| /hostap-latest/src/common/ |
| D | common_module_tests.c | 263 const char *pw = "mekmitasdigoat"; in sae_tests() local 396 sae_prepare_commit(addr1, addr2, (const u8 *) pw, os_strlen(pw), in sae_tests() 452 (const u8 *) pw, os_strlen(pw), pwid); in sae_tests() 523 const char *pw; in sae_pk_tests() member 544 for (i = 0; valid[i].pw; i++) { in sae_pk_tests() 548 const char *pw = valid[i].pw; in sae_pk_tests() local 550 size_t pw_len = os_strlen(pw); in sae_pk_tests() 554 if (!sae_pk_valid_password(pw)) { in sae_pk_tests() 557 pw); in sae_pk_tests() 562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests() [all …]
|
| D | sae_pk.c | 142 bool sae_pk_valid_password(const char *pw) in sae_pk_valid_password() argument 145 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() 160 for (pos = 0; pw[pos]; pos++) { in sae_pk_valid_password() 162 if (pw[pos] != '-') { in sae_pk_valid_password() 169 if (dtable[(u8) pw[pos]] == 0x80) { in sae_pk_valid_password() 177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password() 184 sec_1b = dtable[(u8) pw[0]] & BIT(4); in sae_pk_valid_password() 186 if (sec_1b != (dtable[(u8) pw[i]] & BIT(4))) { in sae_pk_valid_password() 363 u8 *pw, *pos; in sae_pk_set_password() local 378 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password() [all …]
|
| D | sae.h | 162 bool sae_pk_valid_password(const char *pw); 164 static inline bool sae_pk_valid_password(const char *pw) in sae_pk_valid_password() argument
|
| /hostap-latest/src/utils/ |
| D | ext_password.c | 103 void ext_password_free(struct wpabuf *pw) in ext_password_free() argument 105 if (pw == NULL) in ext_password_free() 107 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); in ext_password_free() 109 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { in ext_password_free() 114 wpabuf_free(pw); in ext_password_free()
|
| D | utils_module_tests.c | 257 struct wpabuf *pw; in ext_password_tests() local 268 pw = ext_password_get(data, "foo"); in ext_password_tests() 269 if (pw != NULL) in ext_password_tests() 271 ext_password_free(pw); in ext_password_tests() 275 pw = ext_password_get(NULL, "foo"); in ext_password_tests() 276 if (pw != NULL) in ext_password_tests() 278 ext_password_free(pw); in ext_password_tests()
|
| D | ext_password.h | 22 void ext_password_free(struct wpabuf *pw);
|
| /hostap-latest/src/ap/ |
| D | ap_config.c | 496 struct sae_password_entry *pw; in hostapd_setup_sae_pt() local 522 for (pw = conf->sae_passwords; pw; pw = pw->next) { in hostapd_setup_sae_pt() 523 sae_deinit_pt(pw->pt); in hostapd_setup_sae_pt() 524 pw->pt = sae_derive_pt(conf->sae_groups, ssid->ssid, in hostapd_setup_sae_pt() 526 (const u8 *) pw->password, in hostapd_setup_sae_pt() 527 os_strlen(pw->password), in hostapd_setup_sae_pt() 528 pw->identifier); in hostapd_setup_sae_pt() 529 if (!pw->pt) in hostapd_setup_sae_pt() 774 struct sae_password_entry *pw, *tmp; in hostapd_config_free_sae_passwords() local 776 pw = conf->sae_passwords; in hostapd_config_free_sae_passwords() [all …]
|
| /hostap-latest/hostapd/ |
| D | sae_pk_gen.c | 25 char *b64 = NULL, *pw = NULL, *pos, *src; in main() local 170 pw = sae_pk_base32_encode(pw_base_bin, 20 * 3 - 5); in main() 171 if (!pw) in main() 175 printf("sae_password=%s|pk=%s:%s\n", pw, m_hex, b64); in main() 178 os_free(pw); in main() 179 pw = sae_pk_base32_encode(pw_base_bin, 20 * j - 5); in main() 180 if (pw) in main() 181 printf("# %s\n", pw); in main() 191 os_free(pw); in main()
|
| D | config_file.c | 2237 struct sae_password_entry *pw; in parse_sae_password() local 2240 pw = os_zalloc(sizeof(*pw)); in parse_sae_password() 2241 if (!pw) in parse_sae_password() 2243 os_memset(pw->peer_addr, 0xff, ETH_ALEN); /* default to wildcard */ in parse_sae_password() 2249 if (hwaddr_aton(pos2, pw->peer_addr) < 0) in parse_sae_password() 2259 pw->vlan_id = atoi(pos2); in parse_sae_password() 2284 pw->pk = sae_parse_pk(tmp); in parse_sae_password() 2286 if (!pw->pk) in parse_sae_password() 2296 pw->identifier = os_strdup(pos2); in parse_sae_password() 2297 if (!pw->identifier) in parse_sae_password() [all …]
|
| /hostap-latest/tests/hwsim/ |
| D | test_nfc_wps.py | 49 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip() 50 if "FAIL" in pw: 52 res = hapd.request("WPS_NFC_TAG_READ " + pw) 131 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip() 132 if "FAIL" in pw: 134 res = hapd.request("WPS_NFC_TAG_READ " + pw) 152 pw = hapd.request("WPS_NFC_TOKEN NDEF").rstrip() 153 if "FAIL" in pw: 158 res = dev[0].request("WPS_NFC_TAG_READ " + pw) 202 …pw = "D217446170706C69636174696F6E2F766E642E7766612E777363102C0036691F6C35AC5FF23180FFBF899BF3E563… [all …]
|
| D | test_nfc_p2p.py | 348 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip() 349 if "FAIL" in pw: 400 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip() 401 if "FAIL" in pw: 453 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip() 454 if "FAIL" in pw: 505 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip() 506 if "FAIL" in pw: 549 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip() 550 if "FAIL" in pw: [all …]
