/hostap-latest/tests/hwsim/ |
D | test_eap.py | 39 anonymous_identity="TEAP", password="password", 51 anonymous_identity="TEAP", password="password", 62 anonymous_identity="TEAP", password="password", 72 anonymous_identity="TEAP", password="password", 82 anonymous_identity="TEAP", password="incorrect", 122 anonymous_identity="TEAP", password="password", 143 eap_connect(dev[0], hapd, "TEAP", "user", password="password", 154 eap_connect(dev[0], hapd, "TEAP", "user", password="wrong-password", 166 eap_connect(dev[0], hapd, "TEAP", "user", password="password", 179 eap_connect(dev[0], hapd, "TEAP", "user", password="password", [all …]
|
D | test_erp.py | 281 … password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123") 284 … password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123") 286 … password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123") 289 … password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123") 291 password="hello") 294 password="password", ca_cert="auth_serv/ca.pem", 299 password="abcdefghijklmnop0123456789abcdef") 301 password="password") 306 password="password", ca_cert="auth_serv/ca.pem", 309 password="password", ca_cert="auth_serv/ca.pem", [all …]
|
D | test_ap_eap.py | 268 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") 273 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") 275 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581", 281 password="ffdca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581", 287 password="ffdca4eda45b53cf0f12d7c9c3bc6a", 293 password="ffdca4eda45b53cf0f12d7c9c3bc6a8q:cb9cccc4b9258e6dca4760379fb82581", 299 password="ffdca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb8258q", 305 password="ffdca4eda45b53cf0f12d7c9c3bc6a89qcb9cccc4b9258e6dca4760379fb82581", 350 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") 364 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") [all …]
|
D | test_authsrv.py | 36 anonymous_identity="ttls", password="password", 49 anonymous_identity="ttls", password="password", 59 anonymous_identity="ttls", password="password", 70 anonymous_identity="ttls", password="password", 80 anonymous_identity="ttls", password="password", 93 anonymous_identity="ttls", password="password", 108 anonymous_identity="ttls", password="password", 120 anonymous_identity="ttls", password="password", 133 anonymous_identity="ttls", password="password", 219 password="password", [all …]
|
D | test_tnc.py | 21 eap="PEAP", identity="user", password="password", 29 eap="PEAP", identity="user", password="password", 37 eap="PEAP", identity="user", password="password", 55 eap="PEAP", identity="user", password="password", 66 eap="PEAP", identity="user", password="password", 87 anonymous_identity="ttls", password="password", 106 anonymous_identity="ttls", password="password", 159 identity=identity, password="password", 188 anonymous_identity="FAST", password="password",
|
D | test_pmksa_cache.py | 28 password="abcdefghijklmnop0123456789abcdef", 92 password="abcdefghijklmnop0123456789abcdef", 143 password="abcdefghijklmnop0123456789abcdef", 189 password="abcdefghijklmnop0123456789abcdef", okc=True, 238 password="abcdefghijklmnop0123456789abcdef", okc=True, 290 password="abcdefghijklmnop0123456789abcdef", okc=True, 340 password="abcdefghijklmnop0123456789abcdef", 368 password="abcdefghijklmnop0123456789abcdef", 400 password="abcdefghijklmnop0123456789abcdef", 635 password="abcdefghijklmnop0123456789abcdef", [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() [all …]
|
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
D | eap_pwd.c | 30 u8 *password; member 95 const u8 *identity, *password; in eap_pwd_init() local 101 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init() 102 if (password == NULL) { in eap_pwd_init() 127 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init() 133 os_memcpy(data->password, password, password_len); in eap_pwd_init() 190 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit() 363 const u8 *password; in eap_pwd_perform_commit_exchange() local 404 res = hash_nt_password_hash(data->password, pwhashhash); in eap_pwd_perform_commit_exchange() 408 res = nt_password_hash(data->password, in eap_pwd_perform_commit_exchange() [all …]
|
D | eap_mschapv2.c | 161 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local 167 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 168 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply() 211 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 310 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 314 config->password = os_malloc(16); in eap_mschapv2_password_changed() 316 if (config->password && in eap_mschapv2_password_changed() 319 config->password)) { in eap_mschapv2_password_changed() 320 bin_clear_free(config->password, in eap_mschapv2_password_changed() 322 config->password = NULL; in eap_mschapv2_password_changed() [all …]
