Searched refs:password_len (Results 1 - 25 of 55) sorted by relevance

123

/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_otp.c34 size_t password_len, len; local
45 password = eap_get_config_otp(sm, &password_len);
49 password = eap_get_config_password(sm, &password_len);
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
H A Dmschapv2.c37 const u8 *password, size_t password_len,
65 password, password_len);
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
98 plen = password_len;
113 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
38 password = eap_get_config_password(sm, &password_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Deap_pwd.c31 size_t password_len; member in struct:eap_pwd_data
96 size_t identity_len, password_len; local
101 password = eap_get_config_password2(sm, &password_len, &pwhash);
127 if ((data->password = os_malloc(password_len)) == NULL) {
133 os_memcpy(data->password, password, password_len);
134 data->password_len = password_len;
190 bin_clear_free(data->password, data->password_len);
364 size_t password_len; local
409 data->password_len, pwhas
[all...]
H A Deap_leap.c67 size_t identity_len, password_len, len; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
120 nt_challenge_response(challenge, password, password_len, rpos))) {
195 size_t password_len, len; local
200 password = eap_get_config_password2(sm, &password_len, &pwhash);
240 if (nt_password_hash(password, password_len, pw_hash) ||
282 size_t password_len; local
285 password = eap_get_config_password(sm, &password_len);
342 size_t elen[5], password_len; local
348 password = eap_get_config_password2(sm, &password_len,
[all...]
H A Deap_vendor_test.c35 size_t password_len; local
43 password = eap_get_config_password(sm, &password_len);
44 data->test_pending_req = password && password_len == 7 &&
H A Deap_mschapv2.c154 size_t identity_len, password_len; local
161 password = eap_get_config_password2(sm, &password_len, &pwhash);
206 password_len, pwhash, auth_challenge,
304 bin_clear_free(config->password, config->password_len);
309 config->password_len = 16;
315 config->password_len);
317 config->password_len = 0;
323 config->password_len = config->new_password_len;
520 size_t username_len, password_len, new_password_len;
527 password = eap_get_config_password2(sm, &password_len,
[all...]
H A Deap_config.h71 * password_len - Length of password field
73 size_t password_len; member in struct:eap_peer_config
H A Deap_ttls.c489 size_t identity_len, password_len;
495 password = eap_get_config_password2(sm, &password_len, &pwhash);
544 password_len, pwhash, challenge,
583 size_t identity_len, password_len;
589 password = eap_get_config_password2(sm, &password_len, &pwhash);
642 if (nt_challenge_response(challenge, password, password_len,
652 password, password_len);
683 size_t identity_len, password_len; local
688 password = eap_get_config_password(sm, &password_len);
692 msg = wpabuf_alloc(identity_len + password_len
[all...]
H A Deap_ikev2.c62 size_t identity_len, password_len; local
91 password = eap_get_config_password(sm, &password_len);
93 data->ikev2.shared_secret = os_memdup(password, password_len);
96 data->ikev2.shared_secret_len = password_len;
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
32 size_t password_len, u8 *response);
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
H A Dms_funcs.c105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len, argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
167 * @password_len: Length of password
173 const u8 *password, size_t password_len,
181 nt_password_hash(password, password_len, password_hash) ||
273 * @password_len: Length of password
283 int generate_authenticator_response(const u8 *password, size_t password_len, argument
290 if (nt_password_hash(password, password_len, password_hash))
302 * @password_len
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
431 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/ap/
H A Deap_user_db.c86 bin_clear_free(user->password, user->password_len);
87 user->password_len = os_strlen(argv[i]);
122 (user->password == NULL || len > user->password_len)) {
123 bin_clear_free(user->password, user->password_len);
124 user->password_len = os_strlen(argv[id]);
171 hapd->tmp_eap_user.password_len);
216 user->identity_len = user->password_len;
218 user->password_len = 0;
255 wsc_registrar.password_len = conf->ap_pin ?
H A Dauthsrv.c75 eap_user->password_len);
78 user->password_len = eap_user->password_len;
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_pwd.c28 size_t password_len; member in struct:eap_pwd_data
90 sm->user->password_len == 0) {
109 data->password = os_malloc(sm->user->password_len);
117 data->password_len = sm->user->password_len;
118 os_memcpy(data->password, sm->user->password, data->password_len);
128 bin_clear_free(data->password, data->password_len);
155 bin_clear_free(data->password, data->password_len);
193 data->password, data->password_len);
203 switch (data->password_len) {
574 size_t password_len; local
[all...]
H A Deap_server_ttls.c261 size_t password_len = dlen; local
262 while (password_len > 0 &&
263 password[password_len - 1] == '\0') {
264 password_len--;
268 password, password_len);
270 parse->user_password_len = password_len;
540 if (sm->user->password_len != user_password_len ||
559 size_t password_len)
565 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
569 (unsigned long) password_len);
554 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
H A Deap_server_md5.c122 if (chap_md5(id, sm->user->password, sm->user->password_len,
H A Deap.h31 size_t password_len; member in struct:eap_user
/freebsd-11-stable/contrib/wpa/src/common/
H A Dsae.h69 const u8 *password, size_t password_len,
H A Dsae.c278 size_t password_len, const char *identifier)
300 dummy_password = os_malloc(password_len);
301 tmp_password = os_malloc(password_len);
303 random_get_bytes(dummy_password, password_len) < 0)
321 password, password_len);
335 len[0] = password_len;
364 password_len, tmp_password);
425 bin_clear_free(tmp_password, password_len);
436 size_t password_len, const char *identifier)
461 password, password_len);
276 sae_derive_pwe_ecc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier) argument
434 sae_derive_pwe_ffc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier) argument
597 sae_prepare_commit(const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier, struct sae_data *sae) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_pwd_common.h58 const u8 *password, size_t password_len,
H A Deap_eke_common.h86 const u8 *password, size_t password_len,
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dcrypto.c271 apr_size_t password_len, assembled_len = 0;
320 password_len = strlen(password);
321 assembled_len = RANDOM_PREFIX_LEN + password_len;
326 memcpy(assembled + RANDOM_PREFIX_LEN, password, password_len);
337 memcpy(assembled + RANDOM_PREFIX_LEN, password, password_len);
338 *(assembled + RANDOM_PREFIX_LEN + password_len) = '\0';
339 memcpy(assembled + RANDOM_PREFIX_LEN + password_len + 1,
269 apr_size_t password_len, assembled_len = 0; local

Completed in 291 milliseconds

123