/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) ||
|
mschapv2.h | 19 const u8 *password, size_t password_len,
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_config.h | 68 * password_len - Length of password field 70 size_t password_len; member in struct:eap_peer_config
|
eap_ttls.c | 422 size_t identity_len, password_len; local 428 password = eap_get_config_password2(sm, &password_len, &pwhash); 477 password_len, pwhash, challenge, 521 size_t identity_len, password_len; local 527 password = eap_get_config_password2(sm, &password_len, &pwhash); 571 nt_challenge_response(challenge, password, password_len, 574 password, password_len); 604 size_t identity_len, password_len; local 609 password = eap_get_config_password(sm, &password_len); 613 msg = wpabuf_alloc(identity_len + password_len + 100) 657 size_t identity_len, password_len; local [all...] |
eap_mschapv2.c | 156 size_t identity_len, password_len; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 208 password_len, pwhash, auth_challenge, 311 config->password_len = 16; 320 config->password_len = config->new_password_len; 505 size_t username_len, password_len, new_password_len; local 512 password = eap_get_config_password2(sm, &password_len, &pwhash); 545 password, password_len, cp->encr_password)) 560 password, password_len, cp->encr_hash);
|
eap_ikev2.c | 62 size_t identity_len, password_len; local 87 password = eap_get_config_password(sm, &password_len); 89 data->ikev2.shared_secret = os_malloc(password_len); 92 os_memcpy(data->ikev2.shared_secret, password, password_len); 93 data->ikev2.shared_secret_len = password_len;
|
eap_pwd.c | 26 size_t password_len; member in struct:eap_pwd_data 83 size_t identity_len, password_len; local 85 password = eap_get_config_password(sm, &password_len); 118 if ((data->password = os_malloc(password_len)) == NULL) { 125 os_memcpy(data->password, password, password_len); 126 data->password_len = password_len; 235 data->password, data->password_len,
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
ms_funcs.c | 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 179 if (nt_password_hash(password, password_len, password_hash)) 274 * @password_len: Length of password 284 int generate_authenticator_response(const u8 *password, size_t password_len, 291 if (nt_password_hash(password, password_len, password_hash)) 303 * @password_len: Length of passwor [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
pkcs_5_1.c | 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 87 user->password_len = os_strlen(argv[i]); 118 (user->password == NULL || len > user->password_len)) { 120 user->password_len = os_strlen(argv[id]); 197 user->identity_len = user->password_len; 199 user->password_len = 0; 235 wsc_registrar.password_len = conf->ap_pin ?
|
authsrv.c | 73 user->password = os_malloc(eap_user->password_len); 77 eap_user->password_len); 78 user->password_len = eap_user->password_len;
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 54 const u8 *password, size_t password_len,
|
sae.c | 290 size_t password_len) 309 password, password_len); 319 len[0] = password_len; 366 size_t password_len) 381 password, password_len); 391 len[0] = password_len; 503 const u8 *password, size_t password_len, 507 password_len) < 0) 510 password_len) < 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 232 size_t password_len = dlen; local 233 while (password_len > 0 && 234 password[password_len - 1] == '\0') { 235 password_len--; 239 password, password_len); 241 parse->user_password_len = password_len; 511 if (sm->user->password_len != user_password_len || 529 size_t password_len) 535 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 539 (unsigned long) password_len); [all...] |
eap.h | 30 size_t password_len; member in struct:eap_user
|
eap_server_md5.c | 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 86 const u8 *password, size_t password_len,
|
eap_pwd_common.c | 89 u8 *password, int password_len, 183 eap_pwd_h_update(hash, password, password_len);
|