Searched defs:password_len (Results 1 - 25 of 65) sorted by relevance

123

/external/dropbear/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_1.c21 @param password_len The length of the password (octet)
29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, argument
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
H A Dpkcs_5_2.c22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, argument
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_config.h68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
H A Deap_ikev2.c62 size_t identity_len, password_len; local
87 password = eap_get_config_password(sm, &password_len);
89 data->ikev2.shared_secret = os_malloc(password_len);
92 os_memcpy(data->ikev2.shared_secret, password, password_len);
93 data->ikev2.shared_secret_len = password_len;
H A Deap_leap.c67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len,
[all...]
H A Deap_pax.c51 size_t identity_len, password_len; local
54 password = eap_get_config_password(sm, &password_len);
61 if (password_len != EAP_PAX_AK_LEN) {
H A Deap_psk.c37 size_t identity_len, password_len; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
H A Deap_sake.c72 size_t identity_len, password_len; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_config.h68 * password_len - Length of password field
70 size_t password_len; member in struct:eap_peer_config
H A Deap_ikev2.c62 size_t identity_len, password_len; local
87 password = eap_get_config_password(sm, &password_len);
89 data->ikev2.shared_secret = os_malloc(password_len);
92 os_memcpy(data->ikev2.shared_secret, password, password_len);
93 data->ikev2.shared_secret_len = password_len;
H A Deap_leap.c67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
121 nt_challenge_response(challenge, password, password_len, rpos);
191 size_t password_len, len; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
236 if (nt_password_hash(password, password_len, pw_hash) ||
275 size_t password_len; local
278 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
341 password = eap_get_config_password2(sm, &password_len,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c89 u8 *password, int password_len,
183 eap_pwd_h_update(hash, password, password_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c89 u8 *password, int password_len,
183 eap_pwd_h_update(hash, password, password_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument

Completed in 175 milliseconds

123