Home
last modified time | relevance | path

Searched refs:password_len (Results 1 – 15 of 15) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Dmschapv2.c34 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
62 password, password_len); in mschapv2_derive_response()
73 password, password_len); in mschapv2_derive_response()
76 password, password_len, in mschapv2_derive_response()
78 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
Deap_mschapv2.c139 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local
146 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
190 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply()
293 config->password_len = 16; in eap_mschapv2_password_changed()
302 config->password_len = config->new_password_len; in eap_mschapv2_password_changed()
478 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() local
485 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password()
518 password, password_len, cp->encr_password)) in eap_mschapv2_change_password()
534 password, password_len, cp->encr_hash)) in eap_mschapv2_change_password()
679 config->password_len == 0) { in eap_mschapv2_check_config()
Deap_ttls.c424 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2()
430 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2()
478 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
528 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap()
534 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap()
578 nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap()
581 password, password_len); in eap_ttls_phase2_request_mschap()
612 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local
617 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap()
621 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap()
[all …]
Dmschapv2.h16 const u8 *password, size_t password_len,
Deap_config.h70 size_t password_len; member
Deap.c552 sm->config.password_len = g_wpa_password_len; in eap_peer_config_init()
553 sm->config.password = (u8 *)os_zalloc(sm->config.password_len); in eap_peer_config_init()
556 os_memcpy(sm->config.password, g_wpa_password, sm->config.password_len); in eap_peer_config_init()
872 *len = config->password_len; in eap_get_config_password()
892 *len = config->password_len; in eap_get_config_password2()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Dms_funcs.c109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
173 const u8 *password, size_t password_len, in generate_nt_response() argument
181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response()
283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response()
307 size_t password_len, u8 *response) in nt_challenge_response() argument
311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response()
432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
[all …]
Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Deap_user_db.c86 bin_clear_free(user->password, user->password_len); in get_user_cb()
87 user->password_len = os_strlen(argv[i]); in get_user_cb()
122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
124 user->password_len = os_strlen(argv[id]); in get_wildcard_cb()
171 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get()
216 user->identity_len = user->password_len; in eap_user_sqlite_get()
218 user->password_len = 0; in eap_user_sqlite_get()
254 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
Dieee802_1x.c368 eap_user->password_len); in ieee802_1x_get_eap_user()
371 user->password_len = eap_user->password_len; in ieee802_1x_get_eap_user()
Dap_config.h118 size_t password_len; member
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.c276 size_t password_len) in sae_derive_pwe_ecc() argument
299 stub_password = os_malloc(password_len); in sae_derive_pwe_ecc()
300 tmp_password = os_malloc(password_len); in sae_derive_pwe_ecc()
302 random_get_bytes(stub_password, password_len) < 0) in sae_derive_pwe_ecc()
320 password, password_len); in sae_derive_pwe_ecc()
331 len[0] = password_len; in sae_derive_pwe_ecc()
353 password_len, tmp_password); in sae_derive_pwe_ecc()
431 bin_clear_free(tmp_password, password_len); in sae_derive_pwe_ecc()
441 size_t password_len) in sae_derive_pwe_ffc() argument
464 password, password_len); in sae_derive_pwe_ffc()
[all …]
Dsae.h130 const u8 *password, size_t password_len,
148 const u8 *password, size_t password_len,
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap.h31 size_t password_len; member
Deap_server.c1847 bin_clear_free(user->password, user->password_len); in eap_user_free()