Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 141) sorted by relevance

123456

/hostap-latest/tests/hwsim/
Dtest_eap.py39 anonymous_identity="TEAP", password="password",
51 anonymous_identity="TEAP", password="password",
62 anonymous_identity="TEAP", password="password",
72 anonymous_identity="TEAP", password="password",
82 anonymous_identity="TEAP", password="incorrect",
122 anonymous_identity="TEAP", password="password",
143 eap_connect(dev[0], hapd, "TEAP", "user", password="password",
154 eap_connect(dev[0], hapd, "TEAP", "user", password="wrong-password",
166 eap_connect(dev[0], hapd, "TEAP", "user", password="password",
179 eap_connect(dev[0], hapd, "TEAP", "user", password="password",
[all …]
Dtest_erp.py281password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123")
284password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123")
286password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123")
289password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123")
291 password="hello")
294 password="password", ca_cert="auth_serv/ca.pem",
299 password="abcdefghijklmnop0123456789abcdef")
301 password="password")
306 password="password", ca_cert="auth_serv/ca.pem",
309 password="password", ca_cert="auth_serv/ca.pem",
[all …]
Dtest_ap_eap.py268 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581")
273 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581")
275 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581",
281 password="ffdca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581",
287 password="ffdca4eda45b53cf0f12d7c9c3bc6a",
293 password="ffdca4eda45b53cf0f12d7c9c3bc6a8q:cb9cccc4b9258e6dca4760379fb82581",
299 password="ffdca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb8258q",
305 password="ffdca4eda45b53cf0f12d7c9c3bc6a89qcb9cccc4b9258e6dca4760379fb82581",
350 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581")
364 password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581")
[all …]
Dtest_authsrv.py36 anonymous_identity="ttls", password="password",
49 anonymous_identity="ttls", password="password",
59 anonymous_identity="ttls", password="password",
70 anonymous_identity="ttls", password="password",
80 anonymous_identity="ttls", password="password",
93 anonymous_identity="ttls", password="password",
108 anonymous_identity="ttls", password="password",
120 anonymous_identity="ttls", password="password",
133 anonymous_identity="ttls", password="password",
219 password="password",
[all …]
Dtest_tnc.py21 eap="PEAP", identity="user", password="password",
29 eap="PEAP", identity="user", password="password",
37 eap="PEAP", identity="user", password="password",
55 eap="PEAP", identity="user", password="password",
66 eap="PEAP", identity="user", password="password",
87 anonymous_identity="ttls", password="password",
106 anonymous_identity="ttls", password="password",
159 identity=identity, password="password",
188 anonymous_identity="FAST", password="password",
Dtest_pmksa_cache.py28 password="abcdefghijklmnop0123456789abcdef",
92 password="abcdefghijklmnop0123456789abcdef",
143 password="abcdefghijklmnop0123456789abcdef",
189 password="abcdefghijklmnop0123456789abcdef", okc=True,
238 password="abcdefghijklmnop0123456789abcdef", okc=True,
290 password="abcdefghijklmnop0123456789abcdef", okc=True,
340 password="abcdefghijklmnop0123456789abcdef",
368 password="abcdefghijklmnop0123456789abcdef",
400 password="abcdefghijklmnop0123456789abcdef",
635 password="abcdefghijklmnop0123456789abcdef",
[all …]
/hostap-latest/src/eap_peer/
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
192 const u8 *pos, *password; in eap_leap_process_response() local
200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
201 if (password == NULL) in eap_leap_process_response()
235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response()
[all …]
Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response) || in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response()
99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
Deap_pwd.c30 u8 *password; member
95 const u8 *identity, *password; in eap_pwd_init() local
101 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init()
102 if (password == NULL) { in eap_pwd_init()
127 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init()
133 os_memcpy(data->password, password, password_len); in eap_pwd_init()
190 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit()
363 const u8 *password; in eap_pwd_perform_commit_exchange() local
404 res = hash_nt_password_hash(data->password, pwhashhash); in eap_pwd_perform_commit_exchange()
408 res = nt_password_hash(data->password, in eap_pwd_perform_commit_exchange()
[all …]
Deap_mschapv2.c161 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local
167 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
168 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply()
211 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply()
310 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed()
314 config->password = os_malloc(16); in eap_mschapv2_password_changed()
316 if (config->password && in eap_mschapv2_password_changed()
