Searched refs:peer_challenge (Results 1 - 25 of 39) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c40 const u8 *peer_challenge,
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
58 peer_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
82 peer_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h22 const u8 *peer_challenge,
H A Deap_mschapv2.c41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
89 u8 *peer_challenge; member in struct:eap_mschapv2_data
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
113 if (data->peer_challenge == NULL) {
117 os_memcpy(data->peer_challenge, sm->peer_challenge,
140 os_free(data->peer_challenge);
153 u8 *peer_challenge; local
[all...]
H A Deap_leap.c31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
364 data->peer_challenge, LEAP_CHALLENGE_LEN);
378 addr[3] = data->peer_challenge;
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c40 const u8 *peer_challenge,
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
58 peer_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
82 peer_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h22 const u8 *peer_challenge,
H A Deap_mschapv2.c41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
89 u8 *peer_challenge; member in struct:eap_mschapv2_data
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
113 if (data->peer_challenge == NULL) {
117 os_memcpy(data->peer_challenge, sm->peer_challenge,
140 os_free(data->peer_challenge);
153 u8 *peer_challenge; local
[all...]
H A Deap_leap.c31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
364 data->peer_challenge, LEAP_CHALLENGE_LEN);
378 addr[3] = data->peer_challenge;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c40 const u8 *peer_challenge,
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
58 peer_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
82 peer_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h22 const u8 *peer_challenge,
H A Deap_mschapv2.c41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
89 u8 *peer_challenge; member in struct:eap_mschapv2_data
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
113 if (data->peer_challenge == NULL) {
117 os_memcpy(data->peer_challenge, sm->peer_challenge,
140 os_free(data->peer_challenge);
153 u8 *peer_challenge; local
[all...]
H A Deap_leap.c31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
364 data->peer_challenge, LEAP_CHALLENGE_LEN);
378 addr[3] = data->peer_challenge;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @peer_challenge: 16-octet PeerChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
89 addr[0] = peer_challenge;
161 * @peer_challenge: 16-octet PeerChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
190 * @peer_challenge: 16-octet PeerChallenge (IN)
198 const u8 *peer_challenge,
205 if (challenge_hash(peer_challenge, auth_challenge,
218 * @peer_challenge
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @peer_challenge: 16-octet PeerChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
89 addr[0] = peer_challenge;
161 * @peer_challenge: 16-octet PeerChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
190 * @peer_challenge: 16-octet PeerChallenge (IN)
198 const u8 *peer_challenge,
205 if (challenge_hash(peer_challenge, auth_challenge,
218 * @peer_challenge
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c74 * @peer_challenge: 16-octet PeerChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
89 addr[0] = peer_challenge;
161 * @peer_challenge: 16-octet PeerChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
190 * @peer_challenge: 16-octet PeerChallenge (IN)
198 const u8 *peer_challenge,
205 if (challenge_hash(peer_challenge, auth_challenge,
218 * @peer_challenge
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c49 u8 *peer_challenge; member in struct:eap_mschapv2_data
73 if (sm->peer_challenge) {
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
75 if (data->peer_challenge == NULL) {
79 os_memcpy(data->peer_challenge, sm->peer_challenge,
93 os_free(data->peer_challenge);
286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
314 peer_challenge = pos;
322 if (data->peer_challenge) {
[all...]
H A Deap_i.h165 u8 *peer_challenge; member in struct:eap_sm
H A Deap_server_ttls.c657 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
720 peer_challenge = response + 2;
726 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
727 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
730 generate_nt_response_pwhash(auth_challenge, peer_challenge,
735 generate_nt_response(auth_challenge, peer_challenge,
751 peer_challenge, auth_challenge,
757 peer_challenge, auth_challenge,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c49 u8 *peer_challenge; member in struct:eap_mschapv2_data
73 if (sm->peer_challenge) {
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
75 if (data->peer_challenge == NULL) {
79 os_memcpy(data->peer_challenge, sm->peer_challenge,
93 os_free(data->peer_challenge);
286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
314 peer_challenge = pos;
322 if (data->peer_challenge) {
[all...]
H A Deap_i.h165 u8 *peer_challenge; member in struct:eap_sm
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c49 u8 *peer_challenge; member in struct:eap_mschapv2_data
73 if (sm->peer_challenge) {
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
75 if (data->peer_challenge == NULL) {
79 os_memcpy(data->peer_challenge, sm->peer_challenge,
93 os_free(data->peer_challenge);
286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
314 peer_challenge = pos;
322 if (data->peer_challenge) {
[all...]
H A Deap_i.h165 u8 *peer_challenge; member in struct:eap_sm

Completed in 262 milliseconds

12