/system/gatekeeper/tests/ |
gatekeeper_device_test.cpp | 55 uint32_t password_len = 50; local 56 uint8_t password_payload[password_len]; 63 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len, 71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 78 uint32_t password_len = 50; local 79 uint8_t password_payload[password_len]; 87 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len, 94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll); 105 uint32_t password_len = 50; local 106 uint8_t password_payload[password_len]; 150 uint32_t password_len = 50; local 175 uint32_t password_len = 50; local 204 uint32_t password_len = 50; local 228 uint32_t password_len = 50; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) ||
|
mschapv2.h | 19 const u8 *password, size_t password_len,
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
eap_mschapv2.c | 156 size_t identity_len, password_len; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 208 password_len, pwhash, auth_challenge, 306 bin_clear_free(config->password, config->password_len); 311 config->password_len = 16; 317 config->password_len); 319 config->password_len = 0; 325 config->password_len = config->new_password_len; 522 size_t username_len, password_len, new_password_len; 529 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
eap_pwd.c | 28 size_t password_len; member in struct:eap_pwd_data 89 size_t identity_len, password_len; local 93 password = eap_get_config_password2(sm, &password_len, &pwhash); 126 if ((data->password = os_malloc(password_len)) == NULL) { 133 os_memcpy(data->password, password, password_len); 134 data->password_len = password_len; 164 bin_clear_free(data->password, data->password_len); 224 size_t password_len; local 303 data->password_len, pwhash) [all...] |
eap_ttls.c | 487 size_t identity_len, password_len; 493 password = eap_get_config_password2(sm, &password_len, &pwhash); 542 password_len, pwhash, challenge, 581 size_t identity_len, password_len; 587 password = eap_get_config_password2(sm, &password_len, &pwhash); 631 nt_challenge_response(challenge, password, password_len, 634 password, password_len); 665 size_t identity_len, password_len; local 670 password = eap_get_config_password(sm, &password_len); 674 msg = wpabuf_alloc(identity_len + password_len + 100) [all...] |
eap_ikev2.c | 62 size_t identity_len, password_len; local 92 password = eap_get_config_password(sm, &password_len); 94 data->ikev2.shared_secret = os_malloc(password_len); 97 os_memcpy(data->ikev2.shared_secret, password, password_len); 98 data->ikev2.shared_secret_len = password_len;
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
ms_funcs.c | 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 178 nt_password_hash(password, password_len, password_hash)) 270 * @password_len: Length of password 280 int generate_authenticator_response(const u8 *password, size_t password_len, 287 if (nt_password_hash(password, password_len, password_hash)) 299 * @password_len: Length of passwor [all...] |
/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); 87 user->password_len = os_strlen(argv[i]); 120 (user->password == NULL || len > user->password_len)) { 121 bin_clear_free(user->password, user->password_len); 122 user->password_len = os_strlen(argv[id]); 168 hapd->tmp_eap_user.password_len); 209 user->identity_len = user->password_len; 211 user->password_len = 0; 247 wsc_registrar.password_len = conf->ap_pin ?
|
authsrv.c | 74 user->password = os_malloc(eap_user->password_len); 78 eap_user->password_len); 79 user->password_len = eap_user->password_len;
|
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 63 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, 76 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) { 145 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, 149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
pbkdf_test.cc | 34 static bool TestPBKDF2(const void *password, size_t password_len, 45 if (!PKCS5_PBKDF2_HMAC((const char *)password, password_len, 159 const size_t password_len = strlen(kPassword); local 168 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, 179 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 60 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.h | 60 const u8 *password, size_t password_len,
|
eap_eke_common.h | 86 const u8 *password, size_t password_len,
|
/external/boringssl/src/include/openssl/ |
pkcs8.h | 172 * get anything from a |PKCS12|. Thus |password| and |password_len| may be 173 * |NULL| and zero, respectively, or else |password_len| may be -1, or else 174 * |password[password_len]| must be zero and no other NUL bytes may appear in 175 * |password|. If the |password_len| checks fail, zero is returned 178 int password_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 262 size_t password_len = dlen; local 263 while (password_len > 0 && 264 password[password_len - 1] == '\0') { 265 password_len--; 269 password, password_len); 271 parse->user_password_len = password_len; 541 if (sm->user->password_len != user_password_len || 560 size_t password_len) 566 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 570 (unsigned long) password_len); [all...] |
eap_server_pwd.c | 27 size_t password_len; member in struct:eap_pwd_data 88 sm->user->password_len == 0) { 107 data->password = os_malloc(sm->user->password_len); 115 data->password_len = sm->user->password_len; 116 os_memcpy(data->password, sm->user->password, data->password_len); 122 bin_clear_free(data->password, data->password_len); 150 bin_clear_free(data->password, data->password_len); 592 size_t password_len; local 632 password_len = sizeof(pwhashhash) [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 667 size_t password_len; member in struct:pkcs12_context 793 if (!pbe_crypt(algor, ctx->password, ctx->password_len, 844 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len); 979 &ctx.password_len)) { 1020 if (!pkcs12_key_gen_raw(ctx.password, ctx.password_len, CBS_data(&salt), [all...] |