Home
last modified time | relevance | path

Searched refs:pw (Results 1 – 25 of 39) sorted by relevance

12

/hostap-latest/src/common/
Dcommon_module_tests.c263 const char *pw = "mekmitasdigoat"; in sae_tests() local
396 sae_prepare_commit(addr1, addr2, (const u8 *) pw, os_strlen(pw), in sae_tests()
452 (const u8 *) pw, os_strlen(pw), pwid); in sae_tests()
523 const char *pw; in sae_pk_tests() member
544 for (i = 0; valid[i].pw; i++) { in sae_pk_tests()
548 const char *pw = valid[i].pw; in sae_pk_tests() local
550 size_t pw_len = os_strlen(pw); in sae_pk_tests()
554 if (!sae_pk_valid_password(pw)) { in sae_pk_tests()
557 pw); in sae_pk_tests()
562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests()
[all …]
Dsae_pk.c142 bool sae_pk_valid_password(const char *pw) in sae_pk_valid_password() argument
145 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password()
160 for (pos = 0; pw[pos]; pos++) { in sae_pk_valid_password()
162 if (pw[pos] != '-') { in sae_pk_valid_password()
169 if (dtable[(u8) pw[pos]] == 0x80) { in sae_pk_valid_password()
177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password()
184 sec_1b = dtable[(u8) pw[0]] & BIT(4); in sae_pk_valid_password()
186 if (sec_1b != (dtable[(u8) pw[i]] & BIT(4))) { in sae_pk_valid_password()
363 u8 *pw, *pos; in sae_pk_set_password() local
378 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password()
[all …]
Dsae.h162 bool sae_pk_valid_password(const char *pw);
164 static inline bool sae_pk_valid_password(const char *pw) in sae_pk_valid_password() argument
/hostap-latest/src/utils/
Dext_password.c103 void ext_password_free(struct wpabuf *pw) in ext_password_free() argument
105 if (pw == NULL) in ext_password_free()
107 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); in ext_password_free()
109 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { in ext_password_free()
114 wpabuf_free(pw); in ext_password_free()
Dutils_module_tests.c257 struct wpabuf *pw; in ext_password_tests() local
268 pw = ext_password_get(data, "foo"); in ext_password_tests()
269 if (pw != NULL) in ext_password_tests()
271 ext_password_free(pw); in ext_password_tests()
275 pw = ext_password_get(NULL, "foo"); in ext_password_tests()
276 if (pw != NULL) in ext_password_tests()
278 ext_password_free(pw); in ext_password_tests()
Dext_password.h22 void ext_password_free(struct wpabuf *pw);
/hostap-latest/src/ap/
Dap_config.c496 struct sae_password_entry *pw; in hostapd_setup_sae_pt() local
522 for (pw = conf->sae_passwords; pw; pw = pw->next) { in hostapd_setup_sae_pt()
523 sae_deinit_pt(pw->pt); in hostapd_setup_sae_pt()
524 pw->pt = sae_derive_pt(conf->sae_groups, ssid->ssid, in hostapd_setup_sae_pt()
526 (const u8 *) pw->password, in hostapd_setup_sae_pt()
527 os_strlen(pw->password), in hostapd_setup_sae_pt()
528 pw->identifier); in hostapd_setup_sae_pt()
529 if (!pw->pt) in hostapd_setup_sae_pt()
774 struct sae_password_entry *pw, *tmp; in hostapd_config_free_sae_passwords() local
776 pw = conf->sae_passwords; in hostapd_config_free_sae_passwords()
[all …]
/hostap-latest/hostapd/
Dsae_pk_gen.c25 char *b64 = NULL, *pw = NULL, *pos, *src; in main() local
170 pw = sae_pk_base32_encode(pw_base_bin, 20 * 3 - 5); in main()
171 if (!pw) in main()
175 printf("sae_password=%s|pk=%s:%s\n", pw, m_hex, b64); in main()
178 os_free(pw); in main()
179 pw = sae_pk_base32_encode(pw_base_bin, 20 * j - 5); in main()
180 if (pw) in main()
181 printf("# %s\n", pw); in main()
191 os_free(pw); in main()
Dconfig_file.c2237 struct sae_password_entry *pw; in parse_sae_password() local
2240 pw = os_zalloc(sizeof(*pw)); in parse_sae_password()
2241 if (!pw) in parse_sae_password()
2243 os_memset(pw->peer_addr, 0xff, ETH_ALEN); /* default to wildcard */ in parse_sae_password()
2249 if (hwaddr_aton(pos2, pw->peer_addr) < 0) in parse_sae_password()
2259 pw->vlan_id = atoi(pos2); in parse_sae_password()
2284 pw->pk = sae_parse_pk(tmp); in parse_sae_password()
2286 if (!pw->pk) in parse_sae_password()
2296 pw->identifier = os_strdup(pos2); in parse_sae_password()
2297 if (!pw->identifier) in parse_sae_password()
[all …]
/hostap-latest/tests/hwsim/
Dtest_nfc_wps.py49 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip()
50 if "FAIL" in pw:
52 res = hapd.request("WPS_NFC_TAG_READ " + pw)
131 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip()
132 if "FAIL" in pw:
134 res = hapd.request("WPS_NFC_TAG_READ " + pw)
152 pw = hapd.request("WPS_NFC_TOKEN NDEF").rstrip()
153 if "FAIL" in pw:
158 res = dev[0].request("WPS_NFC_TAG_READ " + pw)
202pw = "D217446170706C69636174696F6E2F766E642E7766612E777363102C0036691F6C35AC5FF23180FFBF899BF3E563…
[all …]
Dtest_nfc_p2p.py348 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip()
349 if "FAIL" in pw:
400 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip()
401 if "FAIL" in pw:
