/external/zxing/core/ |
H A D | core.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ... |
/external/zlib/src/contrib/minizip/ |
H A D | miniunz.c | 196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 203 " -p extract crypted file using password\n\n"); 312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) 316 const char* password; 370 err = unzOpenCurrentFilePassword(uf,password); 475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password) 479 const char* password; 494 password) != UNZ_OK) 511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) 516 const char* password; 540 const char *password=NULL; local [all...] |
H A D | minizip.c | 174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 260 const char* password=NULL; local 291 password=argv[i+1]; 419 if ((password != NULL) && (err==ZIP_OK)) 457 password,crcFile, zip64);
|
H A D | unzip.c | 31 non-echoing password parts) were originally written in Europe. The 1473 int* level, int raw, const char* password) 1484 if (password != NULL) 1616 if (password != NULL) 1620 init_keys(password,s->keys,s->pcrc_32_tab); 1646 extern int ZEXPORT unzOpenCurrentFilePassword (unzFile file, const char* password) argument 1648 return unzOpenCurrentFile3(file, NULL, NULL, 0, password); 1472 unzOpenCurrentFile3(unzFile file, int* method, int* level, int raw, const char* password) argument
|
H A D | zip.c | 1060 const char* password, uLong crcForCrypting, 1071 if (password != NULL) 1122 if (password != NULL) 1244 if ((err==Z_OK) && (password != NULL)) 1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); 1270 const char* password, uLong crcForCrypting, 1278 password, crcForCrypting, versionMadeBy, flagBase, 0); 1286 const char* password, uLong crcForCrypting) 1293 password, crcForCryptin 1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument 1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument 1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument 1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 122 u8 *password; member in struct:hostapd_eap_user 127 unsigned int password_hash:1; /* whether password is hashed with
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.c | 291 const u8 *addr2, const u8 *password, 310 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password", 311 password, password_len); 316 * password || counter) 320 addr[0] = password; 367 const u8 *addr2, const u8 *password, 382 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password", 383 password, password_len); 388 * password || counter) 392 addr[0] = password; 290 sae_derive_pwe_ecc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len) argument 366 sae_derive_pwe_ffc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len) argument 504 sae_prepare_commit(const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, struct sae_data *sae) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 105 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 106 * @password_len: Length of password 110 int nt_password_hash(const u8 *password, size_t password_len, argument 117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 164 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 165 * @password_len: Length of password 171 const u8 *password, size_t password_len, 180 if (nt_password_hash(password, password_len, password_hash)) 274 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 275 * @password_len: Length of password 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
H A D | tls_openssl.c | 1930 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument 1932 if (password == NULL) { 1935 os_strlcpy(buf, (char *) password, size);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 332 const u8 *password, size_t password_len, 341 /* temp = prf(0+, password) */ 344 password, password_len, NULL, 0, temp) < 0) 346 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)", 331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
|
H A D | eap_pwd_common.c | 86 * on the password and identities. 89 u8 *password, int password_len, 175 * compute counter-mode password value and stretch to prime 176 * pwd-seed = H(token | peer-id | server-id | password | 185 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 50 * password - Password string for EAP 52 * This field can include either the plaintext password (default 54 * presentation of the password) if flags field has 65 u8 *password; member in struct:eap_peer_config 68 * password_len - Length of password field 534 * otp - One-time-password 556 * pending_req_password - Whether there is a pending password request 574 * pending_req_new_password - Pending password update request 626 * new_password - New password for password updat [all...] |
H A D | eap_eke.c | 71 const u8 *identity, *password; local 75 password = eap_get_config_password(sm, &password_len); 76 if (!password) { 77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured"); 367 const u8 *password; local 378 password = eap_get_config_password(sm, &password_len); 379 if (password == NULL) { 380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!"); 401 * temp = prf(0+, password) 404 if (eap_eke_derive_key(&data->sess, password, password_le [all...] |
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 86 password = eap_get_config_password(sm, &password_len); 87 if (password == NULL) { 88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); 125 os_memcpy(data->psk, password, password_len);
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 92 password = eap_get_config_password(sm, &password_len); 93 if (password) { 97 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 306 bin_clear_free(config->password, config->password_len); 310 config->password = os_malloc(16); 312 if (config->password && 315 config->password)) { 316 bin_clear_free(config->password, 318 config->password 509 const u8 *username, *password, *new_password; local [all...] |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | eap_pax.c | 50 const u8 *identity, *password; local 54 password = eap_get_config_password(sm, &password_len); 55 if (!identity || !password) { 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
H A D | eap_psk.c | 36 const u8 *identity, *password; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) { 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
H A D | eap_pwd.c | 26 u8 *password; member in struct:eap_pwd_data 86 const u8 *identity, *password; local 90 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 123 if ((data->password = os_malloc(password_len)) == NULL) { 130 os_memcpy(data->password, password, password_len); 160 bin_clear_free(data->password, data->password_len); 265 data->password, dat [all...] |
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|