Lines Matching refs:password

21 //   Based on an IMEI and serverId input, the algorithm for generating the OMADM client password 
22 // and server password actually has following three steps,
24 // Step 1 Generate the client password key and server password key:
30 // It defines a client password dictionary and a server password dictionary which contain
31 // 15 numbers, we use client password dictionary to generate client password key and server
32 // password dictionary to generate server password key. Suppose IMEI string length is n, for
40 // Hence we get a password KEY which is Serial1+"-"+Serial2.
45 // which is always 10 characters, then we get a temporary password which is md5key+newImei.
47 // Step 3 Shuffle the temporary password:
48 // The last step is to shuffle the temporary password got from Step 2.
49 // Since the password length is 16 and n is the length which is equal to 16,
51 // temporary password string, we do following shuffle,
57 // Do the same shuffle three times, then after third time shuffle we get the password which
76 * Initialize all the client/server password dictionaries and other values.
165 * Sets the sever ID for password generation
182 * Sets the IMEI for password generation
218 * Generate a client password key with a predefined client password dictionary
222 * @return the client password key
229 * Generate a server password key with a predefined server password dictionary
233 * @return the server password key
240 * Generate a client password using a generated client password key, the IMEI, and
243 * @return the client password
251 * Generate a server password using a generated server password key, the IMEI, and
254 * @return the server password
262 * Generate a client password using a generated client password key, the IMEI, and
267 * @return the client password
275 * Generate a server password using a generated server password key, the IMEI, and
280 * @return the server password
288 * Generate a key with given IMEI and password dictionary.
296 * Hence we get a password KEY which is Serial1+"-"+Serial2.
299 * @param dict[] a password dictionary
300 * @return a password key
476 * Generate a password with given IMEI, serverID, and key.
479 * which is always 10 characters, then we get a temporary password which is md5key+newImei.
480 * Finally, we shuffle the temporary password three time.
484 * @param key the key needs to generate password
485 * @return a password
543 char * password = (char *) malloc(sizeof(char) * ( PWLength + 1));
544 memset( password , '\0', (sizeof(char) * ( PWLength + 1 ) ) ); //this will be of 16 + 1
546 strcpy( password , MD5DigestStr );
547 strcat( password , (const char *)IMEI36 );
558 printf("BUFFER: %s\n", password);
560 shuffle(*password);
561 shuffle(*password);
562 shuffle(*password);
567 return password;