319 config->password)) { in eap_mschapv2_password_changed()
320 bin_clear_free(config->password, in eap_mschapv2_password_changed()
322 config->password = NULL; in eap_mschapv2_password_changed()
[all …]
Deap_gtc.c50 const u8 *pos, *password, *identity; in eap_gtc_process() local
77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process()
78 if (password) in eap_gtc_process()
81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process()
85 if (password == NULL) { in eap_gtc_process()
113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
38 password = eap_get_config_password(sm, &password_len); in eap_md5_process()
39 if (password == NULL) { in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
/hostap-latest/hostapd/
Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password
8 # that the plaintext password does not need to be included in the user file.
20 # password option.
22 # password.
49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password
59 "user" MD5 "password"
62 "DOMAIN\user" MSCHAPV2 "password"
63 "gtc user" GTC "password"
[all …]
Dnt_password_hash.c19 char *password, buf[64], *pos; in main() local
22 password = argv[1]; in main()
37 password = buf; in main()
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
Dhostapd.eap_user_sqlite4 password TEXT,
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',…
/hostap-latest/wpa_supplicant/
Dwpa_supplicant.conf1840 password="foobar"
1855 password="foobar"
1868 password="foobar"
1927 password=06b4be19da289f475aa46a33cb793029
1954 password="foobar"
1963 password="foobar"
1973 password="password"
1984 password="password"
2074 password="foobar"
2110 password="foobar"
[all …]
/hostap-latest/src/crypto/
Dms_funcs.c109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
173 const u8 *password, size_t password_len, in generate_nt_response() argument
181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response()
283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response()
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument
311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response()
432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
/hostap-latest/src/ap/
Deap_user_db.c86 bin_clear_free(user->password, user->password_len); in get_user_cb()
88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb()
122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb()
170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
217 user->password = NULL; in eap_user_sqlite_get()
254 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_cli.sgml45 authentication information, like username and password, if these
60 messages (event messages, username/password requests).</para>
71 username and password, which are not present in the configuration
76 (one-time-password). &lt;id&gt; is a unique identifier for the
82 <emphasis>identity</emphasis>, <emphasis>password</emphasis>, and
84 the matching request. <emphasis>password</emphasis> and
87 two commands is that values given with <emphasis>password</emphasis> are
91 This can be used to implement one-time-password lists and generic token
94 <para>Example request for password and a matching reply:</para>
98 > password 1 mysecretpassword
[all …]
Dwpa_supplicant.conf.sgml75 private_key_passwd="password"
93 password="foobar"
116 password="foobar"
140 private_key_passwd="password"
165 password="foobar"
169 private_key_passwd="password"
174 private_key2_passwd="password"
191 password="password"
/hostap-latest/src/eap_server/
Deap_server_ttls.c260 u8 *password = dpos; in eap_ttls_avp_parse() local
263 password[password_len - 1] == '\0') { in eap_ttls_avp_parse()
268 password, password_len); in eap_ttls_avp_parse()
269 parse->user_password = password; in eap_ttls_avp_parse()
534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap()
543 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap()
560 const u8 *password, in eap_ttls_process_phase2_chap() argument
565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap()
595 password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_chap()
[all …]
Deap_server_pwd.c27 u8 *password; member
89 if (sm->user == NULL || sm->user->password == NULL || in eap_pwd_init()
109 data->password = os_malloc(sm->user->password_len); in eap_pwd_init()
110 if (data->password == NULL) { in eap_pwd_init()
118 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init()
128 bin_clear_free(data->password, data->password_len); in eap_pwd_init()
155 bin_clear_free(data->password, data->password_len); in eap_pwd_reset()
193 data->password, data->password_len); in eap_pwd_build_id_req()
584 const u8 *password; in eap_pwd_process_id_resp() local
631 res = hash_nt_password_hash(data->password, pwhashhash); in eap_pwd_process_id_resp()
[all …]
/hostap-latest/wpadebug/src/w1/fi/wpadebug/
DWpaCredActivity.java145 String password = data.getStringExtra("password"); in onActivityResult() local
146 if (password != null && password.length() == 0) in onActivityResult()
147 password = null; in onActivityResult()
173 (password != null && in onActivityResult()
174 !set_cred_quoted(id, "password", password)) || in onActivityResult()

123456