/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_otp.c | 34 size_t password_len, len; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_leap.c | 67 size_t identity_len, password_len, len; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 121 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request() 191 size_t password_len, len; in eap_leap_process_response() local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 236 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() 275 size_t password_len; in eap_leap_process() local 278 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 335 size_t elen[5], password_len; in eap_leap_getKey() local 341 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_getKey() [all …]
|
D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 98 plen = password_len; in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
|
D | eap_mschapv2.c | 156 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 163 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 208 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply() 306 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 311 config->password_len = 16; in eap_mschapv2_password_changed() 317 config->password_len); in eap_mschapv2_password_changed() 319 config->password_len = 0; in eap_mschapv2_password_changed() 325 config->password_len = config->new_password_len; in eap_mschapv2_password_changed() 522 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 529 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password() [all …]
|
D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 38 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_ttls.c | 487 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() 493 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2() 542 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 581 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() 587 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap() 631 nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap() 634 password, password_len); in eap_ttls_phase2_request_mschap() 665 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local 670 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap() 674 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap() [all …]
|
D | eap_vendor_test.c | 35 size_t password_len; in eap_vendor_test_init() local 43 password = eap_get_config_password(sm, &password_len); in eap_vendor_test_init() 44 data->test_pending_req = password && password_len == 7 && in eap_vendor_test_init()
|
D | eap_pwd.c | 28 size_t password_len; member 89 size_t identity_len, password_len; in eap_pwd_init() local 93 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init() 126 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init() 133 os_memcpy(data->password, password, password_len); in eap_pwd_init() 134 data->password_len = password_len; in eap_pwd_init() 164 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit() 224 size_t password_len; in eap_pwd_perform_id_exchange() local 303 data->password_len, pwhash); in eap_pwd_perform_id_exchange() 315 password_len = sizeof(pwhashhash); in eap_pwd_perform_id_exchange() [all …]
|
D | eap_ikev2.c | 62 size_t identity_len, password_len; in eap_ikev2_init() local 92 password = eap_get_config_password(sm, &password_len); in eap_ikev2_init() 94 data->ikev2.shared_secret = os_malloc(password_len); in eap_ikev2_init() 97 os_memcpy(data->ikev2.shared_secret, password, password_len); in eap_ikev2_init() 98 data->ikev2.shared_secret_len = password_len; in eap_ikev2_init()
|
D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
D | eap_gpsk.c | 83 size_t identity_len, password_len; in eap_gpsk_init() local 86 password = eap_get_config_password(sm, &password_len); in eap_gpsk_init() 120 data->psk = os_malloc(password_len); in eap_gpsk_init() 125 os_memcpy(data->psk, password, password_len); in eap_gpsk_init() 126 data->psk_len = password_len; in eap_gpsk_init()
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 170 const u8 *password, size_t password_len, in generate_nt_response() argument 178 nt_password_hash(password, password_len, password_hash)) in generate_nt_response() 280 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 287 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 304 size_t password_len, u8 *response) in nt_challenge_response() argument 307 if (nt_password_hash(password, password_len, password_hash)) in nt_challenge_response() 428 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 436 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash() [all …]
|
