| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
| eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
| eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
| eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
| eap_ikev2.c | 62 size_t identity_len, password_len; local 91 password = eap_get_config_password(sm, &password_len); 93 data->ikev2.shared_secret = os_memdup(password, password_len); 96 data->ikev2.shared_secret_len = password_len;
|
| eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 120 nt_challenge_response(challenge, password, password_len, rpos))) { 195 size_t password_len, len; local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); 240 if (nt_password_hash(password, password_len, pw_hash) || 282 size_t password_len; local 285 password = eap_get_config_password(sm, &password_len); 342 size_t elen[5], password_len; local 348 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
| eap_pax.c | 52 size_t identity_len, password_len; local 55 password = eap_get_config_password(sm, &password_len); 62 if (password_len != EAP_PAX_AK_LEN) {
|
| eap_psk.c | 37 size_t identity_len, password_len; local 39 password = eap_get_config_password(sm, &password_len); 40 if (!password || password_len != 16) {
|
| eap_sake.c | 72 size_t identity_len, password_len; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
| eap_config.h | 373 * password_len - Length of password field 375 size_t password_len; member in struct:eap_peer_config
|
| eap_eke.c | 72 size_t identity_len, password_len; local 75 password = eap_get_config_password(sm, &password_len); 366 size_t password_len; local 377 password = eap_get_config_password(sm, &password_len); 403 if (eap_eke_derive_key(&data->sess, password, password_len,
|
| eap_gpsk.c | 83 size_t identity_len, password_len; local 86 password = eap_get_config_password(sm, &password_len); 119 data->psk = os_memdup(password, password_len); 124 data->psk_len = password_len;
|
| eap_mschapv2.c | 160 size_t identity_len, password_len; local 167 password = eap_get_config_password2(sm, &password_len, &pwhash); 212 password_len, pwhash, auth_challenge, 310 bin_clear_free(config->password, config->password_len); 315 config->password_len = 16; 321 config->password_len); 323 config->password_len = 0; 329 config->password_len = config->new_password_len; 526 size_t username_len, password_len, new_password_len; 533 password = eap_get_config_password2(sm, &password_len, &pwhash) [all...] |
| eap_pwd.c | 31 size_t password_len; member in struct:eap_pwd_data 96 size_t identity_len, password_len; local 101 password = eap_get_config_password2(sm, &password_len, &pwhash); 127 if ((data->password = os_malloc(password_len)) == NULL) { 133 os_memcpy(data->password, password, password_len); 134 data->password_len = password_len; 190 bin_clear_free(data->password, data->password_len); 364 size_t password_len; local 409 data->password_len, pwhash) [all...] |
| eap_teap.c | 605 size_t identity_len, password_len, plen; local 613 password = eap_get_config_password(sm, &password_len); 615 identity_len > 255 || password_len > 255) { 621 plen = 1 + identity_len + 1 + password_len; 628 wpabuf_put_u8(resp, password_len); 629 wpabuf_put_data(resp, password, password_len);
|
| eap_ttls.c | 543 size_t identity_len, password_len; 549 password = eap_get_config_password2(sm, &password_len, &pwhash); 598 password_len, pwhash, challenge, 637 size_t identity_len, password_len; 643 password = eap_get_config_password2(sm, &password_len, &pwhash); 696 if (nt_challenge_response(challenge, password, password_len, 706 password, password_len); 737 size_t identity_len, password_len; local 742 password = eap_get_config_password(sm, &password_len); 746 msg = wpabuf_alloc(identity_len + password_len + 100) [all...] |
| eap.c | 2827 size_t password_len; local 2831 password_len = config->machine_password_len; 2834 password_len = config->password_len; 2840 name = os_zalloc(password_len + 1); 2843 os_memcpy(name, password, password_len); 2881 *len = config->password_len; 2922 *len = config->password_len;
|
| /src/crypto/external/apache2/openssl/dist/crypto/ |
| passphrase.c | 310 size_t password_len = 0; local 317 if (ossl_pw_get_passphrase(buf, (size_t)size, &password_len, params, 319 return (int)password_len;
|
| /src/crypto/external/bsd/openssl/dist/crypto/ |
| passphrase.c | 318 size_t password_len = 0; local 325 if (ossl_pw_get_passphrase(buf, (size_t)size, &password_len, params, 327 return (int)password_len;
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_pwd.c | 28 size_t password_len; member in struct:eap_pwd_data 90 sm->user->password_len == 0) { 109 data->password = os_malloc(sm->user->password_len); 117 data->password_len = sm->user->password_len; 118 os_memcpy(data->password, sm->user->password, data->password_len); 128 bin_clear_free(data->password, data->password_len); 155 bin_clear_free(data->password, data->password_len); 193 data->password, data->password_len); 203 switch (data->password_len) { 585 size_t password_len; local [all...] |
| eap.h | 31 size_t password_len; member in struct:eap_user
|
| eap_server_ttls.c | 261 size_t password_len = dlen; local 262 while (password_len > 0 && 263 password[password_len - 1] == '\0') { 264 password_len--; 268 password, password_len); 270 parse->user_password_len = password_len; 542 if (sm->user->password_len != user_password_len || 561 size_t password_len) 567 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 571 (unsigned long) password_len); [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_crypto.c | 165 const u8 *password, size_t password_len, 188 if (dpp_hmac_vector(hash_len, password, password_len, 2, addr, len, 194 if (dpp_hmac(hash_len, password, password_len, tmp, hash_len, 206 int dpp_pbkdf2(size_t hash_len, const u8 *password, size_t password_len, 217 if (dpp_pbkdf2_f(hash_len, password, password_len, 2090 size_t password_len = 0; local 2119 password = base64_encode_no_lf(cp, DPP_CP_LEN, &password_len); 2124 password_len)) 2145 bin_clear_free(password, password_len);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ap_config.h | 184 size_t password_len; member in struct:hostapd_eap_user
|