Searched refs:password_length (Results 1 - 18 of 18) sorted by relevance

/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A Dchap.h43 chap_md5(uint8_t identifier, const uint8_t * password, int password_length,
H A Deapgtc_plugin.c69 size = sizeof(*out_pkt_p) + plugin->password_length;
96 plugin->password, plugin->password_length);
99 memcpy(out_pkt_p->type_data, plugin->password, plugin->password_length);
H A DEAPClientPlugin.h100 const uint32_t password_length; member in struct:EAPClientPluginData_s
H A DEAPKeychainUtil.c501 UInt32 password_length = 0; local
526 password_length_p = &password_length;
552 if (password_data != NULL && password_length != 0) {
555 password = CFDataCreate(NULL, password_data, password_length);
712 UInt32 password_length; local
720 password_length = CFDataGetLength(password);
725 password_length = 0;
775 password_length,
841 UInt32 password_length; local
856 password_length
[all...]
H A Dmschap.h67 uint8_t password_length[4]; member in struct:NTPasswordBlock_s
H A Deapmschapv2_plugin.c356 plugin->username, plugin->password, plugin->password_length,
448 int password_length)
452 MSChap2_MPPEGetMasterKey((const uint8_t *)password, password_length,
481 int password_length; local
502 password_length = (int)strlen(new_password);
507 password_length = plugin->password_length;
516 password_length,
542 eapmschapv2_compute_session_key(context, password, password_length);
654 plugin->password_length,
446 eapmschapv2_compute_session_key(EAPMSCHAPv2PluginDataRef context, const char * password, int password_length) argument
[all...]
H A Deapttls_plugin.c382 password_length_r = roundup(plugin->password_length, 16);
413 bcopy(plugin->password, offset, plugin->password_length);
414 if (password_length_r > plugin->password_length) {
415 bzero(offset + plugin->password_length,
416 password_length_r - plugin->password_length);
560 chap_md5(key_data[16], plugin->password, plugin->password_length,
675 plugin->password_length, response); /* NT-Response */
796 plugin->username, plugin->password, plugin->password_length,
876 if (MSChap2AuthResponseValid(plugin->password, plugin->password_length,
H A Dmd5_plugin.c83 chap_md5(in_md5_p->identifier, plugin->password, plugin->password_length,
H A DEAPOLClientItemID.c341 mach_msg_type_number_t password_length; local
362 password_length = CFDataGetLength(password_data);
366 password_length = 0;
377 password, password_length,
H A Dpeap_plugin.c360 S_set_uint32(&context->eap.plugin_data.password_length,
361 plugin->password_length);
402 S_set_uint32(&context->eap.plugin_data.password_length,
403 plugin->password_length);
H A Deapfast_plugin.c925 const uint8_t * password, int password_length,
943 password_cf = CFDataCreate(NULL, password, password_length);
1031 const uint8_t * password, int password_length,
1037 password_cf = CFDataCreate(NULL, password, password_length);
1385 S_set_uint32(&context->eap.plugin_data.password_length,
1386 plugin->password_length);
1429 S_set_uint32(&context->eap.plugin_data.password_length,
1430 plugin->password_length);
924 pac_keychain_item_create(bool system_mode, const uint8_t * password, int password_length, const uint8_t * initiator, int initiator_length) argument
1030 pac_keychain_item_update(bool system_mode, CFStringRef unique_id_str, const uint8_t * password, int password_length, const uint8_t * initiator, int initiator_length) argument
H A Dmschap.c361 bcopy(&password_len_little_endian, clear_pwblock.password_length,
/macosx-10.10.1/eap8021x-198/eapolcfg_auth.tproj/
H A Deapolcfg_auth.c223 mach_msg_type_number_t password_length,
249 password_length);
264 my_vm_deallocate((vm_address_t)password, password_length);
214 eapolclientitemid_set_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, uint32_t flags, OOBData_t name, mach_msg_type_number_t name_length, OOBData_t password, mach_msg_type_number_t password_length, int * result) argument
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSUserKeygen.c256 size_t password_length = CFDataGetLength(password); local
268 password_length, password_bytes,
/macosx-10.10.1/ppp-786.1.1/Authenticators/EAP-TLS/
H A Deaptls.c196 *((uint32_t *)&eapData.password_length) = 0;
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/
H A Dserver.c162 size_t password_length = 0; local
163 const void *password_data = xpc_dictionary_get_data(message, kSecXPCKeyUserPassword, &password_length);
165 CFDataRef user_password = CFDataCreateWithBytesNoCopy(kCFAllocatorDefault, password_data, password_length, kCFAllocatorNull);
/macosx-10.10.1/eap8021x-198/eapolclient.tproj/
H A DSupplicant.c144 int password_length; member in struct:Supplicant_s
456 S_set_uint32(&supp->eap.plugin_data.password_length,
457 supp->password_length);
502 S_set_uint32(&supp->eap.plugin_data.password_length,
503 supp->password_length);
785 supp->password_length = 0;
1082 supp->password_length = (int)strlen(supp->password);
1124 supp->password_length);
3097 supp->password_length = (int)strlen(password);
3100 supp->password_length
[all...]
/macosx-10.10.1/bootp-298/bootpd.tproj/
H A Dbsdpd.c843 escape_password(const char * password, int password_length, argument

Completed in 187 milliseconds