/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
H A D | mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 98 nt_password_hash(password, password_len, password_hash); 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 25 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 74 password, password_len); 77 password, password_len, nt_response); 78 generate_authenticator_response(password, password_len, 93 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 74 password, password_len); 77 password, password_len, nt_response); 78 generate_authenticator_response(password, password_len, 93 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 74 password, password_len); 77 password, password_len, nt_response); 78 generate_authenticator_response(password, password_len, 93 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
H A D | pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, argument 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|