Home
last modified time | relevance | path

Searched refs:password_len (Results 1 – 25 of 62) sorted by relevance

123

/external/wpa_supplicant_8/src/eap_peer/
Deap_otp.c34 size_t password_len, len; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
65 password, password_len); in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
Deap_leap.c67 size_t identity_len, password_len, len; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
195 size_t password_len, len; in eap_leap_process_response() local
200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response()
282 size_t password_len; in eap_leap_process() local
285 password = eap_get_config_password(sm, &password_len); in eap_leap_process()
342 size_t elen[5], password_len; in eap_leap_getKey() local
348 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_getKey()
[all …]
Deap_gtc.c51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process()
81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process()
98 plen = password_len; in eap_gtc_process()
113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
Deap_mschapv2.c154 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local
161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
206 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply()
304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed()
309 config->password_len = 16; in eap_mschapv2_password_changed()
315 config->password_len); in eap_mschapv2_password_changed()
317 config->password_len = 0; in eap_mschapv2_password_changed()
323 config->password_len = config->new_password_len; in eap_mschapv2_password_changed()
520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password()
527 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password()
[all …]
Deap_md5.c36 size_t len, challenge_len, password_len; in eap_md5_process() local
38 password = eap_get_config_password(sm, &password_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
Deap_ttls.c487 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2()
493 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2()
542 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
581 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap()
587 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap()
640 if (nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap()
650 password, password_len); in eap_ttls_phase2_request_mschap()
681 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local
686 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap()
690 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap()
[all …]
Deap_pwd.c28 size_t password_len; member
89 size_t identity_len, password_len; in eap_pwd_init() local
93 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init()
126 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init()
133 os_memcpy(data->password, password, password_len); in eap_pwd_init()
134 data->password_len = password_len; in eap_pwd_init()
164 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit()
222 size_t password_len; in eap_pwd_perform_id_exchange() local
301 data->password_len, pwhash); in eap_pwd_perform_id_exchange()
313 password_len = sizeof(pwhashhash); in eap_pwd_perform_id_exchange()
[all …]
Deap_vendor_test.c35 size_t password_len; in eap_vendor_test_init() local
43 password = eap_get_config_password(sm, &password_len); in eap_vendor_test_init()
44 data->test_pending_req = password && password_len == 7 && in eap_vendor_test_init()
Deap_ikev2.c62 size_t identity_len, password_len; in eap_ikev2_init() local
91 password = eap_get_config_password(sm, &password_len); in eap_ikev2_init()
93 data->ikev2.shared_secret = os_memdup(password, password_len); in eap_ikev2_init()
96 data->ikev2.shared_secret_len = password_len; in eap_ikev2_init()
Dmschapv2.h19 const u8 *password, size_t password_len,
Deap_eke.c72 size_t identity_len, password_len; in eap_eke_init() local
75 password = eap_get_config_password(sm, &password_len); in eap_eke_init()
366 size_t password_len; in eap_eke_process_commit() local
377 password = eap_get_config_password(sm, &password_len); in eap_eke_process_commit()
403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit()
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
173 const u8 *password, size_t password_len, in generate_nt_response() argument
181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response()
283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response()
307 size_t password_len, u8 *response) in nt_challenge_response() argument
311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response()
432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
[all …]
Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
/external/wpa_supplicant_8/src/ap/
