HomeSort by relevance Sort by last modified time
    Searched defs:password_len (Results 1 - 19 of 19) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_otp.c 34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
eap_ikev2.c 62 size_t identity_len, password_len; local
92 password = eap_get_config_password(sm, &password_len);
94 data->ikev2.shared_secret = os_malloc(password_len);
97 os_memcpy(data->ikev2.shared_secret, password, password_len);
98 data->ikev2.shared_secret_len = password_len;
eap_leap.c 67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_pax.c 51 size_t identity_len, password_len; local
54 password = eap_get_config_password(sm, &password_len);
61 if (password_len != EAP_PAX_AK_LEN) {
eap_psk.c 37 size_t identity_len, password_len; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
eap_sake.c 72 size_t identity_len, password_len; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
eap_config.h 68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
eap_eke.c 72 size_t identity_len, password_len; local
75 password = eap_get_config_password(sm, &password_len);
368 size_t password_len; local
378 password = eap_get_config_password(sm, &password_len);
404 if (eap_eke_derive_key(&data->sess, password, password_len,
eap_gpsk.c 83 size_t identity_len, password_len; local
86 password = eap_get_config_password(sm, &password_len);
120 data->psk = os_malloc(password_len);
125 os_memcpy(data->psk, password, password_len);
126 data->psk_len = password_len;
eap_pwd.c 27 size_t password_len; member in struct:eap_pwd_data
87 size_t identity_len, password_len; local
90 password = eap_get_config_password(sm, &password_len);
123 if ((data->password = os_malloc(password_len)) == NULL) {
130 os_memcpy(data->password, password, password_len);
131 data->password_len = password_len;
160 bin_clear_free(data->password, data->password_len);
265 data->password, data->password_len,
eap_mschapv2.c 156 size_t identity_len, password_len; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
208 password_len, pwhash, auth_challenge,
306 bin_clear_free(config->password, config->password_len);
311 config->password_len = 16;
317 config->password_len);
319 config->password_len = 0;
325 config->password_len = config->new_password_len;
510 size_t username_len, password_len, new_password_len; local
517 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_ttls.c 431 size_t identity_len, password_len; local
437 password = eap_get_config_password2(sm, &password_len, &pwhash);
486 password_len, pwhash, challenge,
520 size_t identity_len, password_len; local
526 password = eap_get_config_password2(sm, &password_len, &pwhash);
570 nt_challenge_response(challenge, password, password_len,
573 password, password_len);
603 size_t identity_len, password_len; local
608 password = eap_get_config_password(sm, &password_len);
612 msg = wpabuf_alloc(identity_len + password_len + 100)
656 size_t identity_len, password_len; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap.h 30 size_t password_len; member in struct:eap_user
eap_server_pwd.c 26 size_t password_len; member in struct:eap_pwd_data
86 sm->user->password_len == 0) {
105 data->password = os_malloc(sm->user->password_len);
113 data->password_len = sm->user->password_len;
114 os_memcpy(data->password, sm->user->password, data->password_len);
119 bin_clear_free(data->password, data->password_len);
147 bin_clear_free(data->password, data->password_len);
614 data->password, data->password_len,
eap_server_ttls.c 232 size_t password_len = dlen; local
233 while (password_len > 0 &&
234 password[password_len - 1] == '\0') {
235 password_len--;
239 password, password_len);
241 parse->user_password_len = password_len;
511 if (sm->user->password_len != user_password_len ||
529 size_t password_len)
535 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
539 (unsigned long) password_len);
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
pkcs8.c 620 size_t password_len; member in struct:pkcs12_context
752 if (!pbe_crypt(algor, ctx->password, ctx->password_len,
802 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len);
936 &ctx.password_len)) {
977 if (!pkcs12_key_gen_raw(ctx.password, ctx.password_len, CBS_data(&salt),
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.h 123 size_t password_len; member in struct:hostapd_eap_user

Completed in 306 milliseconds