HomeSort by relevance Sort by last modified time
    Searched full:password_len (Results 26 - 50 of 54) sorted by null

12 3

  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 83 size_t identity_len, password_len; local
86 password = eap_get_config_password(sm, &password_len);
120 data->psk = os_malloc(password_len);
125 os_memcpy(data->psk, password, password_len);
126 data->psk_len = password_len;
eap_pax.c 51 size_t identity_len, password_len; local
54 password = eap_get_config_password(sm, &password_len);
61 if (password_len != EAP_PAX_AK_LEN) {
eap_psk.c 37 size_t identity_len, password_len; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
eap_config.h 68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
eap.c     [all...]
eap_sim.c 274 if (conf->password_len < 65) {
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.c 89 u8 *password, int password_len,
185 eap_pwd_h_update(hash, password, password_len);
eap_eke_common.c 332 const u8 *password, size_t password_len,
344 password, password_len, NULL, 0, temp) < 0)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 177 if (rlen != sm->user->password_len ||
eap_server_mschapv2.c 388 sm->user->password_len,
410 sm->user->password_len,
eap_server_sake.c 337 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
eap_server_eke.c 254 sm->user->password_len,
499 if (sm->user->password == NULL || sm->user->password_len == 0) {
eap_server_gpsk.c 407 if (eap_gpsk_derive_keys(sm->user->password, sm->user->password_len,
eap_server_ikev2.c 49 *secret_len = sm->user->password_len;
eap_server_pax.c 380 sm->user->password_len != EAP_PAX_AK_LEN) {
eap_server_psk.c 278 sm->user->password_len != EAP_PSK_PSK_LEN) {
eap_server_wsc.c 128 cfg.pin_len = sm->user->password_len;
  /external/wpa_supplicant_8/wpa_supplicant/
config.c 1133 bin_clear_free(ssid->eap.password, ssid->eap.password_len);
1135 ssid->eap.password_len = 0;
1144 bin_clear_free(ssid->eap.password, ssid->eap.password_len);
1146 ssid->eap.password_len = os_strlen(name);
1166 bin_clear_free(ssid->eap.password, ssid->eap.password_len);
1168 ssid->eap.password_len = res_len;
1195 bin_clear_free(ssid->eap.password, ssid->eap.password_len);
1197 ssid->eap.password_len = 16;
1215 buf = os_zalloc(4 + ssid->eap.password_len + 1);
1219 os_memcpy(buf + 4, ssid->eap.password, ssid->eap.password_len);
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.h 123 size_t password_len; member in struct:hostapd_eap_user
ieee802_1x.c     [all...]
ap_config.c 382 bin_clear_free(user->password, user->password_len);
  /external/bluetooth/bluedroid/stack/include/
obx_api.h 675 OBX_API extern tOBX_STATUS OBX_Password(tOBX_HANDLE shandle, UINT8 *p_password, UINT8 password_len,
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.c 626 bin_clear_free(tmp.password, tmp.password_len);
855 bin_clear_free(tmp.password, tmp.password_len);
860 request, tmp.password, tmp.password_len,
864 bin_clear_free(tmp.password, tmp.password_len);
    [all...]
  /external/chromium_org/third_party/boringssl/src/include/openssl/
evp.h 374 OPENSSL_EXPORT int PKCS5_PBKDF2_HMAC(const char *password, int password_len,
382 int password_len, const uint8_t *salt,
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 435 user->password_len = pos - start;
460 user->password_len = 16;
485 user->password_len = (pos2 - pos) / 2;
    [all...]

Completed in 518 milliseconds

12 3