge,
309 config->password_len = 16;
318 config->password_len = config->new_password_len;
503 size_t username_len, password_len, new_password_len; local
510 password = eap_get_config_password2(sm, &password_len, &pwhash);
543 password, password_len, cp->encr_password))
558 password, password_len, cp->encr_hash);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
ms_funcs.c 55 * @password_len: Length of password
58 void nt_password_hash(const u8 *password, size_t password_len,
64 if (password_len > 256)
65 password_len = 256;
68 for (i = 0; i < password_len; i++) {
73 len = password_len * 2;
117 * @password_len: Length of password
122 const u8 *password, size_t password_len,
130 nt_password_hash(password, password_len, password_hash);
215 * @password_len: Length of passwor
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
ms_funcs.c 105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len,
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
178 if (nt_password_hash(password, password_len, password_hash))
272 * @password_len: Length of password
282 int generate_authenticator_response(const u8 *password, size_t password_len,
289 if (nt_password_hash(password, password_len, password_hash))
301 * @password_len: Length of passwor
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
pkcs_5_1.c 21 @param password_len The length of the password (octet)
29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
  /external/wpa_supplicant_8/src/ap/
authsrv.c 73 user->password = os_malloc(eap_user->password_len);
77 eap_user->password_len);
78 user->password_len = eap_user->password_len;

Completed in 405 milliseconds

1 2 3 4