/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 91 addr[1] = auth_challenge; 160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 177 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 205 if (challenge_hash(peer_challenge, auth_challenge, 219 * @auth_challenge 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *auth_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 351 sm->auth_challenge = data->key_block_p->server_challenge; 357 sm->auth_challenge = NULL;
|
H A D | eap_i.h | 340 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_mschapv2.c | 90 u8 *auth_challenge; member in struct:eap_mschapv2_data 121 if (sm->auth_challenge) { 122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 123 if (data->auth_challenge == NULL) { 127 os_memcpy(data->auth_challenge, sm->auth_challenge, 141 os_free(data->auth_challenge); 149 u8 mschapv2_id, const u8 *auth_challenge) 202 if (data->auth_challenge) { 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate 147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument [all...] |
H A D | mschapv2.c | 39 const u8 *auth_challenge, 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 56 auth_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 83 auth_challenge, 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 21 const u8 *auth_challenge,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 164 u8 *auth_challenge; member in struct:eap_sm
|
H A D | eap_server_fast.c | 952 sm->auth_challenge = data->key_block_p->server_challenge; 958 sm->auth_challenge = NULL;
|
H A D | eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 67 if (sm->auth_challenge) { 68 os_memcpy(data->auth_challenge, sm->auth_challenge, 106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 134 data->auth_challenge, CHALLENGE_LEN); 378 res = generate_nt_response_pwhash(data->auth_challenge, 384 res = generate_nt_response(data->auth_challenge, 418 pw_hash, peer_challenge, data->auth_challenge, [all...] |
H A D | eap_server_ttls.c | 658 *auth_challenge; local 719 auth_challenge = challenge; 724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 725 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 730 generate_nt_response_pwhash(auth_challenge, peer_challenge, 735 generate_nt_response(auth_challenge, peer_challenge, 751 peer_challenge, auth_challenge, 757 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 91 addr[1] = auth_challenge; 160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 177 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 205 if (challenge_hash(peer_challenge, auth_challenge, 219 * @auth_challenge 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *auth_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 351 sm->auth_challenge = data->key_block_p->server_challenge; 357 sm->auth_challenge = NULL;
|
H A D | eap_i.h | 340 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_mschapv2.c | 90 u8 *auth_challenge; member in struct:eap_mschapv2_data 121 if (sm->auth_challenge) { 122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 123 if (data->auth_challenge == NULL) { 127 os_memcpy(data->auth_challenge, sm->auth_challenge, 141 os_free(data->auth_challenge); 149 u8 mschapv2_id, const u8 *auth_challenge) 202 if (data->auth_challenge) { 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate 147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument [all...] |
H A D | mschapv2.c | 39 const u8 *auth_challenge, 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 56 auth_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 83 auth_challenge, 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 21 const u8 *auth_challenge,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 164 u8 *auth_challenge; member in struct:eap_sm
|
H A D | eap_server_fast.c | 952 sm->auth_challenge = data->key_block_p->server_challenge; 958 sm->auth_challenge = NULL;
|
H A D | eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 67 if (sm->auth_challenge) { 68 os_memcpy(data->auth_challenge, sm->auth_challenge, 106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 134 data->auth_challenge, CHALLENGE_LEN); 378 res = generate_nt_response_pwhash(data->auth_challenge, 384 res = generate_nt_response(data->auth_challenge, 418 pw_hash, peer_challenge, data->auth_challenge, [all...] |
H A D | eap_server_ttls.c | 658 *auth_challenge; local 719 auth_challenge = challenge; 724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 725 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 730 generate_nt_response_pwhash(auth_challenge, peer_challenge, 735 generate_nt_response(auth_challenge, peer_challenge, 751 peer_challenge, auth_challenge, 757 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 91 addr[1] = auth_challenge; 160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 177 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument 205 if (challenge_hash(peer_challenge, auth_challenge, 219 * @auth_challenge 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *auth_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 351 sm->auth_challenge = data->key_block_p->server_challenge; 357 sm->auth_challenge = NULL;
|