/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | mschapv2.c | 34 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 62 password, password_len); in mschapv2_derive_response() 65 password, nt_response) || in mschapv2_derive_response() 67 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 73 password, password_len); in mschapv2_derive_response() 76 password, password_len, in mschapv2_derive_response() 78 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 93 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 96 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_mschapv2.c | 140 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local 146 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 147 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply() 189 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 288 os_free(config->password); in eap_mschapv2_password_changed() 292 config->password = os_malloc(16); in eap_mschapv2_password_changed() 294 if (config->password) { in eap_mschapv2_password_changed() 297 config->password); in eap_mschapv2_password_changed() 301 config->password = config->new_password; in eap_mschapv2_password_changed() 477 const u8 *username, *password, *new_password; in eap_mschapv2_change_password() local [all …]
|
D | eap_ttls.c | 423 const u8 *identity, *password; in eap_ttls_phase2_request_mschapv2() 430 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2() 431 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschapv2() 477 if (mschapv2_derive_response(identity, identity_len, password, in eap_ttls_phase2_request_mschapv2() 527 const u8 *identity, *password; in eap_ttls_phase2_request_mschap() 534 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap() 535 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschap() 574 challenge_response(challenge, password, pos); /* NT-Response */ in eap_ttls_phase2_request_mschap() 576 password, 16); in eap_ttls_phase2_request_mschap() 578 nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap() [all …]
|
D | mschapv2.h | 16 const u8 *password, size_t password_len,
|
D | eap.c | 519 sm->config.password = NULL; in eap_peer_config_init() 553 sm->config.password = (u8 *)os_zalloc(sm->config.password_len); in eap_peer_config_init() 554 if (sm->config.password == NULL) in eap_peer_config_init() 556 os_memcpy(sm->config.password, g_wpa_password, sm->config.password_len); in eap_peer_config_init() 645 os_free(sm->config.password); in eap_peer_config_deinit() 873 return config->password; in eap_get_config_password() 895 return config->password; in eap_get_config_password2()
|
D | eap_config.h | 65 u8 *password; member
|
/hal_espressif-latest/components/esp_wifi/src/ |
D | smartconfig.c | 32 uint8_t password[65] = { 0 }; in handler_got_ssid_passwd() local 37 memcpy(password, evt->password, sizeof(evt->password)); in handler_got_ssid_passwd() 41 ESP_LOGD(TAG, "PASSWORD:%s", password); in handler_got_ssid_passwd()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb() 170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get() 215 user->identity = user->password; in eap_user_sqlite_get() 217 user->password = NULL; in eap_user_sqlite_get() 253 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
|
D | ieee802_11.c | 39 const char *password = NULL; in sae_get_password() local 42 if (!password) { in sae_get_password() 43 password = hapd->conf->ssid.wpa_passphrase; in sae_get_password() 51 return password; in sae_get_password() 59 const char *password = NULL; in auth_build_sae_commit() local 76 password = sae_get_password(hapd, sta, rx_id, &pt); in auth_build_sae_commit() 77 if (!password || (use_pt && !pt)) { in auth_build_sae_commit() 90 (u8 *) password, os_strlen((const char *)password), in auth_build_sae_commit()
|
D | ieee802_1x.c | 366 if (eap_user->password) { in ieee802_1x_get_eap_user() 367 user->password = os_memdup(eap_user->password, in ieee802_1x_get_eap_user() 369 if (!user->password) in ieee802_1x_get_eap_user()
|
D | ap_config.h | 117 u8 *password; member
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wpa2_api_port.c | 39 esp_err_t esp_wifi_sta_wpa2_ent_set_password(const unsigned char *password, int len) in esp_wifi_sta_wpa2_ent_set_password() argument 41 return esp_eap_client_set_password(password, len); in esp_wifi_sta_wpa2_ent_set_password()
|
D | esp_dpp.c | 224 os_memcpy(wifi_cfg->sta.password, conf->passphrase, in esp_dpp_handle_config_obj() 225 sizeof(wifi_cfg->sta.password)); in esp_dpp_handle_config_obj()
|
D | esp_eap_client.c | 1020 esp_err_t esp_eap_client_set_password(const unsigned char *password, int len) in esp_eap_client_set_password() argument 1036 os_memcpy(g_wpa_password, password, len); in esp_eap_client_set_password()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae.h | 130 const u8 *password, size_t password_len, 148 const u8 *password, size_t password_len, 169 int sae_pk_set_password(struct sae_data *sae, const char *password);
|
D | sae.c | 275 const u8 *addr2, const u8 *password, in sae_derive_pwe_ecc() argument 320 password, password_len); in sae_derive_pwe_ecc() 352 const_time_select_bin(found, stub_password, password, in sae_derive_pwe_ecc() 440 const u8 *addr2, const u8 *password, in sae_derive_pwe_ffc() argument 464 password, password_len); in sae_derive_pwe_ffc() 473 addr[0] = password; in sae_derive_pwe_ffc() 778 const u8 *password, size_t password_len, in sae_pwd_seed() argument 786 addr[0] = password; in sae_pwd_seed() 791 password, password_len); in sae_pwd_seed() 820 const u8 *password, size_t password_len, in sae_derive_pt_ecc() argument [all …]
|
D | sae_pk.c | 381 int sae_pk_set_password(struct sae_data *sae, const char *password) in sae_pk_set_password() argument 397 len = os_strlen(password); in sae_pk_set_password() 398 if (len < 1 || !sae_pk_valid_password(password)) { in sae_pk_set_password() 402 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password()
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_smartconfig.h | 40 uint8_t password[64]; /**< Password of the AP. Null terminated string. */ member
|
D | esp_mesh.h | 485 uint8_t password[64]; /**< password */ member 498 uint8_t password[64]; /**< mesh softAP password */ member
|
D | esp_wifi_types.h | 301 uint8_t password[64]; /**< Password of soft-AP. */ member 320 uint8_t password[64]; /**< Password of target AP. */ member
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/include/ |
D | esp_eap_client.h | 141 esp_err_t esp_eap_client_set_password(const unsigned char *password, int len);
|
D | esp_wpa2.h | 115 esp_err_t esp_wifi_sta_wpa2_ent_set_password(const unsigned char *password, int len);
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap.h | 30 u8 *password; member
|