Home
last modified time | relevance | path

Searched refs:auth_challenge (Results 1 - 24 of 24) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge, in mschapv2_derive_response()
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
56 auth_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
83 auth_challenge, in mschapv2_derive_response()
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
H A Deap_mschapv2.c90 u8 *auth_challenge; member
120 if (sm->auth_challenge) { in eap_mschapv2_init()
121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
123 if (data->auth_challenge == NULL) { in eap_mschapv2_init()
139 os_free(data->auth_challenge); in eap_mschapv2_deinit()
147 u8 mschapv2_id, const u8 *auth_challenge) in eap_mschapv2_challenge_reply()
200 if (data->auth_challenge) { in eap_mschapv2_challenge_reply()
201 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply()
203 auth_challenge in eap_mschapv2_challenge_reply()
145 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) eap_mschapv2_challenge_reply() argument
[all...]
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
H A Deap_fast.c354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method()
360 sm->auth_challenge = NULL; in eap_fast_init_phase2_method()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge, in mschapv2_derive_response()
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
56 auth_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
83 auth_challenge, in mschapv2_derive_response()
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
H A Deap_mschapv2.c90 u8 *auth_challenge; member
120 if (sm->auth_challenge) { in eap_mschapv2_init()
121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
123 if (data->auth_challenge == NULL) { in eap_mschapv2_init()
139 os_free(data->auth_challenge); in eap_mschapv2_deinit()
147 u8 mschapv2_id, const u8 *auth_challenge) in eap_mschapv2_challenge_reply()
200 if (data->auth_challenge) { in eap_mschapv2_challenge_reply()
201 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply()
203 auth_challenge in eap_mschapv2_challenge_reply()
145 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) eap_mschapv2_challenge_reply() argument
[all...]
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
H A Deap_fast.c354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method()
360 sm->auth_challenge = NULL; in eap_fast_init_phase2_method()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
90 addr[1] = auth_challenge; in challenge_hash()
162 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
190 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
198 int generate_nt_response_pwhash(const u8 *auth_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
220 * @auth_challenge
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
[all...]
H A Dcrypto_module_tests.c2050 u8 auth_challenge[] = { in test_ms_funcs() local
2093 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2110 peer_challenge, auth_challenge, in test_ms_funcs()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
90 addr[1] = auth_challenge; in challenge_hash()
162 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
190 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
198 int generate_nt_response_pwhash(const u8 *auth_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
220 * @auth_challenge
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
[all...]
H A Dcrypto_module_tests.c2199 u8 auth_challenge[] = { in test_ms_funcs() local
2242 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2259 peer_challenge, auth_challenge, in test_ms_funcs()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member
67 if (sm->auth_challenge) { in eap_mschapv2_init()
68 os_memcpy(data->auth_challenge, sm->auth_challenge, in eap_mschapv2_init()
105 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge()
129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
133 data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
366 if (challenge_hash(peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
390 res = generate_nt_response_pwhash(data->auth_challenge, in eap_mschapv2_process_response()
396 res = generate_nt_response(data->auth_challenge, in eap_mschapv2_process_response()
[all...]
H A Deap_server_ttls.c699 *auth_challenge; in eap_ttls_process_phase2_mschapv2() local
760 auth_challenge = challenge; in eap_ttls_process_phase2_mschapv2()
765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", in eap_ttls_process_phase2_mschapv2()
766 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
771 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
776 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
788 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
804 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
810 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
H A Deap_i.h181 u8 *auth_challenge; member
H A Deap_server_fast.c959 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init()
965 sm->auth_challenge = NULL; in eap_fast_phase2_init()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member
67 if (sm->auth_challenge) { in eap_mschapv2_init()
68 os_memcpy(data->auth_challenge, sm->auth_challenge, in eap_mschapv2_init()
105 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge()
129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
133 data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
366 if (challenge_hash(peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
390 res = generate_nt_response_pwhash(data->auth_challenge, in eap_mschapv2_process_response()
396 res = generate_nt_response(data->auth_challenge, in eap_mschapv2_process_response()
[all...]
H A Deap_server_ttls.c700 *auth_challenge; in eap_ttls_process_phase2_mschapv2() local
761 auth_challenge = challenge; in eap_ttls_process_phase2_mschapv2()
766 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", in eap_ttls_process_phase2_mschapv2()
767 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
772 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
777 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
789 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
805 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
811 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
H A Deap_i.h179 u8 *auth_challenge; member
H A Deap_server_fast.c961 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init()
967 sm->auth_challenge = NULL; in eap_fast_phase2_init()

Completed in 25 milliseconds