|
D | eap_gtc.c | 50 const u8 *pos, *password, *identity; in eap_gtc_process() local 77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 78 if (password) in eap_gtc_process() 81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 85 if (password == NULL) { in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
|
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 38 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 39 if (password == NULL) { in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 3 # Each line must contain an identity, EAP method(s), and an optional password 4 # separated with whitespace (space or tab). The identity and password must be 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password 8 # that the plaintext password does not need to be included in the user file. 20 # password option. 22 # password. 49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password 59 "user" MD5 "password" 62 "DOMAIN\user" MSCHAPV2 "password" 63 "gtc user" GTC "password" [all …]
|
D | nt_password_hash.c | 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
D | hostapd.eap_user_sqlite | 4 password TEXT, 15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1); 16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',…
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.conf | 1840 password="foobar" 1855 password="foobar" 1868 password="foobar" 1927 password=06b4be19da289f475aa46a33cb793029 1954 password="foobar" 1963 password="foobar" 1973 password="password" 1984 password="password" 2074 password="foobar" 2110 password="foobar" [all …]
|
/hostap-latest/src/crypto/ |
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
|
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/hostap-latest/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb() 170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get() 215 user->identity = user->password; in eap_user_sqlite_get() 217 user->password = NULL; in eap_user_sqlite_get() 254 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_cli.sgml | 45 authentication information, like username and password, if these 60 messages (event messages, username/password requests).</para> 71 username and password, which are not present in the configuration 76 (one-time-password). <id> is a unique identifier for the 82 <emphasis>identity</emphasis>, <emphasis>password</emphasis>, and 84 the matching request. <emphasis>password</emphasis> and 87 two commands is that values given with <emphasis>password</emphasis> are 91 This can be used to implement one-time-password lists and generic token 94 <para>Example request for password and a matching reply:</para> 98 > password 1 mysecretpassword [all …]
|
D | wpa_supplicant.conf.sgml | 75 private_key_passwd="password" 93 password="foobar" 116 password="foobar" 140 private_key_passwd="password" 165 password="foobar" 169 private_key_passwd="password" 174 private_key2_passwd="password" 191 password="password"
|
/hostap-latest/src/eap_server/ |
D | eap_server_ttls.c | 260 u8 *password = dpos; in eap_ttls_avp_parse() local 263 password[password_len - 1] == '\0') { in eap_ttls_avp_parse() 268 password, password_len); in eap_ttls_avp_parse() 269 parse->user_password = password; in eap_ttls_avp_parse() 534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap() 543 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 560 const u8 *password, in eap_ttls_process_phase2_chap() argument 565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap() 595 password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_chap() [all …]
|
D | eap_server_pwd.c | 27 u8 *password; member 89 if (sm->user == NULL || sm->user->password == NULL || in eap_pwd_init() 109 data->password = os_malloc(sm->user->password_len); in eap_pwd_init() 110 if (data->password == NULL) { in eap_pwd_init() 118 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init() 128 bin_clear_free(data->password, data->password_len); in eap_pwd_init() 155 bin_clear_free(data->password, data->password_len); in eap_pwd_reset() 193 data->password, data->password_len); in eap_pwd_build_id_req() 584 const u8 *password; in eap_pwd_process_id_resp() local 631 res = hash_nt_password_hash(data->password, pwhashhash); in eap_pwd_process_id_resp() [all …]
|
/hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
D | WpaCredActivity.java | 145 String password = data.getStringExtra("password"); in onActivityResult() local 146 if (password != null && password.length() == 0) in onActivityResult() 147 password = null; in onActivityResult() 173 (password != null && in onActivityResult() 174 !set_cred_quoted(id, "password", password)) || in onActivityResult()
|