Searched defs:password (Results 1 - 25 of 419) sorted by last modified time

1234567891011>>

/external/zxing/core/
H A Dcore.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ...
/external/zlib/src/contrib/minizip/
H A Dminiunz.c196 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
203 " -p extract crypted file using password\n\n");
312 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
316 const char* password;
370 err = unzOpenCurrentFilePassword(uf,password);
475 int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
479 const char* password;
494 password) != UNZ_OK)
511 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
516 const char* password;
540 const char *password=NULL; local
[all...]
H A Dminizip.c174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
260 const char* password=NULL; local
291 password=argv[i+1];
419 if ((password != NULL) && (err==ZIP_OK))
457 password,crcFile, zip64);
H A Dunzip.c31 non-echoing password parts) were originally written in Europe. The
1473 int* level, int raw, const char* password)
1484 if (password != NULL)
1616 if (password != NULL)
1620 init_keys(password,s->keys,s->pcrc_32_tab);
1646 extern int ZEXPORT unzOpenCurrentFilePassword (unzFile file, const char* password) argument
1648 return unzOpenCurrentFile3(file, NULL, NULL, 0, password);
1472 unzOpenCurrentFile3(unzFile file, int* method, int* level, int raw, const char* password) argument
H A Dzip.c1060 const char* password, uLong crcForCrypting,
1071 if (password != NULL)
1122 if (password != NULL)
1244 if ((err==Z_OK) && (password != NULL))
1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
1270 const char* password, uLong crcForCrypting,
1278 password, crcForCrypting, versionMadeBy, flagBase, 0);
1286 const char* password, uLong crcForCrypting)
1293 password, crcForCryptin
1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument
1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument
1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument
1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument
[all...]
/external/wpa_supplicant_8/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.h122 u8 *password; member in struct:hostapd_eap_user
127 unsigned int password_hash:1; /* whether password is hashed with
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.c291 const u8 *addr2, const u8 *password,
310 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password",
311 password, password_len);
316 * password || counter)
320 addr[0] = password;
367 const u8 *addr2, const u8 *password,
382 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password",
383 password, password_len);
388 * password || counter)
392 addr[0] = password;
290 sae_derive_pwe_ecc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len) argument
366 sae_derive_pwe_ffc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len) argument
504 sae_prepare_commit(const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, struct sae_data *sae) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c105 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
106 * @password_len: Length of password
110 int nt_password_hash(const u8 *password, size_t password_len, argument
117 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
164 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
165 * @password_len: Length of password
171 const u8 *password, size_t password_len,
180 if (nt_password_hash(password, password_len, password_hash))
274 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
275 * @password_len: Length of password
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
430 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
H A Dtls_openssl.c1930 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument
1932 if (password == NULL) {
1935 os_strlcpy(buf, (char *) password, size);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c332 const u8 *password, size_t password_len,
341 /* temp = prf(0+, password) */
344 password, password_len, NULL, 0, temp) < 0)
346 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)",
331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
H A Deap_pwd_common.c86 * on the password and identities.
89 u8 *password, int password_len,
175 * compute counter-mode password value and stretch to prime
176 * pwd-seed = H(token | peer-id | server-id | password |
185 eap_pwd_h_update(hash, password, password_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_config.h50 * password - Password string for EAP
52 * This field can include either the plaintext password (default
54 * presentation of the password) if flags field has
65 u8 *password; member in struct:eap_peer_config
68 * password_len - Length of password field
534 * otp - One-time-password
556 * pending_req_password - Whether there is a pending password request
574 * pending_req_new_password - Pending password update request
626 * new_password - New password for password updat
[all...]
H A Deap_eke.c71 const u8 *identity, *password; local
75 password = eap_get_config_password(sm, &password_len);
76 if (!password) {
77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
367 const u8 *password; local
378 password = eap_get_config_password(sm, &password_len);
379 if (password == NULL) {
380 wpa_printf(MSG_INFO, "EAP-EKE: No password configured!");
401 * temp = prf(0+, password)
404 if (eap_eke_derive_key(&data->sess, password, password_le
[all...]
H A Deap_gpsk.c82 const u8 *identity, *password; local
86 password = eap_get_config_password(sm, &password_len);
87 if (password == NULL) {
88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
125 os_memcpy(data->psk, password, password_len);
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Deap_ikev2.c61 const u8 *identity, *password; local
92 password = eap_get_config_password(sm, &password_len);
93 if (password) {
97 os_memcpy(data->ikev2.shared_secret, password, password_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
188 const u8 *pos, *password; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
197 if (password == NULL)
231 if (hash_nt_password_hash(password, pw_hash_hash)) {
236 if (nt_password_hash(password, password_le
276 const u8 *password; local
334 const u8 *addr[5], *password; local
[all...]
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Deap_mschapv2.c157 const u8 *identity, *password; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
306 bin_clear_free(config->password, config->password_len);
310 config->password = os_malloc(16);
312 if (config->password &&
315 config->password)) {
316 bin_clear_free(config->password,
318 config->password
509 const u8 *username, *password, *new_password; local
[all...]
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Deap_pax.c50 const u8 *identity, *password; local
54 password = eap_get_config_password(sm, &password_len);
55 if (!identity || !password) {
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
H A Deap_psk.c36 const u8 *identity, *password; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
H A Deap_pwd.c26 u8 *password; member in struct:eap_pwd_data
86 const u8 *identity, *password; local
90 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
123 if ((data->password = os_malloc(password_len)) == NULL) {
130 os_memcpy(data->password, password, password_len);
160 bin_clear_free(data->password, data->password_len);
265 data->password, dat
[all...]
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,

Completed in 265 milliseconds

1234567891011>>