Deap_user_db.c86 bin_clear_free(user->password, user->password_len); in get_user_cb()
87 user->password_len = os_strlen(argv[i]); in get_user_cb()
120 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
121 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
122 user->password_len = os_strlen(argv[id]); in get_wildcard_cb()
168 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get()
209 user->identity_len = user->password_len; in eap_user_sqlite_get()
211 user->password_len = 0; in eap_user_sqlite_get()
247 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
Dauthsrv.c75 eap_user->password_len); in hostapd_radius_get_eap_user()
78 user->password_len = eap_user->password_len; in hostapd_radius_get_eap_user()
/external/boringssl/src/crypto/evp/
Dpbkdf.c65 int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, in PKCS5_PBKDF2_HMAC() argument
75 if (!HMAC_Init_ex(&hctx, password, password_len, digest, NULL)) { in PKCS5_PBKDF2_HMAC()
140 int PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, in PKCS5_PBKDF2_HMAC_SHA1() argument
144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, in PKCS5_PBKDF2_HMAC_SHA1()
Dpbkdf_test.cc127 const size_t password_len = strlen(kPassword); in TEST() local
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt.c146 int EVP_PBE_scrypt(const char *password, size_t password_len, in EVP_PBE_scrypt() argument
190 if (!PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, 1, in EVP_PBE_scrypt()
199 if (!PKCS5_PBKDF2_HMAC(password, password_len, (const uint8_t *)B, B_bytes, 1, in EVP_PBE_scrypt()
/external/boringssl/src/crypto/pkcs8/
Dpkcs8_x509.c233 size_t password_len; member
320 &wrapped_value, ctx->password, ctx->password_len); in PKCS12_handle_safe_bag()
440 ctx->password_len, CBS_data(&encrypted_contents), in PKCS12_handle_content_info()
547 ctx.password_len = password != NULL ? strlen(password) : 0; in PKCS12_get_key_and_certs()
579 if (!pkcs12_key_gen(ctx.password, ctx.password_len, CBS_data(&salt), in PKCS12_get_key_and_certs()
759 int password_len) { in PKCS12_verify_mac() argument
761 if (password_len != 0) { in PKCS12_verify_mac()
764 } else if (password_len != -1 && in PKCS12_verify_mac()
765 (password[password_len] != 0 || in PKCS12_verify_mac()
766 OPENSSL_memchr(password, 0, password_len) != NULL)) { in PKCS12_verify_mac()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_ttls.c261 size_t password_len = dlen; in eap_ttls_avp_parse() local
262 while (password_len > 0 && in eap_ttls_avp_parse()
263 password[password_len - 1] == '\0') { in eap_ttls_avp_parse()
264 password_len--; in eap_ttls_avp_parse()
268 password, password_len); in eap_ttls_avp_parse()
270 parse->user_password_len = password_len; in eap_ttls_avp_parse()
540 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap()
559 size_t password_len) in eap_ttls_process_phase2_chap() argument
565 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { in eap_ttls_process_phase2_chap()
569 (unsigned long) password_len); in eap_ttls_process_phase2_chap()
[all …]
Deap_server_pwd.c27 size_t password_len; member
88 sm->user->password_len == 0) { in eap_pwd_init()
107 data->password = os_malloc(sm->user->password_len); in eap_pwd_init()
115 data->password_len = sm->user->password_len; in eap_pwd_init()
116 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init()
122 bin_clear_free(data->password, data->password_len); in eap_pwd_init()
150 bin_clear_free(data->password, data->password_len); in eap_pwd_reset()
592 size_t password_len; in eap_pwd_process_id_resp() local
634 password_len = sizeof(pwhashhash); in eap_pwd_process_id_resp()
637 password_len = data->password_len; in eap_pwd_process_id_resp()
[all …]
/external/wpa_supplicant_8/src/common/
Dsae.c420 size_t password_len) in sae_derive_pwe_ecc() argument
435 dummy_password_len = password_len; in sae_derive_pwe_ecc()
456 password, password_len); in sae_derive_pwe_ecc()
467 len[0] = password_len; in sae_derive_pwe_ecc()
547 size_t password_len) in sae_derive_pwe_ffc() argument
562 password, password_len); in sae_derive_pwe_ffc()
572 len[0] = password_len; in sae_derive_pwe_ffc()
698 const u8 *password, size_t password_len, in sae_prepare_commit() argument
703 password_len) < 0) || in sae_prepare_commit()
705 password_len) < 0) || in sae_prepare_commit()
/external/boringssl/src/include/openssl/
Devp.h419 OPENSSL_EXPORT int PKCS5_PBKDF2_HMAC(const char *password, size_t password_len,
427 size_t password_len,
440 OPENSSL_EXPORT int EVP_PBE_scrypt(const char *password, size_t password_len,
/external/boringssl/src/crypto/curve25519/
Dspake25519.c361 size_t password_len) { in SPAKE2_generate_msg() argument
383 SHA512(password, password_len, password_tmp); in SPAKE2_generate_msg()

123