HomeSort by relevance Sort by last modified time
    Searched refs:password_len (Results 1 - 25 of 58) sorted by null

1 2 3

  /system/gatekeeper/tests/
gatekeeper_device_test.cpp 55 uint32_t password_len = 50; local
56 uint8_t password_payload[password_len];
63 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
71 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
78 uint32_t password_len = 50; local
79 uint8_t password_payload[password_len];
87 ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
94 password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
105 uint32_t password_len = 50; local
106 uint8_t password_payload[password_len];
150 uint32_t password_len = 50; local
175 uint32_t password_len = 50; local
204 uint32_t password_len = 50; local
228 uint32_t password_len = 50; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
mschapv2.c 37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
mschapv2.h 19 const u8 *password, size_t password_len,
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
eap_md5.c 36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_leap.c 67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_mschapv2.c 156 size_t identity_len, password_len; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
208 password_len, pwhash, auth_challenge,
306 bin_clear_free(config->password, config->password_len);
311 config->password_len = 16;
317 config->password_len);
319 config->password_len = 0;
325 config->password_len = config->new_password_len;
522 size_t username_len, password_len, new_password_len;
529 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_vendor_test.c 35 size_t password_len; local
43 password = eap_get_config_password(sm, &password_len);
44 data->test_pending_req = password && password_len == 7 &&
eap_config.h 68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
eap_ikev2.c 62 size_t identity_len, password_len; local
92 password = eap_get_config_password(sm, &password_len);
94 data->ikev2.shared_secret = os_malloc(password_len);
97 os_memcpy(data->ikev2.shared_secret, password, password_len);
98 data->ikev2.shared_secret_len = password_len;
eap_pwd.c 28 size_t password_len; member in struct:eap_pwd_data
89 size_t identity_len, password_len; local
93 password = eap_get_config_password2(sm, &password_len, &pwhash);
126 if ((data->password = os_malloc(password_len)) == NULL) {
133 os_memcpy(data->password, password, password_len);
134 data->password_len = password_len;
164 bin_clear_free(data->password, data->password_len);
224 size_t password_len; local
303 data->password_len, pwhash)
    [all...]
eap_ttls.c 487 size_t identity_len, password_len;
493 password = eap_get_config_password2(sm, &password_len, &pwhash);
542 password_len, pwhash, challenge,
581 size_t identity_len, password_len;
587 password = eap_get_config_password2(sm, &password_len, &pwhash);
631 nt_challenge_response(challenge, password, password_len,
634 password, password_len);
665 size_t identity_len, password_len; local
670 password = eap_get_config_password(sm, &password_len);
674 msg = wpabuf_alloc(identity_len + password_len + 100)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
ms_funcs.c 105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len,
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
178 nt_password_hash(password, password_len, password_hash))
270 * @password_len: Length of password
280 int generate_authenticator_response(const u8 *password, size_t password_len,
287 if (nt_password_hash(password, password_len, password_hash))
299 * @password_len: Length of passwor
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 63 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len,
76 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
145 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len,
149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
pbkdf_test.cc 34 static bool TestPBKDF2(const void *password, size_t password_len,
45 if (!PKCS5_PBKDF2_HMAC((const char *)password, password_len,
159 const size_t password_len = strlen(kPassword); local
168 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
179 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 86 bin_clear_free(user->password, user->password_len);
87 user->password_len = os_strlen(argv[i]);
120 (user->password == NULL || len > user->password_len)) {
121 bin_clear_free(user->password, user->password_len);
122 user->password_len = os_strlen(argv[id]);
168 hapd->tmp_eap_user.password_len);
209 user->identity_len = user->password_len;
211 user->password_len = 0;
247 wsc_registrar.password_len = conf->ap_pin ?
authsrv.c 74 user->password = os_malloc(eap_user->password_len);
78 eap_user->password_len);
79 user->password_len = eap_user->password_len;
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 60 const u8 *password, size_t password_len,
  /external/boringssl/src/include/openssl/
pkcs8.h 172 * get anything from a |PKCS12|. Thus |password| and |password_len| may be
173 * |NULL| and zero, respectively, or else |password_len| may be -1, or else
174 * |password[password_len]| must be zero and no other NUL bytes may appear in
175 * |password|. If the |password_len| checks fail, zero is returned
178 int password_len);
  /external/wpa_supplicant_8/src/common/
sae.h 60 const u8 *password, size_t password_len,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 262 size_t password_len = dlen; local
263 while (password_len > 0 &&
264 password[password_len - 1] == '\0') {
265 password_len--;
269 password, password_len);
271 parse->user_password_len = password_len;
541 if (sm->user->password_len != user_password_len ||
560 size_t password_len)
566 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
570 (unsigned long) password_len);
    [all...]
eap_server_pwd.c 27 size_t password_len; member in struct:eap_pwd_data
88 sm->user->password_len == 0) {
107 data->password = os_malloc(sm->user->password_len);
115 data->password_len = sm->user->password_len;
116 os_memcpy(data->password, sm->user->password, data->password_len);
122 bin_clear_free(data->password, data->password_len);
150 bin_clear_free(data->password, data->password_len);
592 size_t password_len; local
632 password_len = sizeof(pwhashhash)
    [all...]
  /external/boringssl/src/crypto/pkcs8/
pkcs8.c 667 size_t password_len; member in struct:pkcs12_context
793 if (!pbe_crypt(algor, ctx->password, ctx->password_len,
844 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len);
979 &ctx.password_len)) {
1020 if (!pkcs12_key_gen_raw(ctx.password, ctx.password_len, CBS_data(&salt),
    [all...]

Completed in 1003 milliseconds

1 2 3