/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_otp.c | 34 size_t password_len, len; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_leap.c | 67 size_t identity_len, password_len, len; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 195 size_t password_len, len; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() 282 size_t password_len; in eap_leap_process() local 285 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 342 size_t elen[5], password_len; in eap_leap_getKey() local 348 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_getKey() [all …]
|
D | eap_pwd.c | 31 size_t password_len; member 96 size_t identity_len, password_len; in eap_pwd_init() local 101 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init() 127 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init() 133 os_memcpy(data->password, password, password_len); in eap_pwd_init() 134 data->password_len = password_len; in eap_pwd_init() 190 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit() 364 size_t password_len; in eap_pwd_perform_commit_exchange() local 409 data->password_len, pwhash); in eap_pwd_perform_commit_exchange() 421 password_len = sizeof(pwhashhash); in eap_pwd_perform_commit_exchange() [all …]
|
D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 98 plen = password_len; in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
|
D | eap_mschapv2.c | 154 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 206 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply() 304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 309 config->password_len = 16; in eap_mschapv2_password_changed() 315 config->password_len); in eap_mschapv2_password_changed() 317 config->password_len = 0; in eap_mschapv2_password_changed() 323 config->password_len = config->new_password_len; in eap_mschapv2_password_changed() 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 527 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password() [all …]
|
D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 38 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_ttls.c | 518 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() 524 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2() 573 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 612 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() 618 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap() 671 if (nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap() 681 password, password_len); in eap_ttls_phase2_request_mschap() 712 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local 717 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap() 721 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_otp.c | 34 size_t password_len, len; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
D | eap_pwd.c | 31 size_t password_len; member 96 size_t identity_len, password_len; in eap_pwd_init() local 101 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_pwd_init() 127 if ((data->password = os_malloc(password_len)) == NULL) { in eap_pwd_init() 133 os_memcpy(data->password, password, password_len); in eap_pwd_init() 134 data->password_len = password_len; in eap_pwd_init() 190 bin_clear_free(data->password, data->password_len); in eap_pwd_deinit() 364 size_t password_len; in eap_pwd_perform_commit_exchange() local 409 data->password_len, pwhash); in eap_pwd_perform_commit_exchange() 421 password_len = sizeof(pwhashhash); in eap_pwd_perform_commit_exchange() [all …]
|
D | eap_leap.c | 67 size_t identity_len, password_len, len; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 195 size_t password_len, len; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() 282 size_t password_len; in eap_leap_process() local 285 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 342 size_t elen[5], password_len; in eap_leap_getKey() local 348 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_getKey() [all …]
|
D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 98 plen = password_len; in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
|
D | eap_mschapv2.c | 154 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 206 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply() 304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 309 config->password_len = 16; in eap_mschapv2_password_changed() 315 config->password_len); in eap_mschapv2_password_changed() 317 config->password_len = 0; in eap_mschapv2_password_changed() 323 config->password_len = config->new_password_len; in eap_mschapv2_password_changed() 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 527 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_change_password() [all …]
|
D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 38 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_ttls.c | 489 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() 495 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschapv2() 544 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 583 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() 589 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_ttls_phase2_request_mschap() 642 if (nt_challenge_response(challenge, password, password_len, in eap_ttls_phase2_request_mschap() 652 password, password_len); in eap_ttls_phase2_request_mschap() 683 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local 688 password = eap_get_config_password(sm, &password_len); in eap_ttls_phase2_request_pap() 692 msg = wpabuf_alloc(identity_len + password_len + 100); in eap_ttls_phase2_request_pap() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 307 size_t password_len, u8 *response) in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash() [all …]
|
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 307 size_t password_len, u8 *response) in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash() [all …]
|
D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 87 user->password_len = os_strlen(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 124 user->password_len = os_strlen(argv[id]); in get_wildcard_cb() 171 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get() 216 user->identity_len = user->password_len; in eap_user_sqlite_get() 218 user->password_len = 0; in eap_user_sqlite_get() 255 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 87 user->password_len = os_strlen(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 124 user->password_len = os_strlen(argv[id]); in get_wildcard_cb() 171 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get() 216 user->identity_len = user->password_len; in eap_user_sqlite_get() 218 user->password_len = 0; in eap_user_sqlite_get() 255 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkcs12.function | 30 size_t password_len = 0; 38 password_len = password_arg->len; 50 password_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_pwd.c | 28 size_t password_len; member 90 sm->user->password_len == 0) { in eap_pwd_init() 109 data->password = os_malloc(sm->user->password_len); in eap_pwd_init() 117 data->password_len = sm->user->password_len; in eap_pwd_init() 118 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init() 128 bin_clear_free(data->password, data->password_len); in eap_pwd_init() 155 bin_clear_free(data->password, data->password_len); in eap_pwd_reset() 193 data->password, data->password_len); in eap_pwd_build_id_req() 203 switch (data->password_len) { in eap_pwd_build_id_req() 216 (int) data->password_len); in eap_pwd_build_id_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_pwd.c | 28 size_t password_len; member 90 sm->user->password_len == 0) { in eap_pwd_init() 109 data->password = os_malloc(sm->user->password_len); in eap_pwd_init() 117 data->password_len = sm->user->password_len; in eap_pwd_init() 118 os_memcpy(data->password, sm->user->password, data->password_len); in eap_pwd_init() 128 bin_clear_free(data->password, data->password_len); in eap_pwd_init() 155 bin_clear_free(data->password, data->password_len); in eap_pwd_reset() 193 data->password, data->password_len); in eap_pwd_build_id_req() 203 switch (data->password_len) { in eap_pwd_build_id_req() 216 (int) data->password_len); in eap_pwd_build_id_req() [all …]
|