/external/chromium/net/http/ |
H A D | http_response_info.h | 80 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo 84 // because it is similar to |auth_challenge|, but unlike HTTP authentication
|
H A D | http_auth_cache.h | 76 const std::string& auth_challenge, 97 // |auth_challenge| and the nonce count is reset. 103 const std::string& auth_challenge); 130 const std::string auth_challenge() const { function in class:net::HttpAuthCache::Entry 148 void UpdateStaleChallenge(const std::string& auth_challenge);
|
H A D | http_auth_cache.cc | 114 const std::string& auth_challenge, 140 entry->auth_challenge_ = auth_challenge; 153 const std::string& auth_challenge) { 154 auth_challenge_ = auth_challenge; 220 const std::string& auth_challenge) { 224 entry->UpdateStaleChallenge(auth_challenge); 111 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const string16& username, const string16& password, const std::string& path) argument 152 UpdateStaleChallenge( const std::string& auth_challenge) argument 217 UpdateStaleChallenge(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge) argument
|
H A D | http_auth_cache_unittest.cc | 146 EXPECT_EQ("Basic realm=Realm3", entry->auth_challenge()); 157 EXPECT_EQ("Digest realm=Realm3", entry->auth_challenge()); 166 EXPECT_EQ("Basic realm=Realm2", entry->auth_challenge()); 265 const std::string auth_challenge = "Basic realm=MyRealm"; local 271 origin, handler->realm(), handler->auth_scheme(), auth_challenge, 273 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge, 275 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
|
/external/wpa_supplicant/tests/ |
H A D | test_ms_funcs.c | 23 u8 auth_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_ms_funcs.c | 23 u8 auth_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 45 const u8 *auth_challenge, 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 62 auth_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge, 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_i.h | 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_mschapv2.c | 95 u8 *auth_challenge; member in struct:eap_mschapv2_data 126 if (sm->auth_challenge) { 127 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 128 if (data->auth_challenge == NULL) { 132 os_memcpy(data->auth_challenge, sm->auth_challenge, 146 os_free(data->auth_challenge); 154 u8 mschapv2_id, const u8 *auth_challenge) 207 if (data->auth_challenge) { 208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate 152 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 45 const u8 *auth_challenge, 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 62 auth_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge, 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_i.h | 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_mschapv2.c | 96 u8 *auth_challenge; member in struct:eap_mschapv2_data 127 if (sm->auth_challenge) { 128 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 129 if (data->auth_challenge == NULL) { 133 os_memcpy(data->auth_challenge, sm->auth_challenge, 147 os_free(data->auth_challenge); 155 u8 mschapv2_id, const u8 *auth_challenge) 208 if (data->auth_challenge) { 209 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate 153 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 45 const u8 *auth_challenge, 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 62 auth_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge, 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 45 const u8 *auth_challenge, 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 62 auth_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge, 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
/external/wpa_supplicant/ |
H A D | ms_funcs.c | 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 42 addr[1] = auth_challenge; 112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 144 void generate_nt_response_pwhash(const u8 *auth_challenge, argument 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 163 * @auth_challenge 169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
H A D | eap_i.h | 333 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_mschapv2.c | 97 u8 *auth_challenge; member in struct:eap_mschapv2_data 133 if (sm->auth_challenge) { 134 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 135 if (data->auth_challenge == NULL) { 139 os_memcpy(data->auth_challenge, sm->auth_challenge, 153 os_free(data->auth_challenge); 184 const u8 *auth_challenge, const u8 *peer_challenge, 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 190 auth_challenge, MSCHAPV2_CHAL_LE 180 eap_mschapv2_derive_response( struct eap_mschapv2_data *data, const u8 *username, size_t username_len, const u8 *password, size_t password_len, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response) argument 219 eap_mschapv2_challenge_reply(struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge, size_t *respDataLen) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 42 addr[1] = auth_challenge; 112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 144 void generate_nt_response_pwhash(const u8 *auth_challenge, argument 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 163 * @auth_challenge 169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 42 addr[1] = auth_challenge; 116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, 144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 160 if (challenge_hash(peer_challenge, auth_challenge, 174 * @auth_challenge 181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 42 addr[1] = auth_challenge; 116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, 144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 160 if (challenge_hash(peer_challenge, auth_challenge, 174 * @auth_challenge 181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 42 addr[1] = auth_challenge; 116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, 144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 160 if (challenge_hash(peer_challenge, auth_challenge, 174 * @auth_challenge 181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_mschapv2.c | 52 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 72 if (sm->auth_challenge) { 73 os_memcpy(data->auth_challenge, sm->auth_challenge, 112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) { 136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 140 data->auth_challenge, CHALLENGE_LEN); 375 generate_nt_response_pwhash(data->auth_challenge, 381 generate_nt_response(data->auth_challenge, peer_challenge, 407 pw_hash, peer_challenge, data->auth_challenge, [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 73 if (sm->auth_challenge) { 74 os_memcpy(data->auth_challenge, sm->auth_challenge, 113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 141 data->auth_challenge, CHALLENGE_LEN); 377 res = generate_nt_response_pwhash(data->auth_challenge, 383 res = generate_nt_response(data->auth_challenge, 414 pw_hash, peer_challenge, data->auth_challenge, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 73 if (sm->auth_challenge) { 74 os_memcpy(data->auth_challenge, sm->auth_challenge, 113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 141 data->auth_challenge, CHALLENGE_LEN); 377 res = generate_nt_response_pwhash(data->auth_challenge, 383 res = generate_nt_response(data->auth_challenge, 414 pw_hash, peer_challenge, data->auth_challenge, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 73 if (sm->auth_challenge) { 74 os_memcpy(data->auth_challenge, sm->auth_challenge, 113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 141 data->auth_challenge, CHALLENGE_LEN); 377 res = generate_nt_response_pwhash(data->auth_challenge, 383 res = generate_nt_response(data->auth_challenge, 414 pw_hash, peer_challenge, data->auth_challenge, [all...] |