Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 29) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Dmschapv2.c34 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
62 password, password_len); in mschapv2_derive_response()
65 password, nt_response) || in mschapv2_derive_response()
67 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
73 password, password_len); in mschapv2_derive_response()
76 password, password_len, in mschapv2_derive_response()
78 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
93 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response()
96 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
Deap_mschapv2.c140 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local
146 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
147 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply()
189 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply()
288 os_free(config->password); in eap_mschapv2_password_changed()
292 config->password = os_malloc(16); in eap_mschapv2_password_changed()
294 if (config->password) { in eap_mschapv2_password_changed()
297 config->password); in eap_mschapv2_password_changed()
301 config->password = config->new_password; in eap_mschapv2_password_changed()
477 const u8 *username, *password, *new_password; in eap_mschapv2_change_password() local
[all …]
Deap_ttls.c423 const u8 *identity, *password; in eap_ttls_phase2_request_mschapv2()
430 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2()
431 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschapv2()
477 if (mschapv2_derive_response(identity, identity_len, password, in eap_ttls_phase2_request_mschapv2()
527 const u8 *identity, *password; in eap_ttls_phase2_request_mschap()
534 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap()
535 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschap()
574 challenge_response(challenge, password, pos); /* NT-Response */ in eap_ttls_phase2_request_mschap()
576 password, 16); in eap_ttls_phase2_request_mschap()
578 nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap()
[all …]
Dmschapv2.h16 const u8 *password, size_t password_len,
Deap.c519 sm->config.password = NULL; in eap_peer_config_init()
553 sm->config.password = (u8 *)os_zalloc(sm->config.password_len); in eap_peer_config_init()
554 if (sm->config.password == NULL) in eap_peer_config_init()
556 os_memcpy(sm->config.password, g_wpa_password, sm->config.password_len); in eap_peer_config_init()
645 os_free(sm->config.password); in eap_peer_config_deinit()
873 return config->password; in eap_get_config_password()
895 return config->password; in eap_get_config_password2()
Deap_config.h65 u8 *password; member
/hal_espressif-latest/components/esp_wifi/src/
Dsmartconfig.c32 uint8_t password[65] = { 0 }; in handler_got_ssid_passwd() local
37 memcpy(password, evt->password, sizeof(evt->password)); in handler_got_ssid_passwd()
41 ESP_LOGD(TAG, "PASSWORD:%s", password); in handler_got_ssid_passwd()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
Dms_funcs.c109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
173 const u8 *password, size_t password_len, in generate_nt_response() argument
181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response()
283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response()
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument
311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response()
432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Deap_user_db.c86 bin_clear_free(user->password, user->password_len); in get_user_cb()
88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb()
122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb()
170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
217 user->password = NULL; in eap_user_sqlite_get()
253 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
Dieee802_11.c39 const char *password = NULL; in sae_get_password() local
42 if (!password) { in sae_get_password()
43 password = hapd->conf->ssid.wpa_passphrase; in sae_get_password()
51 return password; in sae_get_password()
59 const char *password = NULL; in auth_build_sae_commit() local
76 password = sae_get_password(hapd, sta, rx_id, &pt); in auth_build_sae_commit()
77 if (!password || (use_pt && !pt)) { in auth_build_sae_commit()
90 (u8 *) password, os_strlen((const char *)password), in auth_build_sae_commit()
Dieee802_1x.c366 if (eap_user->password) { in ieee802_1x_get_eap_user()
367 user->password = os_memdup(eap_user->password, in ieee802_1x_get_eap_user()
369 if (!user->password) in ieee802_1x_get_eap_user()
Dap_config.h117 u8 *password; member
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_wpa2_api_port.c39 esp_err_t esp_wifi_sta_wpa2_ent_set_password(const unsigned char *password, int len) in esp_wifi_sta_wpa2_ent_set_password() argument
41 return esp_eap_client_set_password(password, len); in esp_wifi_sta_wpa2_ent_set_password()
Desp_dpp.c224 os_memcpy(wifi_cfg->sta.password, conf->passphrase, in esp_dpp_handle_config_obj()
225 sizeof(wifi_cfg->sta.password)); in esp_dpp_handle_config_obj()
Desp_eap_client.c1020 esp_err_t esp_eap_client_set_password(const unsigned char *password, int len) in esp_eap_client_set_password() argument
1036 os_memcpy(g_wpa_password, password, len); in esp_eap_client_set_password()
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.h130 const u8 *password, size_t password_len,
148 const u8 *password, size_t password_len,
169 int sae_pk_set_password(struct sae_data *sae, const char *password);
Dsae.c275 const u8 *addr2, const u8 *password, in sae_derive_pwe_ecc() argument
320 password, password_len); in sae_derive_pwe_ecc()
352 const_time_select_bin(found, stub_password, password, in sae_derive_pwe_ecc()
440 const u8 *addr2, const u8 *password, in sae_derive_pwe_ffc() argument
464 password, password_len); in sae_derive_pwe_ffc()
473 addr[0] = password; in sae_derive_pwe_ffc()
778 const u8 *password, size_t password_len, in sae_pwd_seed() argument
786 addr[0] = password; in sae_pwd_seed()
791 password, password_len); in sae_pwd_seed()
820 const u8 *password, size_t password_len, in sae_derive_pt_ecc() argument
[all …]
Dsae_pk.c381 int sae_pk_set_password(struct sae_data *sae, const char *password) in sae_pk_set_password() argument
397 len = os_strlen(password); in sae_pk_set_password()
398 if (len < 1 || !sae_pk_valid_password(password)) { in sae_pk_set_password()
402 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password()
/hal_espressif-latest/components/esp_wifi/include/
Desp_smartconfig.h40 uint8_t password[64]; /**< Password of the AP. Null terminated string. */ member
Desp_mesh.h485 uint8_t password[64]; /**< password */ member
498 uint8_t password[64]; /**< mesh softAP password */ member
Desp_wifi_types.h301 uint8_t password[64]; /**< Password of soft-AP. */ member
320 uint8_t password[64]; /**< Password of target AP. */ member
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/include/
Desp_eap_client.h141 esp_err_t esp_eap_client_set_password(const unsigned char *password, int len);
Desp_wpa2.h115 esp_err_t esp_wifi_sta_wpa2_ent_set_password(const unsigned char *password, int len);
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap.h30 u8 *password; member

12