453 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip()
454 if "FAIL" in pw:
505 pw = dev[1].global_request("WPS_NFC_TOKEN NDEF").rstrip()
506 if "FAIL" in pw:
549 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip()
550 if "FAIL" in pw:
[all …]
Dtest_sae_pk.py24 def run_sae_pk(apdev, dev, ssid, pw, m, pk, ap_groups=None, argument
28 params['sae_password'] = ['%s|pk=%s:%s' % (pw, m, pk)]
36 dev.connect(ssid, sae_password=pw, key_mgmt="SAE", scan_freq="2412")
97 pw = "hbbi-f4xq-b457-jjew-muei"
99 run_sae_pk(apdev[0], dev[0], SAE_PK_SSID, pw, m, SAE_PK_19_PK)
/hostap-latest/hs20/server/
Dspp_server.c65 const char *sessionid, const char *pw, in db_add_session() argument
84 operation, pw ? pw : "", in db_add_session()
102 const char *pw) in db_update_session_password() argument
108 pw, sessionid, user, realm); in db_update_session_password()
564 const char *realm, const char *pw, int dmacc) in update_password() argument
571 pw, dmacc ? "osu_user" : "identity", in update_password()
624 const char *user, const char *pw) in build_username_password() argument
636 b64 = hostap_base64_encode(pw, strlen(pw), NULL); in build_username_password()
650 const char *user, const char *pw, in add_username_password() argument
655 node = build_username_password(ctx, cred, user, pw); in add_username_password()
[all …]
/hostap-latest/hs20/server/www/
Dremediation-pw.php15 $pw = $_POST["password"]; variable
16 if (strlen($id) < 32 || !isset($pw)) {
30 if (!$db->exec("UPDATE sessions SET password='$pw' WHERE rowid=$rowid")) {
Dadd-mo.php16 $pw = $_POST["password"]; variable
17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) {
45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' W…
Dspp.php63 $pw = $row['osu_password']; variable
65 $pw = $row['password']; variable
70 if (strlen($pw) < 1) {
75 $A1 = md5($user . ':' . $realm . ':' . $pw);
Dadd-free.php37 $pw = $row['password']; variable
39 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', machine_managed='…
Dest.php59 $pw = $row['password']; variable
60 if (strlen($pw) < 1) {
65 $A1 = md5($user . ':' . $realm . ':' . $pw);
/hostap-latest/src/tls/
Dpkcs5.c400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument
431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen()
492 u8 *pw; in pkcs12_crypto_init_sha1() local
501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1()
502 if (!pw) in pkcs12_crypto_init_sha1()
506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1()
510 if (pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, in pkcs12_crypto_init_sha1()
513 pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, in pkcs12_crypto_init_sha1()
516 os_free(pw); in pkcs12_crypto_init_sha1()
520 os_free(pw); in pkcs12_crypto_init_sha1()
/hostap-latest/wpa_supplicant/
Dap.c617 struct sae_password_entry *pw; in wpa_supplicant_conf_ap() local
619 pw = os_zalloc(sizeof(*pw)); in wpa_supplicant_conf_ap()
620 if (!pw) in wpa_supplicant_conf_ap()
622 os_memset(pw->peer_addr, 0xff, ETH_ALEN); in wpa_supplicant_conf_ap()
623 pw->password = os_strdup(ssid->sae_password); in wpa_supplicant_conf_ap()
624 if (!pw->password) { in wpa_supplicant_conf_ap()
625 os_free(pw); in wpa_supplicant_conf_ap()
629 pw->identifier = os_strdup(ssid->sae_password_id); in wpa_supplicant_conf_ap()
630 if (!pw->identifier) { in wpa_supplicant_conf_ap()
631 str_clear_free(pw->password); in wpa_supplicant_conf_ap()
[all …]
/hostap-latest/src/crypto/
Daes-siv.c120 const u8 *pw, size_t pwlen, in aes_siv_encrypt() argument
143 _addr[num_elem] = pw; in aes_siv_encrypt()
153 os_memcpy(crypt_pw, pw, pwlen); in aes_siv_encrypt()
Daes_siv.h13 const u8 *pw, size_t pwlen,
/hostap-latest/src/wps/
Dwps_common.c676 struct wpabuf *pw; in wps_nfc_token_gen() local
679 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); in wps_nfc_token_gen()
680 if (pw == NULL) in wps_nfc_token_gen()
683 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), in wps_nfc_token_gen()
686 wpabuf_free(pw); in wps_nfc_token_gen()
691 wpabuf_free(pw); in wps_nfc_token_gen()
697 *dev_pw = pw; in wps_nfc_token_gen()
/hostap-latest/hs20/client/
Dosu_client.h71 const char *alt_loc, char **user, char **pw);
119 const char *user, const char *pw);
Dosu_client.c140 char *url, *user = NULL, *pw = NULL; in osu_get_certificate() local
192 pw = xml_node_get_base64_text(ctx->xml, node, NULL); in osu_get_certificate()
193 if (pw == NULL) { in osu_get_certificate()
197 wpa_printf(MSG_INFO, "estPassword: %s", pw); in osu_get_certificate()
205 est_simple_enroll(ctx, url, user, pw) < 0) in osu_get_certificate()
212 xml_node_get_text_free(ctx->xml, pw); in osu_get_certificate()
741 const char *alt_loc, char **user, char **pw) in get_user_pw() argument
753 *pw = xml_node_get_base64_text(ctx->xml, node, NULL); in get_user_pw()
767 free(*pw); in get_user_pw()
768 *pw = xml_node_get_base64_text(ctx->xml, a, NULL); in get_user_pw()
[all …]

12