Home
last modified time | relevance | path

Searched refs:pw_len (Results 1 – 11 of 11) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dpkcs5.c400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument
420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen()
429 if (pw_len) { in pkcs12_key_gen()
431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen()
493 size_t pw_len; in pkcs12_crypto_init_sha1() local
500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1()
504 if (pw_len) { in pkcs12_crypto_init_sha1()
505 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1()
507 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dpkcs5.c422 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument
442 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen()
451 if (pw_len) { in pkcs12_key_gen()
453 *pos++ = pw[i % pw_len]; in pkcs12_key_gen()
515 size_t pw_len; in pkcs12_crypto_init_sha1() local
522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
523 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1()
526 if (pw_len) { in pkcs12_crypto_init_sha1()
527 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1()
529 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dsae_pk.c145 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() local
155 if (pw_len < 14 || pw_len % 5 != 4) { in sae_pk_valid_password()
177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password()
185 for (i = 5; i < pw_len; i += 5) { in sae_pk_valid_password()
362 size_t len, pw_len; in sae_pk_set_password() local
378 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password()
392 wpa_hexdump_key(MSG_DEBUG, "SAE-PK: PasswordBase", pw, pw_len); in sae_pk_set_password()
395 sae_pk_buf_shift_left_1(pw, pw_len); /* Sec_1b */ in sae_pk_set_password()
397 sae_pk_buf_shift_left_19(pw, pw_len); in sae_pk_set_password()
416 bin_clear_free(pw, pw_len); in sae_pk_set_password()
Dcommon_module_tests.c550 size_t pw_len = os_strlen(pw); in sae_pk_tests() local
551 size_t bits = (pw_len - pw_len / 5) * 5; in sae_pk_tests()
562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests()
/third_party/mbedtls/tests/suites/
Dtest_suite_ecjpake.function135 const size_t pw_len = 0;
140 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
156 const size_t pw_len = 0;
161 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
175 const size_t pw_len = 0;
180 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
200 const size_t pw_len = 0;
205 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
/third_party/curl/lib/
Dsmb.h157 unsigned short pw_len; member
Dsmb.c509 msg.pw_len = 0; in smb_send_tree_connect()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius_server.c1165 size_t pw_len; in radius_server_macacl() local
1170 &pw_len, NULL) < 0) { in radius_server_macacl()
1193 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius_server.c1332 size_t pw_len; in radius_server_macacl() local
1337 &pw_len, NULL) < 0) { in radius_server_macacl()
1360 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
/third_party/mbedtls/include/mbedtls/
Dssl.h3433 size_t pw_len );
/third_party/mbedtls/library/
Dssl_tls.c3727 size_t pw_len ) in mbedtls_ssl_set_hs_ecjpake_password() argument
3743 pw, pw_len ) ); in mbedtls_ssl_set_hs_ecjpake_password()