Searched refs:pw_len (Results 1 - 9 of 9) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs5.c | 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen() 429 if (pw_len) { in pkcs12_key_gen() 431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 493 size_t pw_len; in pkcs12_crypto_init_sha1() local 500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 504 if (pw_len) { in pkcs12_crypto_init_sha1() 505 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1() 507 pw_len in pkcs12_crypto_init_sha1() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 422 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 442 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen() 451 if (pw_len) { in pkcs12_key_gen() 453 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 515 size_t pw_len; in pkcs12_crypto_init_sha1() local 522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 523 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 526 if (pw_len) { in pkcs12_crypto_init_sha1() 527 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1() 529 pw_len in pkcs12_crypto_init_sha1() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae_pk.c | 145 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() local 155 if (pw_len < 14 || pw_len % 5 != 4) { in sae_pk_valid_password() 177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password() 185 for (i = 5; i < pw_len; i += 5) { in sae_pk_valid_password() 362 size_t len, pw_len; in sae_pk_set_password() local 378 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password() 392 wpa_hexdump_key(MSG_DEBUG, "SAE-PK: PasswordBase", pw, pw_len); in sae_pk_set_password() 395 sae_pk_buf_shift_left_1(pw, pw_len); /* Sec_1 in sae_pk_set_password() [all...] |
H A D | common_module_tests.c | 554 size_t pw_len = os_strlen(pw); in sae_pk_tests() local 555 size_t bits = (pw_len - pw_len / 5) * 5; in sae_pk_tests() 566 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests()
|
/third_party/curl/lib/ |
H A D | smb.c | 157 unsigned short pw_len; member 694 msg.pw_len = 0; in smb_send_tree_connect()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_server.c | 1332 size_t pw_len; in radius_server_macacl() local 1337 &pw_len, NULL) < 0) { in radius_server_macacl() 1360 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_server.c | 1165 size_t pw_len; in radius_server_macacl() local 1170 &pw_len, NULL) < 0) { in radius_server_macacl() 1193 if (res < 0 || pw_len != (size_t) res || in radius_server_macacl()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 2023 size_t pw_len) in mbedtls_ssl_set_hs_ecjpake_password() 2033 if ((pw == NULL) || (pw_len == 0)) { in mbedtls_ssl_set_hs_ecjpake_password() 2041 status = psa_import_key(&attributes, pw, pw_len, in mbedtls_ssl_set_hs_ecjpake_password() 2082 size_t pw_len) in mbedtls_ssl_set_hs_ecjpake_password() 2091 if ((pw == NULL) || (pw_len == 0)) { in mbedtls_ssl_set_hs_ecjpake_password() 2105 pw, pw_len); in mbedtls_ssl_set_hs_ecjpake_password() 2021 mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl, const unsigned char *pw, size_t pw_len) mbedtls_ssl_set_hs_ecjpake_password() argument 2080 mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl, const unsigned char *pw, size_t pw_len) mbedtls_ssl_set_hs_ecjpake_password() argument
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 4116 * \param pw_len length of pw in bytes 4122 size_t pw_len);
|
Completed in 28 milliseconds