HomeSort by relevance Sort by last modified time
    Searched refs:password_len (Results 1 - 25 of 51) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
mschapv2.c 37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
mschapv2.h 19 const u8 *password, size_t password_len,
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
eap_md5.c 36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_leap.c 67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_config.h 68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
eap_ttls.c 422 size_t identity_len, password_len; local
428 password = eap_get_config_password2(sm, &password_len, &pwhash);
477 password_len, pwhash, challenge,
521 size_t identity_len, password_len; local
527 password = eap_get_config_password2(sm, &password_len, &pwhash);
571 nt_challenge_response(challenge, password, password_len,
574 password, password_len);
604 size_t identity_len, password_len; local
609 password = eap_get_config_password(sm, &password_len);
613 msg = wpabuf_alloc(identity_len + password_len + 100)
657 size_t identity_len, password_len; local
    [all...]
eap_mschapv2.c 156 size_t identity_len, password_len; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
208 password_len, pwhash, auth_challenge,
311 config->password_len = 16;
320 config->password_len = config->new_password_len;
505 size_t username_len, password_len, new_password_len; local
512 password = eap_get_config_password2(sm, &password_len, &pwhash);
545 password, password_len, cp->encr_password))
560 password, password_len, cp->encr_hash);
eap_ikev2.c 62 size_t identity_len, password_len; local
87 password = eap_get_config_password(sm, &password_len);
89 data->ikev2.shared_secret = os_malloc(password_len);
92 os_memcpy(data->ikev2.shared_secret, password, password_len);
93 data->ikev2.shared_secret_len = password_len;
eap_pwd.c 26 size_t password_len; member in struct:eap_pwd_data
83 size_t identity_len, password_len; local
85 password = eap_get_config_password(sm, &password_len);
118 if ((data->password = os_malloc(password_len)) == NULL) {
125 os_memcpy(data->password, password, password_len);
126 data->password_len = password_len;
235 data->password, data->password_len,
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
ms_funcs.c 105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len,
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
179 if (nt_password_hash(password, password_len, password_hash))
274 * @password_len: Length of password
284 int generate_authenticator_response(const u8 *password, size_t password_len,
291 if (nt_password_hash(password, password_len, password_hash))
303 * @password_len: Length of passwor
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
pkcs_5_1.c 21 @param password_len The length of the password (octet)
29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 87 user->password_len = os_strlen(argv[i]);
118 (user->password == NULL || len > user->password_len)) {
120 user->password_len = os_strlen(argv[id]);
197 user->identity_len = user->password_len;
199 user->password_len = 0;
235 wsc_registrar.password_len = conf->ap_pin ?
authsrv.c 73 user->password = os_malloc(eap_user->password_len);
77 eap_user->password_len);
78 user->password_len = eap_user->password_len;
  /external/wpa_supplicant_8/src/common/
sae.h 54 const u8 *password, size_t password_len,
sae.c 290 size_t password_len)
309 password, password_len);
319 len[0] = password_len;
366 size_t password_len)
381 password, password_len);
391 len[0] = password_len;
503 const u8 *password, size_t password_len,
507 password_len) < 0)
510 password_len) < 0)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 232 size_t password_len = dlen; local
233 while (password_len > 0 &&
234 password[password_len - 1] == '\0') {
235 password_len--;
239 password, password_len);
241 parse->user_password_len = password_len;
511 if (sm->user->password_len != user_password_len ||
529 size_t password_len)
535 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
539 (unsigned long) password_len);
    [all...]
eap.h 30 size_t password_len; member in struct:eap_user
eap_server_md5.c 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 86 const u8 *password, size_t password_len,
eap_pwd_common.c 89 u8 *password, int password_len,
183 eap_pwd_h_update(hash, password, password_len);

Completed in 208 milliseconds

1 2 3