/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 83 size_t identity_len, password_len; local 86 password = eap_get_config_password(sm, &password_len); 120 data->psk = os_malloc(password_len); 125 os_memcpy(data->psk, password, password_len); 126 data->psk_len = password_len;
|
eap_pax.c | 51 size_t identity_len, password_len; local 54 password = eap_get_config_password(sm, &password_len); 61 if (password_len != EAP_PAX_AK_LEN) {
|
eap_psk.c | 37 size_t identity_len, password_len; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) {
|
eap_config.h | 68 * password_len - Length of password field 70 size_t password_len; member in struct:eap_peer_config
|
eap.c | [all...] |
eap_sim.c | 274 if (conf->password_len < 65) { [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 89 u8 *password, int password_len, 185 eap_pwd_h_update(hash, password, password_len);
|
eap_eke_common.c | 332 const u8 *password, size_t password_len, 344 password, password_len, NULL, 0, temp) < 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 177 if (rlen != sm->user->password_len ||
|
eap_server_mschapv2.c | 388 sm->user->password_len, 410 sm->user->password_len,
|
eap_server_sake.c | 337 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
eap_server_eke.c | 254 sm->user->password_len, 499 if (sm->user->password == NULL || sm->user->password_len == 0) {
|
eap_server_gpsk.c | 407 if (eap_gpsk_derive_keys(sm->user->password, sm->user->password_len,
|
eap_server_ikev2.c | 49 *secret_len = sm->user->password_len;
|
eap_server_pax.c | 380 sm->user->password_len != EAP_PAX_AK_LEN) {
|
eap_server_psk.c | 278 sm->user->password_len != EAP_PSK_PSK_LEN) {
|
eap_server_wsc.c | 128 cfg.pin_len = sm->user->password_len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 1133 bin_clear_free(ssid->eap.password, ssid->eap.password_len); 1135 ssid->eap.password_len = 0; 1144 bin_clear_free(ssid->eap.password, ssid->eap.password_len); 1146 ssid->eap.password_len = os_strlen(name); 1166 bin_clear_free(ssid->eap.password, ssid->eap.password_len); 1168 ssid->eap.password_len = res_len; 1195 bin_clear_free(ssid->eap.password, ssid->eap.password_len); 1197 ssid->eap.password_len = 16; 1215 buf = os_zalloc(4 + ssid->eap.password_len + 1); 1219 os_memcpy(buf + 4, ssid->eap.password, ssid->eap.password_len); [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 123 size_t password_len; member in struct:hostapd_eap_user
|
ieee802_1x.c | [all...] |
ap_config.c | 382 bin_clear_free(user->password, user->password_len);
|
/external/bluetooth/bluedroid/stack/include/ |
obx_api.h | 675 OBX_API extern tOBX_STATUS OBX_Password(tOBX_HANDLE shandle, UINT8 *p_password, UINT8 password_len, [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 626 bin_clear_free(tmp.password, tmp.password_len); 855 bin_clear_free(tmp.password, tmp.password_len); 860 request, tmp.password, tmp.password_len, 864 bin_clear_free(tmp.password, tmp.password_len); [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
evp.h | 374 OPENSSL_EXPORT int PKCS5_PBKDF2_HMAC(const char *password, int password_len, 382 int password_len, const uint8_t *salt, [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 435 user->password_len = pos - start; 460 user->password_len = 16; 485 user->password_len = (pos2 - pos) / 2; [all...] |