Searched refs:password_len (Results 1 - 25 of 150) sorted by relevance

123456

/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_otp.c40 size_t password_len, len; local
51 password = eap_get_config_otp(sm, &password_len);
55 password = eap_get_config_password(sm, &password_len);
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
H A Dmschapv2.c43 const u8 *password, size_t password_len,
71 password, password_len);
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
98 nt_password_hash(password, password_len, password_hash);
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h25 const u8 *password, size_t password_len,
H A Deap_gtc.c57 size_t password_len, identity_len, len, plen; local
83 password = eap_get_config_otp(sm, &password_len);
87 password = eap_get_config_password(sm, &password_len);
104 plen = password_len;
119 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c42 size_t len, challenge_len, password_len; local
44 password = eap_get_config_password(sm, &password_len);
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
74 password, password_len);
77 password, password_len, nt_response);
78 generate_authenticator_response(password, password_len,
93 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
74 password, password_len);
77 password, password_len, nt_response);
78 generate_authenticator_response(password, password_len,
93 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
74 password, password_len);
77 password, password_len, nt_response);
78 generate_authenticator_response(password, password_len,
93 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/external/dropbear/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_2.c22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, argument
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {

Completed in 297 milliseconds

123456