/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 40 size_t password_len, len; local 51 password = eap_get_config_otp(sm, &password_len); 55 password = eap_get_config_password(sm, &password_len); 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len);
|
H A D | mschapv2.c | 43 const u8 *password, size_t password_len, 71 password, password_len); 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 25 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 83 password = eap_get_config_otp(sm, &password_len); 87 password = eap_get_config_password(sm, &password_len); 104 plen = password_len; 119 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 42 size_t len, challenge_len, password_len; local 44 password = eap_get_config_password(sm, &password_len); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
H A D | eap_leap.c | 72 size_t identity_len, password_len, len; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 126 nt_challenge_response(challenge, password, password_len, rpos); 196 size_t password_len, len; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 241 if (nt_password_hash(password, password_len, pw_hash) || 280 size_t password_len; local 283 password = eap_get_config_password(sm, &password_len); 340 size_t elen[5], password_len; local 346 password = eap_get_config_password2(sm, &password_len, [all...] |
H A D | eap_config.h | 71 * password_len - Length of password field 73 size_t password_len; member in struct:eap_peer_config
|
H A D | eap_mschapv2.c | 161 size_t identity_len, password_len; local 168 password = eap_get_config_password2(sm, &password_len, &pwhash); 213 password_len, pwhash, auth_challenge, 314 config->password_len = 16; 323 config->password_len = config->new_password_len; 508 size_t username_len, password_len, new_password_len; local 515 password = eap_get_config_password2(sm, &password_len, &pwhash); 548 password, password_len, cp->encr_password)) 563 password, password_len, cp->encr_hash);
|
H A D | eap_ikev2.c | 68 size_t identity_len, password_len; local 93 password = eap_get_config_password(sm, &password_len); 95 data->ikev2.shared_secret = os_malloc(password_len); 98 os_memcpy(data->ikev2.shared_secret, password, password_len); 99 data->ikev2.shared_secret_len = password_len;
|
H A D | eap_ttls.c | 646 size_t identity_len, password_len; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 695 password_len, pwhash, challenge, 736 size_t identity_len, password_len; local 742 password = eap_get_config_password2(sm, &password_len, &pwhash); 786 nt_challenge_response(challenge, password, password_len, 789 password, password_len); 826 size_t identity_len, password_len; local 831 password = eap_get_config_password(sm, &password_len); 835 msg = wpabuf_alloc(identity_len + password_len 886 size_t identity_len, password_len; local [all...] |
H A D | eap_gpsk.c | 87 size_t identity_len, password_len; local 89 password = eap_get_config_password(sm, &password_len); 111 data->psk = os_malloc(password_len); 116 os_memcpy(data->psk, password, password_len); 117 data->psk_len = password_len;
|
H A D | eap_psk.c | 41 size_t identity_len, password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 if (!password || password_len != 16) {
|
H A D | eap_sake.c | 77 size_t identity_len, password_len; local 79 password = eap_get_config_password(sm, &password_len); 80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
|
H A D | eap_pax.c | 56 size_t identity_len, password_len; local 59 password = eap_get_config_password(sm, &password_len); 66 if (password_len != EAP_PAX_AK_LEN) {
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 int generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 int nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
H A D | ms_funcs.c | 57 * @password_len: Length of password 61 int nt_password_hash(const u8 *password, size_t password_len, argument 67 if (password_len > 256) 68 password_len = 256; 71 for (i = 0; i < password_len; i++) { 76 len = password_len * 2; 121 * @password_len: Length of password 127 const u8 *password, size_t password_len, 135 if (nt_password_hash(password, password_len, password_hash)) 229 * @password_len 125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 262 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 384 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | authsrv.c | 82 user->password = os_malloc(eap_user->password_len); 86 eap_user->password_len); 87 user->password_len = eap_user->password_len;
|
H A D | ap_config.h | 116 size_t password_len; member in struct:hostapd_eap_user
|
H A D | ieee802_1x.c | 1535 user->password = os_malloc(eap_user->password_len); 1539 eap_user->password_len); 1540 user->password_len = eap_user->password_len;
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap.h | 38 size_t password_len; member in struct:eap_user
|
H A D | eap_server_ttls.c | 250 size_t password_len = dlen; local 251 while (password_len > 0 && 252 password[password_len - 1] == '\0') { 253 password_len--; 257 password, password_len); 259 parse->user_password_len = password_len; 638 if (sm->user->password_len != user_password_len || 657 size_t password_len) 663 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 667 (unsigned long) password_len); 652 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
H A D | eap_server_md5.c | 127 chap_md5(id, sm->user->password, sm->user->password_len,
|
H A D | eap_server_mschapv2.c | 386 sm->user->password_len, 408 sm->user->password_len,
|
H A D | eap_server_gtc.c | 183 if (rlen != sm->user->password_len ||
|
H A D | eap_server_ikev2.c | 55 *secret_len = sm->user->password_len;
|