/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | mschapv2.c | 34 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 62 password, password_len); in mschapv2_derive_response() 73 password, password_len); in mschapv2_derive_response() 76 password, password_len, in mschapv2_derive_response() 78 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_mschapv2.c | 139 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 146 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 190 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply() 293 config->password_len = 16; in eap_mschapv2_password_changed() 302 config->password_len = config->new_password_len; in eap_mschapv2_password_changed() 478 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() local 485 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password() 518 password, password_len, cp->encr_password)) in eap_mschapv2_change_password() 534 password, password_len, cp->encr_hash)) in eap_mschapv2_change_password() 679 config->password_len == 0) { in eap_mschapv2_check_config()
|
D | eap_ttls.c | 424 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() 430 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2() 478 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 528 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() 534 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap() 578 nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap() 581 password, password_len); in eap_ttls_phase2_request_mschap() 612 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local 617 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap() 621 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap() [all …]
|
D | mschapv2.h | 16 const u8 *password, size_t password_len,
|
D | eap_config.h | 70 size_t password_len; member
|
D | eap.c | 552 sm->config.password_len = g_wpa_password_len; in eap_peer_config_init() 553 sm->config.password = (u8 *)os_zalloc(sm->config.password_len); in eap_peer_config_init() 556 os_memcpy(sm->config.password, g_wpa_password, sm->config.password_len); in eap_peer_config_init() 872 *len = config->password_len; in eap_get_config_password() 892 *len = config->password_len; in eap_get_config_password2()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 307 size_t password_len, u8 *response) in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash() [all …]
|
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 87 user->password_len = os_strlen(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 124 user->password_len = os_strlen(argv[id]); in get_wildcard_cb() 171 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get() 216 user->identity_len = user->password_len; in eap_user_sqlite_get() 218 user->password_len = 0; in eap_user_sqlite_get() 254 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
|
D | ieee802_1x.c | 368 eap_user->password_len); in ieee802_1x_get_eap_user() 371 user->password_len = eap_user->password_len; in ieee802_1x_get_eap_user()
|
D | ap_config.h | 118 size_t password_len; member
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae.c | 276 size_t password_len) in sae_derive_pwe_ecc() argument 299 stub_password = os_malloc(password_len); in sae_derive_pwe_ecc() 300 tmp_password = os_malloc(password_len); in sae_derive_pwe_ecc() 302 random_get_bytes(stub_password, password_len) < 0) in sae_derive_pwe_ecc() 320 password, password_len); in sae_derive_pwe_ecc() 331 len[0] = password_len; in sae_derive_pwe_ecc() 353 password_len, tmp_password); in sae_derive_pwe_ecc() 431 bin_clear_free(tmp_password, password_len); in sae_derive_pwe_ecc() 441 size_t password_len) in sae_derive_pwe_ffc() argument 464 password, password_len); in sae_derive_pwe_ffc() [all …]
|
D | sae.h | 130 const u8 *password, size_t password_len, 148 const u8 *password, size_t password_len,
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap.h | 31 size_t password_len; member
|
D | eap_server.c | 1847 bin_clear_free(user->password, user->password_len); in eap_user_free()
|