Searched defs:auth_challenge (Results 1 - 25 of 38) sorted by relevance

12

/external/chromium/net/http/
H A Dhttp_response_info.h80 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo
84 // because it is similar to |auth_challenge|, but unlike HTTP authentication
H A Dhttp_auth_cache.h76 const std::string& auth_challenge,
97 // |auth_challenge| and the nonce count is reset.
103 const std::string& auth_challenge);
130 const std::string auth_challenge() const { function in class:net::HttpAuthCache::Entry
148 void UpdateStaleChallenge(const std::string& auth_challenge);
H A Dhttp_auth_cache.cc114 const std::string& auth_challenge,
140 entry->auth_challenge_ = auth_challenge;
153 const std::string& auth_challenge) {
154 auth_challenge_ = auth_challenge;
220 const std::string& auth_challenge) {
224 entry->UpdateStaleChallenge(auth_challenge);
111 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const string16& username, const string16& password, const std::string& path) argument
152 UpdateStaleChallenge( const std::string& auth_challenge) argument
217 UpdateStaleChallenge(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge) argument
H A Dhttp_auth_cache_unittest.cc146 EXPECT_EQ("Basic realm=Realm3", entry->auth_challenge());
157 EXPECT_EQ("Digest realm=Realm3", entry->auth_challenge());
166 EXPECT_EQ("Basic realm=Realm2", entry->auth_challenge());
265 const std::string auth_challenge = "Basic realm=MyRealm"; local
271 origin, handler->realm(), handler->auth_scheme(), auth_challenge,
273 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
275 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
/external/wpa_supplicant/tests/
H A Dtest_ms_funcs.c23 u8 auth_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_ms_funcs.c23 u8 auth_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_i.h330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_mschapv2.c95 u8 *auth_challenge; member in struct:eap_mschapv2_data
126 if (sm->auth_challenge) {
127 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
128 if (data->auth_challenge == NULL) {
132 os_memcpy(data->auth_challenge, sm->auth_challenge,
146 os_free(data->auth_challenge);
154 u8 mschapv2_id, const u8 *auth_challenge)
207 if (data->auth_challenge) {
208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
152 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Deap_i.h330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_mschapv2.c96 u8 *auth_challenge; member in struct:eap_mschapv2_data
127 if (sm->auth_challenge) {
128 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
129 if (data->auth_challenge == NULL) {
133 os_memcpy(data->auth_challenge, sm->auth_challenge,
147 os_free(data->auth_challenge);
155 u8 mschapv2_id, const u8 *auth_challenge)
208 if (data->auth_challenge) {
209 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
153 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
/external/wpa_supplicant/
H A Dms_funcs.c27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
144 void generate_nt_response_pwhash(const u8 *auth_challenge, argument
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
163 * @auth_challenge
169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
H A Deap_i.h333 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_mschapv2.c97 u8 *auth_challenge; member in struct:eap_mschapv2_data
133 if (sm->auth_challenge) {
134 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
135 if (data->auth_challenge == NULL) {
139 os_memcpy(data->auth_challenge, sm->auth_challenge,
153 os_free(data->auth_challenge);
184 const u8 *auth_challenge, const u8 *peer_challenge,
189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
190 auth_challenge, MSCHAPV2_CHAL_LE
180 eap_mschapv2_derive_response( struct eap_mschapv2_data *data, const u8 *username, size_t username_len, const u8 *password, size_t password_len, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response) argument
219 eap_mschapv2_challenge_reply(struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge, size_t *respDataLen) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.c27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
144 void generate_nt_response_pwhash(const u8 *auth_challenge, argument
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
163 * @auth_challenge
169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
160 if (challenge_hash(peer_challenge, auth_challenge,
174 * @auth_challenge
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
160 if (challenge_hash(peer_challenge, auth_challenge,
174 * @auth_challenge
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
160 if (challenge_hash(peer_challenge, auth_challenge,
174 * @auth_challenge
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_mschapv2.c52 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
72 if (sm->auth_challenge) {
73 os_memcpy(data->auth_challenge, sm->auth_challenge,
112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) {
136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
140 data->auth_challenge, CHALLENGE_LEN);
375 generate_nt_response_pwhash(data->auth_challenge,
381 generate_nt_response(data->auth_challenge, peer_challenge,
407 pw_hash, peer_challenge, data->auth_challenge,
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
73 if (sm->auth_challenge) {
74 os_memcpy(data->auth_challenge, sm->auth_challenge,
113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
141 data->auth_challenge, CHALLENGE_LEN);
377 res = generate_nt_response_pwhash(data->auth_challenge,
383 res = generate_nt_response(data->auth_challenge,
414 pw_hash, peer_challenge, data->auth_challenge,
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
73 if (sm->auth_challenge) {
74 os_memcpy(data->auth_challenge, sm->auth_challenge,
113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
141 data->auth_challenge, CHALLENGE_LEN);
377 res = generate_nt_response_pwhash(data->auth_challenge,
383 res = generate_nt_response(data->auth_challenge,
414 pw_hash, peer_challenge, data->auth_challenge,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c53 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
73 if (sm->auth_challenge) {
74 os_memcpy(data->auth_challenge, sm->auth_challenge,
113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
141 data->auth_challenge, CHALLENGE_LEN);
377 res = generate_nt_response_pwhash(data->auth_challenge,
383 res = generate_nt_response(data->auth_challenge,
414 pw_hash, peer_challenge, data->auth_challenge,
[all...]

Completed in 239 milliseconds

12