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 87 user->password_len = os_strlen(argv[i]); in get_user_cb() 120 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 121 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 122 user->password_len = os_strlen(argv[id]); in get_wildcard_cb() 168 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get() 209 user->identity_len = user->password_len; in eap_user_sqlite_get() 211 user->password_len = 0; in eap_user_sqlite_get() 247 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
|
D | authsrv.c | 74 user->password = os_malloc(eap_user->password_len); in hostapd_radius_get_eap_user() 78 eap_user->password_len); in hostapd_radius_get_eap_user() 79 user->password_len = eap_user->password_len; in hostapd_radius_get_eap_user()
|
/external/boringssl/src/crypto/evp/ |
D | pbkdf.c | 65 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, in PKCS5_PBKDF2_HMAC() argument 75 if (!HMAC_Init_ex(&hctx, password, password_len, digest, NULL)) { in PKCS5_PBKDF2_HMAC() 140 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, in PKCS5_PBKDF2_HMAC_SHA1() argument 144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, in PKCS5_PBKDF2_HMAC_SHA1()
|
D | pbkdf_test.cc | 127 const size_t password_len = strlen(kPassword); in TEST() local 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt.c | 146 int EVP_PBE_scrypt(const char *password, size_t password_len, in EVP_PBE_scrypt() argument 190 if (!PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, 1, in EVP_PBE_scrypt() 199 if (!PKCS5_PBKDF2_HMAC(password, password_len, (const uint8_t *)B, B_bytes, 1, in EVP_PBE_scrypt()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 234 size_t password_len; member 321 &wrapped_value, ctx->password, ctx->password_len); in PKCS12_handle_safe_bag() 441 ctx->password_len, CBS_data(&encrypted_contents), in PKCS12_handle_content_info() 548 ctx.password_len = password != NULL ? strlen(password) : 0; in PKCS12_get_key_and_certs() 580 if (!pkcs12_key_gen(ctx.password, ctx.password_len, CBS_data(&salt), in PKCS12_get_key_and_certs() 760 int password_len) { in PKCS12_verify_mac() argument 762 if (password_len != 0) { in PKCS12_verify_mac() 765 } else if (password_len != -1 && in PKCS12_verify_mac() 766 (password[password_len] != 0 || in PKCS12_verify_mac() 767 OPENSSL_memchr(password, 0, password_len) != NULL)) { in PKCS12_verify_mac()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 262 size_t password_len = dlen; in eap_ttls_avp_parse() local 263 while (password_len > 0 && in eap_ttls_avp_parse() 264 password[password_len - 1] == '\0') { in eap_ttls_avp_parse() 265 password_len--; in eap_ttls_avp_parse() 269 password, password_len); in eap_ttls_avp_parse() 271 parse->user_password_len = password_len; in eap_ttls_avp_parse() 541 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap() 560 size_t password_len) in eap_ttls_process_phase2_chap() argument 566 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { in eap_ttls_process_phase2_chap() 570 (unsigned long) password_len); in eap_ttls_process_phase2_chap() [all …]
|
D | eap_server_pwd.c | 27 size_t password_len; member 88 sm->user->password_len == 0) { in eap_pwd_init() 107 data->password = os_malloc(sm->user->password_len); in eap_pwd_init() 115 data->password_len = sm->user->password_len; in eap_pwd_init() 116 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init() 122 bin_clear_free(data->password, data->password_len); in eap_pwd_init() 150 bin_clear_free(data->password, data->password_len); in eap_pwd_reset() 592 size_t password_len; in eap_pwd_process_id_resp() local 634 password_len = sizeof(pwhashhash); in eap_pwd_process_id_resp() 637 password_len = data->password_len; in eap_pwd_process_id_resp() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | sae.c | 420 size_t password_len) in sae_derive_pwe_ecc() argument 435 dummy_password_len = password_len; in sae_derive_pwe_ecc() 456 password, password_len); in sae_derive_pwe_ecc() 467 len[0] = password_len; in sae_derive_pwe_ecc() 547 size_t password_len) in sae_derive_pwe_ffc() argument 562 password, password_len); in sae_derive_pwe_ffc() 572 len[0] = password_len; in sae_derive_pwe_ffc() 698 const u8 *password, size_t password_len, in sae_prepare_commit() argument 703 password_len) < 0) || in sae_prepare_commit() 705 password_len) < 0) || in sae_prepare_commit()
|
/external/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 335 size_t password_len) { in SPAKE2_generate_msg() argument 357 SHA512(password, password_len, password_tmp); in SPAKE2_generate_msg()
|
/external/boringssl/src/include/openssl/ |
D | evp.h | 423 OPENSSL_EXPORT int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, 431 size_t password_len, 444 OPENSSL_EXPORT int EVP_PBE_scrypt(const char *password, size_t password_len,
|