Searched refs:auth_challenge (Results 1 - 25 of 45) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/chromium/net/http/
H A Dhttp_auth_cache.h76 const std::string& auth_challenge,
97 // |auth_challenge| and the nonce count is reset.
103 const std::string& auth_challenge);
130 const std::string auth_challenge() const { function in class:net::HttpAuthCache::Entry
148 void UpdateStaleChallenge(const std::string& auth_challenge);
H A Dhttp_response_info.h80 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo
84 // because it is similar to |auth_challenge|, but unlike HTTP authentication
H A Dhttp_auth_cache.cc114 const std::string& auth_challenge,
140 entry->auth_challenge_ = auth_challenge;
153 const std::string& auth_challenge) {
154 auth_challenge_ = auth_challenge;
220 const std::string& auth_challenge) {
224 entry->UpdateStaleChallenge(auth_challenge);
111 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const string16& username, const string16& password, const std::string& path) argument
152 UpdateStaleChallenge( const std::string& auth_challenge) argument
217 UpdateStaleChallenge(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge) argument
H A Dhttp_response_info.cc77 auth_challenge(rhs.auth_challenge),
96 auth_challenge = rhs.auth_challenge;
H A Dhttp_network_transaction_unittest.cc1095 // The password prompt info should have been set in response->auth_challenge.
1096 EXPECT_FALSE(response->auth_challenge.get() == NULL);
1098 EXPECT_EQ(L"www.google.com:80", response->auth_challenge->host_and_port);
1099 EXPECT_EQ(L"MyRealm1", response->auth_challenge->realm);
1100 EXPECT_EQ(L"basic", response->auth_challenge->scheme);
1112 EXPECT_TRUE(response->auth_challenge.get() == NULL);
1154 EXPECT_TRUE(response->auth_challenge.get() == NULL);
1220 // The password prompt info should have been set in response->auth_challenge.
1221 EXPECT_FALSE(response->auth_challenge.get() == NULL);
1223 EXPECT_EQ(L"www.google.com:80", response->auth_challenge
7413 std::string auth_challenge = "Mock realm=proxy"; local
7426 std::string auth_challenge = "Mock realm=server"; local
7523 std::string auth_challenge = "Mock realm=server"; local
[all...]
H A Dhttp_auth_cache_unittest.cc146 EXPECT_EQ("Basic realm=Realm3", entry->auth_challenge());
157 EXPECT_EQ("Digest realm=Realm3", entry->auth_challenge());
166 EXPECT_EQ("Basic realm=Realm2", entry->auth_challenge());
265 const std::string auth_challenge = "Basic realm=MyRealm"; local
271 origin, handler->realm(), handler->auth_scheme(), auth_challenge,
273 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
275 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
90 addr[1] = auth_challenge;
159 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
176 if (challenge_hash(peer_challenge, auth_challenge, username,
188 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
196 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
204 if (challenge_hash(peer_challenge, auth_challenge,
218 * @auth_challenge
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
90 addr[1] = auth_challenge;
159 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
176 if (challenge_hash(peer_challenge, auth_challenge, username,
188 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
196 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
204 if (challenge_hash(peer_challenge, auth_challenge,
218 * @auth_challenge
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
90 addr[1] = auth_challenge;
159 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
176 if (challenge_hash(peer_challenge, auth_challenge, username,
188 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
196 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
204 if (challenge_hash(peer_challenge, auth_challenge,
218 * @auth_challenge
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
107 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
131 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
135 data->auth_challenge, CHALLENGE_LEN);
371 res = generate_nt_response_pwhash(data->auth_challenge,
377 res = generate_nt_response(data->auth_challenge,
411 pw_hash, peer_challenge, data->auth_challenge,
[all...]
H A Deap_i.h164 u8 *auth_challenge; member in struct:eap_sm
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
107 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
131 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
135 data->auth_challenge, CHALLENGE_LEN);
371 res = generate_nt_response_pwhash(data->auth_challenge,
377 res = generate_nt_response(data->auth_challenge,
411 pw_hash, peer_challenge, data->auth_challenge,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
107 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
131 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
135 data->auth_challenge, CHALLENGE_LEN);
371 res = generate_nt_response_pwhash(data->auth_challenge,
377 res = generate_nt_response(data->auth_challenge,
411 pw_hash, peer_challenge, data->auth_challenge,
[all...]

Completed in 417 milliseconds

12