HomeSort by: relevance | last modified time | path
    Searched defs:password_len (Results 1 - 24 of 24) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_peer/
eap_md5.c 36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_otp.c 34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
eap_vendor_test.c 35 size_t password_len; local
43 password = eap_get_config_password(sm, &password_len);
44 data->test_pending_req = password && password_len == 7 &&
eap_ikev2.c 62 size_t identity_len, password_len; local
91 password = eap_get_config_password(sm, &password_len);
93 data->ikev2.shared_secret = os_memdup(password, password_len);
96 data->ikev2.shared_secret_len = password_len;
eap_leap.c 67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
120 nt_challenge_response(challenge, password, password_len, rpos))) {
195 size_t password_len, len; local
200 password = eap_get_config_password2(sm, &password_len, &pwhash);
240 if (nt_password_hash(password, password_len, pw_hash) ||
282 size_t password_len; local
285 password = eap_get_config_password(sm, &password_len);
342 size_t elen[5], password_len; local
348 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_pax.c 52 size_t identity_len, password_len; local
55 password = eap_get_config_password(sm, &password_len);
62 if (password_len != EAP_PAX_AK_LEN) {
eap_psk.c 37 size_t identity_len, password_len; local
39 password = eap_get_config_password(sm, &password_len);
40 if (!password || password_len != 16) {
eap_sake.c 72 size_t identity_len, password_len; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
eap_config.h 373 * password_len - Length of password field
375 size_t password_len; member in struct:eap_peer_config
eap_eke.c 72 size_t identity_len, password_len; local
75 password = eap_get_config_password(sm, &password_len);
366 size_t password_len; local
377 password = eap_get_config_password(sm, &password_len);
403 if (eap_eke_derive_key(&data->sess, password, password_len,
eap_gpsk.c 83 size_t identity_len, password_len; local
86 password = eap_get_config_password(sm, &password_len);
119 data->psk = os_memdup(password, password_len);
124 data->psk_len = password_len;
eap_mschapv2.c 160 size_t identity_len, password_len; local
167 password = eap_get_config_password2(sm, &password_len, &pwhash);
212 password_len, pwhash, auth_challenge,
310 bin_clear_free(config->password, config->password_len);
315 config->password_len = 16;
321 config->password_len);
323 config->password_len = 0;
329 config->password_len = config->new_password_len;
526 size_t username_len, password_len, new_password_len;
533 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_pwd.c 31 size_t password_len; member in struct:eap_pwd_data
96 size_t identity_len, password_len; local
101 password = eap_get_config_password2(sm, &password_len, &pwhash);
127 if ((data->password = os_malloc(password_len)) == NULL) {
133 os_memcpy(data->password, password, password_len);
134 data->password_len = password_len;
190 bin_clear_free(data->password, data->password_len);
364 size_t password_len; local
409 data->password_len, pwhash)
    [all...]
eap_teap.c 605 size_t identity_len, password_len, plen; local
613 password = eap_get_config_password(sm, &password_len);
615 identity_len > 255 || password_len > 255) {
621 plen = 1 + identity_len + 1 + password_len;
628 wpabuf_put_u8(resp, password_len);
629 wpabuf_put_data(resp, password, password_len);
eap_ttls.c 543 size_t identity_len, password_len;
549 password = eap_get_config_password2(sm, &password_len, &pwhash);
598 password_len, pwhash, challenge,
637 size_t identity_len, password_len;
643 password = eap_get_config_password2(sm, &password_len, &pwhash);
696 if (nt_challenge_response(challenge, password, password_len,
706 password, password_len);
737 size_t identity_len, password_len; local
742 password = eap_get_config_password(sm, &password_len);
746 msg = wpabuf_alloc(identity_len + password_len + 100)
    [all...]
eap.c 2827 size_t password_len; local
2831 password_len = config->machine_password_len;
2834 password_len = config->password_len;
2840 name = os_zalloc(password_len + 1);
2843 os_memcpy(name, password, password_len);
2881 *len = config->password_len;
2922 *len = config->password_len;
  /src/crypto/external/apache2/openssl/dist/crypto/
passphrase.c 310 size_t password_len = 0; local
317 if (ossl_pw_get_passphrase(buf, (size_t)size, &password_len, params,
319 return (int)password_len;
  /src/crypto/external/bsd/openssl/dist/crypto/
passphrase.c 318 size_t password_len = 0; local
325 if (ossl_pw_get_passphrase(buf, (size_t)size, &password_len, params,
327 return (int)password_len;
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_pwd.c 28 size_t password_len; member in struct:eap_pwd_data
90 sm->user->password_len == 0) {
109 data->password = os_malloc(sm->user->password_len);
117 data->password_len = sm->user->password_len;
118 os_memcpy(data->password, sm->user->password, data->password_len);
128 bin_clear_free(data->password, data->password_len);
155 bin_clear_free(data->password, data->password_len);
193 data->password, data->password_len);
203 switch (data->password_len) {
585 size_t password_len; local
    [all...]
eap.h 31 size_t password_len; member in struct:eap_user
eap_server_ttls.c 261 size_t password_len = dlen; local
262 while (password_len > 0 &&
263 password[password_len - 1] == '\0') {
264 password_len--;
268 password, password_len);
270 parse->user_password_len = password_len;
542 if (sm->user->password_len != user_password_len ||
561 size_t password_len)
567 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
571 (unsigned long) password_len);
    [all...]
  /src/external/bsd/wpa/dist/src/common/
dpp_crypto.c 165 const u8 *password, size_t password_len,
188 if (dpp_hmac_vector(hash_len, password, password_len, 2, addr, len,
194 if (dpp_hmac(hash_len, password, password_len, tmp, hash_len,
206 int dpp_pbkdf2(size_t hash_len, const u8 *password, size_t password_len,
217 if (dpp_pbkdf2_f(hash_len, password, password_len,
2090 size_t password_len = 0; local
2119 password = base64_encode_no_lf(cp, DPP_CP_LEN, &password_len);
2124 password_len))
2145 bin_clear_free(password, password_len);
  /src/external/bsd/wpa/dist/src/ap/
ap_config.h 184 size_t password_len; member in struct:hostapd_eap_user

Completed in 66 milliseconds