/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
eap_ikev2.c | 62 size_t identity_len, password_len; local 92 password = eap_get_config_password(sm, &password_len); 94 data->ikev2.shared_secret = os_malloc(password_len); 97 os_memcpy(data->ikev2.shared_secret, password, password_len); 98 data->ikev2.shared_secret_len = password_len;
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_pax.c | 51 size_t identity_len, password_len; local 54 password = eap_get_config_password(sm, &password_len); 61 if (password_len != EAP_PAX_AK_LEN) {
|
eap_psk.c | 37 size_t identity_len, password_len; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) {
|
eap_sake.c | 72 size_t identity_len, password_len; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
eap_config.h | 68 * password_len - Length of password field 70 size_t password_len; member in struct:eap_peer_config
|
eap_eke.c | 72 size_t identity_len, password_len; local 75 password = eap_get_config_password(sm, &password_len); 368 size_t password_len; local 378 password = eap_get_config_password(sm, &password_len); 404 if (eap_eke_derive_key(&data->sess, password, password_len,
|
eap_gpsk.c | 83 size_t identity_len, password_len; local 86 password = eap_get_config_password(sm, &password_len); 120 data->psk = os_malloc(password_len); 125 os_memcpy(data->psk, password, password_len); 126 data->psk_len = password_len;
|
eap_pwd.c | 27 size_t password_len; member in struct:eap_pwd_data 87 size_t identity_len, password_len; local 90 password = eap_get_config_password(sm, &password_len); 123 if ((data->password = os_malloc(password_len)) == NULL) { 130 os_memcpy(data->password, password, password_len); 131 data->password_len = password_len; 160 bin_clear_free(data->password, data->password_len); 265 data->password, data->password_len,
|
eap_mschapv2.c | 156 size_t identity_len, password_len; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 208 password_len, pwhash, auth_challenge, 306 bin_clear_free(config->password, config->password_len); 311 config->password_len = 16; 317 config->password_len); 319 config->password_len = 0; 325 config->password_len = config->new_password_len; 510 size_t username_len, password_len, new_password_len; local 517 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_ttls.c | 431 size_t identity_len, password_len; local 437 password = eap_get_config_password2(sm, &password_len, &pwhash); 486 password_len, pwhash, challenge, 520 size_t identity_len, password_len; local 526 password = eap_get_config_password2(sm, &password_len, &pwhash); 570 nt_challenge_response(challenge, password, password_len, 573 password, password_len); 603 size_t identity_len, password_len; local 608 password = eap_get_config_password(sm, &password_len); 612 msg = wpabuf_alloc(identity_len + password_len + 100) 656 size_t identity_len, password_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap.h | 30 size_t password_len; member in struct:eap_user
|
eap_server_pwd.c | 26 size_t password_len; member in struct:eap_pwd_data 86 sm->user->password_len == 0) { 105 data->password = os_malloc(sm->user->password_len); 113 data->password_len = sm->user->password_len; 114 os_memcpy(data->password, sm->user->password, data->password_len); 119 bin_clear_free(data->password, data->password_len); 147 bin_clear_free(data->password, data->password_len); 614 data->password, data->password_len,
|
eap_server_ttls.c | 232 size_t password_len = dlen; local 233 while (password_len > 0 && 234 password[password_len - 1] == '\0') { 235 password_len--; 239 password, password_len); 241 parse->user_password_len = password_len; 511 if (sm->user->password_len != user_password_len || 529 size_t password_len) 535 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 539 (unsigned long) password_len); [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 620 size_t password_len; member in struct:pkcs12_context 752 if (!pbe_crypt(algor, ctx->password, ctx->password_len, 802 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len); 936 &ctx.password_len)) { 977 if (!pkcs12_key_gen_raw(ctx.password, ctx.password_len, CBS_data(&salt), [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 123 size_t password_len; member in struct:hostapd_eap_user
|