Searched refs:auth_challenge (Results 1 - 25 of 46) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c39 const u8 *auth_challenge,
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56 auth_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
83 auth_challenge,
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h21 const u8 *auth_challenge,
H A Deap_mschapv2.c90 u8 *auth_challenge; member in struct:eap_mschapv2_data
121 if (sm->auth_challenge) {
122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
123 if (data->auth_challenge == NULL) {
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
141 os_free(data->auth_challenge);
149 u8 mschapv2_id, const u8 *auth_challenge)
202 if (data->auth_challenge) {
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
/external/chromium_org/net/http/
H A Dhttp_auth_cache.h49 const std::string auth_challenge() const { function in class:net::HttpAuthCache::Entry
62 void UpdateStaleChallenge(const std::string& auth_challenge);
150 const std::string& auth_challenge,
171 // |auth_challenge| and the nonce count is reset.
177 const std::string& auth_challenge);
H A Dhttp_auth_cache.cc138 const std::string& auth_challenge,
173 entry->auth_challenge_ = auth_challenge;
186 const std::string& auth_challenge) {
187 auth_challenge_ = auth_challenge;
259 const std::string& auth_challenge) {
263 entry->UpdateStaleChallenge(auth_challenge);
274 it->auth_challenge(), it->credentials(),
135 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const AuthCredentials& credentials, const std::string& path) argument
185 UpdateStaleChallenge( const std::string& auth_challenge) argument
256 UpdateStaleChallenge(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge) argument
H A Dhttp_response_info.h121 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo
125 // because it is similar to |auth_challenge|, but unlike HTTP authentication
H A Dhttp_response_info.cc123 auth_challenge(rhs.auth_challenge),
148 auth_challenge = rhs.auth_challenge;
H A Dproxy_client_socket.cc51 response->auth_challenge = auth->auth_info();
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
91 addr[1] = auth_challenge;
160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
205 if (challenge_hash(peer_challenge, auth_challenge,
219 * @auth_challenge
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
91 addr[1] = auth_challenge;
160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
205 if (challenge_hash(peer_challenge, auth_challenge,
219 * @auth_challenge
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
91 addr[1] = auth_challenge;
160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
177 if (challenge_hash(peer_challenge, auth_challenge, username,
189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
197 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
205 if (challenge_hash(peer_challenge, auth_challenge,
219 * @auth_challenge
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
134 data->auth_challenge, CHALLENGE_LEN);
378 res = generate_nt_response_pwhash(data->auth_challenge,
384 res = generate_nt_response(data->auth_challenge,
418 pw_hash, peer_challenge, data->auth_challenge,
[all...]
H A Deap_i.h164 u8 *auth_challenge; member in struct:eap_sm
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
134 data->auth_challenge, CHALLENGE_LEN);
378 res = generate_nt_response_pwhash(data->auth_challenge,
384 res = generate_nt_response(data->auth_challenge,
418 pw_hash, peer_challenge, data->auth_challenge,
[all...]
H A Deap_i.h164 u8 *auth_challenge; member in struct:eap_sm
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
134 data->auth_challenge, CHALLENGE_LEN);
378 res = generate_nt_response_pwhash(data->auth_challenge,
384 res = generate_nt_response(data->auth_challenge,
418 pw_hash, peer_challenge, data->auth_challenge,
[all...]

Completed in 244 milliseconds

12