Lines Matching refs:password
231 u8 *password = dpos;
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp(sm->user->password, user_password, user_password_len) !=
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
533 if (challenge == NULL || password == NULL ||
537 "(challenge len %lu password len %lu)",
544 if (!sm->user || !sm->user->password || sm->user->password_hash ||
547 "password configured");
562 password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) {
571 chap_md5(password[0], sm->user->password, sm->user->password_len,
574 if (os_memcmp(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) == 0) {
575 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Correct user password");
578 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Invalid user password");
602 if (!sm->user || !sm->user->password ||
604 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: No user password "
629 challenge_response(challenge, sm->user->password, nt_response);
631 nt_challenge_response(challenge, sm->user->password,
669 if (!sm->user || !sm->user->password ||
671 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user password "
728 sm->user->password,
733 sm->user->password,
746 sm->user->password,
752 sm->user->password, sm->user->password_len,