/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 45 password = eap_get_config_otp(sm, &password_len); 49 password = eap_get_config_password(sm, &password_len); 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len);
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 65 password, password_len); 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 99 if (nt_password_hash(password, password_len, password_hash) || 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 77 password = eap_get_config_otp(sm, &password_len); 81 password = eap_get_config_password(sm, &password_len); 98 plen = password_len; 113 wpabuf_put_data(resp, password, password_len);
|
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 38 password = eap_get_config_password(sm, &password_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_pwd.c | 31 size_t password_len; member in struct:eap_pwd_data 96 size_t identity_len, password_len; local 101 password = eap_get_config_password2(sm, &password_len, &pwhash); 127 if ((data->password = os_malloc(password_len)) == NULL) { 133 os_memcpy(data->password, password, password_len); 134 data->password_len = password_len; 190 bin_clear_free(data->password, data->password_len); 364 size_t password_len; local 409 data->password_len, pwhas [all...] |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 120 nt_challenge_response(challenge, password, password_len, rpos))) { 195 size_t password_len, len; local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); 240 if (nt_password_hash(password, password_len, pw_hash) || 282 size_t password_len; local 285 password = eap_get_config_password(sm, &password_len); 342 size_t elen[5], password_len; local 348 password = eap_get_config_password2(sm, &password_len, [all...] |
H A D | eap_vendor_test.c | 35 size_t password_len; local 43 password = eap_get_config_password(sm, &password_len); 44 data->test_pending_req = password && password_len == 7 &&
|
H A D | eap_mschapv2.c | 154 size_t identity_len, password_len; local 161 password = eap_get_config_password2(sm, &password_len, &pwhash); 206 password_len, pwhash, auth_challenge, 304 bin_clear_free(config->password, config->password_len); 309 config->password_len = 16; 315 config->password_len); 317 config->password_len = 0; 323 config->password_len = config->new_password_len; 520 size_t username_len, password_len, new_password_len; 527 password = eap_get_config_password2(sm, &password_len, [all...] |
H A D | eap_config.h | 71 * password_len - Length of password field 73 size_t password_len; member in struct:eap_peer_config
|
H A D | eap_ttls.c | 489 size_t identity_len, password_len; 495 password = eap_get_config_password2(sm, &password_len, &pwhash); 544 password_len, pwhash, challenge, 583 size_t identity_len, password_len; 589 password = eap_get_config_password2(sm, &password_len, &pwhash); 642 if (nt_challenge_response(challenge, password, password_len, 652 password, password_len); 683 size_t identity_len, password_len; local 688 password = eap_get_config_password(sm, &password_len); 692 msg = wpabuf_alloc(identity_len + password_len [all...] |
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; local 91 password = eap_get_config_password(sm, &password_len); 93 data->ikev2.shared_secret = os_memdup(password, password_len); 96 data->ikev2.shared_secret_len = password_len;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 32 size_t password_len, u8 *response); 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
H A D | ms_funcs.c | 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 167 * @password_len: Length of password 173 const u8 *password, size_t password_len, 181 nt_password_hash(password, password_len, password_hash) || 273 * @password_len: Length of password 283 int generate_authenticator_response(const u8 *password, size_t password_len, argument 290 if (nt_password_hash(password, password_len, password_hash)) 302 * @password_len 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 431 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); 87 user->password_len = os_strlen(argv[i]); 122 (user->password == NULL || len > user->password_len)) { 123 bin_clear_free(user->password, user->password_len); 124 user->password_len = os_strlen(argv[id]); 171 hapd->tmp_eap_user.password_len); 216 user->identity_len = user->password_len; 218 user->password_len = 0; 255 wsc_registrar.password_len = conf->ap_pin ?
|
H A D | authsrv.c | 75 eap_user->password_len); 78 user->password_len = eap_user->password_len;
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_pwd.c | 28 size_t password_len; member in struct:eap_pwd_data 90 sm->user->password_len == 0) { 109 data->password = os_malloc(sm->user->password_len); 117 data->password_len = sm->user->password_len; 118 os_memcpy(data->password, sm->user->password, data->password_len); 128 bin_clear_free(data->password, data->password_len); 155 bin_clear_free(data->password, data->password_len); 193 data->password, data->password_len); 203 switch (data->password_len) { 574 size_t password_len; local [all...] |
H A D | eap_server_ttls.c | 261 size_t password_len = dlen; local 262 while (password_len > 0 && 263 password[password_len - 1] == '\0') { 264 password_len--; 268 password, password_len); 270 parse->user_password_len = password_len; 540 if (sm->user->password_len != user_password_len || 559 size_t password_len) 565 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) { 569 (unsigned long) password_len); 554 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
H A D | eap_server_md5.c | 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
H A D | eap.h | 31 size_t password_len; member in struct:eap_user
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | sae.h | 69 const u8 *password, size_t password_len,
|
H A D | sae.c | 278 size_t password_len, const char *identifier) 300 dummy_password = os_malloc(password_len); 301 tmp_password = os_malloc(password_len); 303 random_get_bytes(dummy_password, password_len) < 0) 321 password, password_len); 335 len[0] = password_len; 364 password_len, tmp_password); 425 bin_clear_free(tmp_password, password_len); 436 size_t password_len, const char *identifier) 461 password, password_len); 276 sae_derive_pwe_ecc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier) argument 434 sae_derive_pwe_ffc(struct sae_data *sae, const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier) argument 597 sae_prepare_commit(const u8 *addr1, const u8 *addr2, const u8 *password, size_t password_len, const char *identifier, struct sae_data *sae) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_pwd_common.h | 58 const u8 *password, size_t password_len,
|
H A D | eap_eke_common.h | 86 const u8 *password, size_t password_len,
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | crypto.c | 271 apr_size_t password_len, assembled_len = 0; 320 password_len = strlen(password); 321 assembled_len = RANDOM_PREFIX_LEN + password_len; 326 memcpy(assembled + RANDOM_PREFIX_LEN, password, password_len); 337 memcpy(assembled + RANDOM_PREFIX_LEN, password, password_len); 338 *(assembled + RANDOM_PREFIX_LEN + password_len) = '\0'; 339 memcpy(assembled + RANDOM_PREFIX_LEN + password_len + 1, 269 apr_size_t password_len, assembled_len = 0; local
|