/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
H A D | pkcs_5_1.c | 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, argument 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
H A D | pkcs_5_2.c | 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, argument 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_config.h | 68 * password_len - Length of password field 70 size_t password_len; member in struct:eap_peer_config
|
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; local 87 password = eap_get_config_password(sm, &password_len); 89 data->ikev2.shared_secret = os_malloc(password_len); 92 os_memcpy(data->ikev2.shared_secret, password, password_len); 93 data->ikev2.shared_secret_len = password_len;
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, [all...] |
H A D | eap_pax.c | 51 size_t identity_len, password_len; local 54 password = eap_get_config_password(sm, &password_len); 61 if (password_len != EAP_PAX_AK_LEN) {
|
H A D | eap_psk.c | 37 size_t identity_len, password_len; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) {
|
H A D | eap_sake.c | 72 size_t identity_len, password_len; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_config.h | 68 * password_len - Length of password field 70 size_t password_len; member in struct:eap_peer_config
|
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; local 87 password = eap_get_config_password(sm, &password_len); 89 data->ikev2.shared_secret = os_malloc(password_len); 92 os_memcpy(data->ikev2.shared_secret, password, password_len); 93 data->ikev2.shared_secret_len = password_len;
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 89 u8 *password, int password_len, 183 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 89 u8 *password, int password_len, 183 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|