/external/boringssl/src/crypto/evp/ |
H A D | pbkdf_test.cc | 127 const size_t password_len = strlen(kPassword); local 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
|
H A D | pbkdf.c | 65 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, argument 75 if (!HMAC_Init_ex(&hctx, password, password_len, digest, NULL)) { 140 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, argument 144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
H A D | scrypt.c | 146 int EVP_PBE_scrypt(const char *password, size_t password_len, argument 190 if (!PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, 1, 199 if (!PKCS5_PBKDF2_HMAC(password, password_len, (const uint8_t *)B, B_bytes, 1,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; local 92 password = eap_get_config_password(sm, &password_len); 94 data->ikev2.shared_secret = os_malloc(password_len); 97 os_memcpy(data->ikev2.shared_secret, password, password_len); 98 data->ikev2.shared_secret_len = password_len;
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 121 nt_challenge_response(challenge, password, password_len, rpos); 191 size_t password_len, len; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 236 if (nt_password_hash(password, password_len, pw_hash) || 275 size_t password_len; local 278 password = eap_get_config_password(sm, &password_len); 335 size_t elen[5], password_len; local 341 password = eap_get_config_password2(sm, &password_len, [all...] |
H A D | eap_pax.c | 52 size_t identity_len, password_len; local 55 password = eap_get_config_password(sm, &password_len); 62 if (password_len != EAP_PAX_AK_LEN) {
|
H A D | eap_psk.c | 37 size_t identity_len, password_len; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) {
|
H A D | eap_sake.c | 72 size_t identity_len, password_len; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
/external/boringssl/src/crypto/curve25519/ |
H A D | spake25519.c | 335 size_t password_len) { 357 SHA512(password, password_len, password_tmp); 333 SPAKE2_generate_msg(SPAKE2_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *password, size_t password_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 89 const u8 *password, size_t password_len, 206 eap_pwd_h_update(hash, password, password_len); 88 compute_password_element(EAP_PWD_group *grp, u16 num, const u8 *password, size_t password_len, const u8 *id_server, size_t id_server_len, const u8 *id_peer, size_t id_peer_len, const u8 *token) argument
|