|
| D | test_sae_pk.py | 24 def run_sae_pk(apdev, dev, ssid, pw, m, pk, ap_groups=None, argument 28 params['sae_password'] = ['%s|pk=%s:%s' % (pw, m, pk)] 36 dev.connect(ssid, sae_password=pw, key_mgmt="SAE", scan_freq="2412") 97 pw = "hbbi-f4xq-b457-jjew-muei" 99 run_sae_pk(apdev[0], dev[0], SAE_PK_SSID, pw, m, SAE_PK_19_PK)
|
| /hostap-latest/hs20/server/ |
| D | spp_server.c | 65 const char *sessionid, const char *pw, in db_add_session() argument 84 operation, pw ? pw : "", in db_add_session() 102 const char *pw) in db_update_session_password() argument 108 pw, sessionid, user, realm); in db_update_session_password() 564 const char *realm, const char *pw, int dmacc) in update_password() argument 571 pw, dmacc ? "osu_user" : "identity", in update_password() 624 const char *user, const char *pw) in build_username_password() argument 636 b64 = hostap_base64_encode(pw, strlen(pw), NULL); in build_username_password() 650 const char *user, const char *pw, in add_username_password() argument 655 node = build_username_password(ctx, cred, user, pw); in add_username_password() [all …]
|
| /hostap-latest/hs20/server/www/ |
| D | remediation-pw.php | 15 $pw = $_POST["password"]; variable 16 if (strlen($id) < 32 || !isset($pw)) { 30 if (!$db->exec("UPDATE sessions SET password='$pw' WHERE rowid=$rowid")) {
|
| D | add-mo.php | 16 $pw = $_POST["password"]; variable 17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) { 45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' W…
|
| D | spp.php | 63 $pw = $row['osu_password']; variable 65 $pw = $row['password']; variable 70 if (strlen($pw) < 1) { 75 $A1 = md5($user . ':' . $realm . ':' . $pw);
|
| D | add-free.php | 37 $pw = $row['password']; variable 39 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', machine_managed='…
|
| D | est.php | 59 $pw = $row['password']; variable 60 if (strlen($pw) < 1) { 65 $A1 = md5($user . ':' . $realm . ':' . $pw);
|
| /hostap-latest/src/tls/ |
| D | pkcs5.c | 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 492 u8 *pw; in pkcs12_crypto_init_sha1() local 501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 502 if (!pw) in pkcs12_crypto_init_sha1() 506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1() 510 if (pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, in pkcs12_crypto_init_sha1() 513 pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, in pkcs12_crypto_init_sha1() 516 os_free(pw); in pkcs12_crypto_init_sha1() 520 os_free(pw); in pkcs12_crypto_init_sha1()
|
| /hostap-latest/wpa_supplicant/ |
| D | ap.c | 617 struct sae_password_entry *pw; in wpa_supplicant_conf_ap() local 619 pw = os_zalloc(sizeof(*pw)); in wpa_supplicant_conf_ap() 620 if (!pw) in wpa_supplicant_conf_ap() 622 os_memset(pw->peer_addr, 0xff, ETH_ALEN); in wpa_supplicant_conf_ap() 623 pw->password = os_strdup(ssid->sae_password); in wpa_supplicant_conf_ap() 624 if (!pw->password) { in wpa_supplicant_conf_ap() 625 os_free(pw); in wpa_supplicant_conf_ap() 629 pw->identifier = os_strdup(ssid->sae_password_id); in wpa_supplicant_conf_ap() 630 if (!pw->identifier) { in wpa_supplicant_conf_ap() 631 str_clear_free(pw->password); in wpa_supplicant_conf_ap() [all …]
|
| /hostap-latest/src/crypto/ |
| D | aes-siv.c | 120 const u8 *pw, size_t pwlen, in aes_siv_encrypt() argument 143 _addr[num_elem] = pw; in aes_siv_encrypt() 153 os_memcpy(crypt_pw, pw, pwlen); in aes_siv_encrypt()
|
| D | aes_siv.h | 13 const u8 *pw, size_t pwlen,
|
| /hostap-latest/src/wps/ |
| D | wps_common.c | 676 struct wpabuf *pw; in wps_nfc_token_gen() local 679 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); in wps_nfc_token_gen() 680 if (pw == NULL) in wps_nfc_token_gen() 683 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), in wps_nfc_token_gen() 686 wpabuf_free(pw); in wps_nfc_token_gen() 691 wpabuf_free(pw); in wps_nfc_token_gen() 697 *dev_pw = pw; in wps_nfc_token_gen()
|
| /hostap-latest/hs20/client/ |
| D | osu_client.h | 71 const char *alt_loc, char **user, char **pw); 119 const char *user, const char *pw);
|
| D | osu_client.c | 140 char *url, *user = NULL, *pw = NULL; in osu_get_certificate() local 192 pw = xml_node_get_base64_text(ctx->xml, node, NULL); in osu_get_certificate() 193 if (pw == NULL) { in osu_get_certificate() 197 wpa_printf(MSG_INFO, "estPassword: %s", pw); in osu_get_certificate() 205 est_simple_enroll(ctx, url, user, pw) < 0) in osu_get_certificate() 212 xml_node_get_text_free(ctx->xml, pw); in osu_get_certificate() 741 const char *alt_loc, char **user, char **pw) in get_user_pw() argument 753 *pw = xml_node_get_base64_text(ctx->xml, node, NULL); in get_user_pw() 767 free(*pw); in get_user_pw() 768 *pw = xml_node_get_base64_text(ctx->xml, a, NULL); in get_user_pw() [all …]
|