Searched refs:password_len (Results 1 - 25 of 37) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_otp.c40 size_t password_len, len; local
51 password = eap_get_config_otp(sm, &password_len);
55 password = eap_get_config_password(sm, &password_len);
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
H A Dmschapv2.c43 const u8 *password, size_t password_len,
71 password, password_len);
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
99 if (nt_password_hash(password, password_len, password_hash) ||
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h25 const u8 *password, size_t password_len,
H A Deap_gtc.c57 size_t password_len, identity_len, len, plen; local
83 password = eap_get_config_otp(sm, &password_len);
87 password = eap_get_config_password(sm, &password_len);
104 plen = password_len;
119 wpabuf_put_data(resp, password, password_len);
H A Deap_md5.c42 size_t len, challenge_len, password_len; local
44 password = eap_get_config_password(sm, &password_len);
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
H A Deap_leap.c72 size_t identity_len, password_len, len; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
126 nt_challenge_response(challenge, password, password_len, rpos);
196 size_t password_len, len; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
241 if (nt_password_hash(password, password_len, pw_hash) ||
280 size_t password_len; local
283 password = eap_get_config_password(sm, &password_len);
340 size_t elen[5], password_len; local
346 password = eap_get_config_password2(sm, &password_len,
[all...]
H A Deap_config.h71 * password_len - Length of password field
73 size_t password_len; member in struct:eap_peer_config
H A Deap_mschapv2.c161 size_t identity_len, password_len; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
213 password_len, pwhash, auth_challenge,
314 config->password_len = 16;
323 config->password_len = config->new_password_len;
508 size_t username_len, password_len, new_password_len; local
515 password = eap_get_config_password2(sm, &password_len, &pwhash);
548 password, password_len, cp->encr_password))
563 password, password_len, cp->encr_hash);
H A Deap_ikev2.c68 size_t identity_len, password_len; local
93 password = eap_get_config_password(sm, &password_len);
95 data->ikev2.shared_secret = os_malloc(password_len);
98 os_memcpy(data->ikev2.shared_secret, password, password_len);
99 data->ikev2.shared_secret_len = password_len;
H A Deap_ttls.c646 size_t identity_len, password_len; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
695 password_len, pwhash, challenge,
736 size_t identity_len, password_len; local
742 password = eap_get_config_password2(sm, &password_len, &pwhash);
786 nt_challenge_response(challenge, password, password_len,
789 password, password_len);
826 size_t identity_len, password_len; local
831 password = eap_get_config_password(sm, &password_len);
835 msg = wpabuf_alloc(identity_len + password_len
886 size_t identity_len, password_len; local
[all...]
H A Deap_gpsk.c87 size_t identity_len, password_len; local
89 password = eap_get_config_password(sm, &password_len);
111 data->psk = os_malloc(password_len);
116 os_memcpy(data->psk, password, password_len);
117 data->psk_len = password_len;
H A Deap_psk.c41 size_t identity_len, password_len; local
43 password = eap_get_config_password(sm, &password_len);
44 if (!password || password_len != 16) {
H A Deap_sake.c77 size_t identity_len, password_len; local
79 password = eap_get_config_password(sm, &password_len);
80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
H A Deap_pax.c56 size_t identity_len, password_len; local
59 password = eap_get_config_password(sm, &password_len);
66 if (password_len != EAP_PAX_AK_LEN) {
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 int generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 int nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
H A Dms_funcs.c57 * @password_len: Length of password
61 int nt_password_hash(const u8 *password, size_t password_len, argument
67 if (password_len > 256)
68 password_len = 256;
71 for (i = 0; i < password_len; i++) {
76 len = password_len * 2;
121 * @password_len: Length of password
127 const u8 *password, size_t password_len,
135 if (nt_password_hash(password, password_len, password_hash))
229 * @password_len
125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
262 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
384 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dauthsrv.c82 user->password = os_malloc(eap_user->password_len);
86 eap_user->password_len);
87 user->password_len = eap_user->password_len;
H A Dap_config.h116 size_t password_len; member in struct:hostapd_eap_user
H A Dieee802_1x.c1535 user->password = os_malloc(eap_user->password_len);
1539 eap_user->password_len);
1540 user->password_len = eap_user->password_len;
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap.h38 size_t password_len; member in struct:eap_user
H A Deap_server_ttls.c250 size_t password_len = dlen; local
251 while (password_len > 0 &&
252 password[password_len - 1] == '\0') {
253 password_len--;
257 password, password_len);
259 parse->user_password_len = password_len;
638 if (sm->user->password_len != user_password_len ||
657 size_t password_len)
663 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
667 (unsigned long) password_len);
652 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
H A Deap_server_md5.c127 chap_md5(id, sm->user->password, sm->user->password_len,
H A Deap_server_mschapv2.c386 sm->user->password_len,
408 sm->user->password_len,
H A Deap_server_gtc.c183 if (rlen != sm->user->password_len ||
H A Deap_server_ikev2.c55 *secret_len = sm->user->password_len;

Completed in 216 milliseconds

12