/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | pkcs5.c | 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen() 429 if (pw_len) { in pkcs12_key_gen() 431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 493 size_t pw_len; in pkcs12_crypto_init_sha1() local 500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 504 if (pw_len) { in pkcs12_crypto_init_sha1() 505 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1() 507 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | pkcs5.c | 422 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 442 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen() 451 if (pw_len) { in pkcs12_key_gen() 453 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 515 size_t pw_len; in pkcs12_crypto_init_sha1() local 522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 523 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 526 if (pw_len) { in pkcs12_crypto_init_sha1() 527 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1() 529 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | sae_pk.c | 145 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() local 155 if (pw_len < 14 || pw_len % 5 != 4) { in sae_pk_valid_password() 177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password() 185 for (i = 5; i < pw_len; i += 5) { in sae_pk_valid_password() 362 size_t len, pw_len; in sae_pk_set_password() local 378 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password() 392 wpa_hexdump_key(MSG_DEBUG, "SAE-PK: PasswordBase", pw, pw_len); in sae_pk_set_password() 395 sae_pk_buf_shift_left_1(pw, pw_len); /* Sec_1b */ in sae_pk_set_password() 397 sae_pk_buf_shift_left_19(pw, pw_len); in sae_pk_set_password() 416 bin_clear_free(pw, pw_len); in sae_pk_set_password()
|
D | common_module_tests.c | 550 size_t pw_len = os_strlen(pw); in sae_pk_tests() local 551 size_t bits = (pw_len - pw_len / 5) * 5; in sae_pk_tests() 562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ecjpake.function | 135 const size_t pw_len = 0; 140 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 ); 156 const size_t pw_len = 0; 161 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 ); 175 const size_t pw_len = 0; 180 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 ); 200 const size_t pw_len = 0; 205 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
|
/third_party/curl/lib/ |
D | smb.h | 157 unsigned short pw_len; member
|
D | smb.c | 509 msg.pw_len = 0; in smb_send_tree_connect()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 1165 size_t pw_len; in radius_server_macacl() local 1170 &pw_len, NULL) < 0) { in radius_server_macacl() 1193 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 1332 size_t pw_len; in radius_server_macacl() local 1337 &pw_len, NULL) < 0) { in radius_server_macacl() 1360 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 3433 size_t pw_len );
|
/third_party/mbedtls/library/ |
D | ssl_tls.c | 3727 size_t pw_len ) in mbedtls_ssl_set_hs_ecjpake_password() argument 3743 pw, pw_len ) ); in mbedtls_ssl_set_hs_ecjpake_password()
|