/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 46 const u8 *peer_challenge, 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 64 peer_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge, 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 28 const u8 *peer_challenge,
|
H A D | eap_mschapv2.c | 46 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 56 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 94 u8 *peer_challenge; member in struct:eap_mschapv2_data 116 if (sm->peer_challenge) { 117 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 118 if (data->peer_challenge == NULL) { 122 os_memcpy(data->peer_challenge, sm->peer_challenge, 145 os_free(data->peer_challenge); 158 u8 *peer_challenge; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 40 const u8 *peer_challenge, 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 58 peer_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 82 peer_challenge, 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 22 const u8 *peer_challenge,
|
H A D | eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 89 u8 *peer_challenge; member in struct:eap_mschapv2_data 111 if (sm->peer_challenge) { 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 140 os_free(data->peer_challenge); 153 u8 *peer_challenge; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 40 const u8 *peer_challenge, 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 58 peer_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 82 peer_challenge, 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 22 const u8 *peer_challenge,
|
H A D | eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 89 u8 *peer_challenge; member in struct:eap_mschapv2_data 111 if (sm->peer_challenge) { 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 140 os_free(data->peer_challenge); 153 u8 *peer_challenge; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 40 const u8 *peer_challenge, 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 58 peer_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 82 peer_challenge, 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | mschapv2.h | 22 const u8 *peer_challenge,
|
H A D | eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 89 u8 *peer_challenge; member in struct:eap_mschapv2_data 111 if (sm->peer_challenge) { 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 140 os_free(data->peer_challenge); 153 u8 *peer_challenge; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 23 const u8 *peer_challenge, 28 const u8 *peer_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
H A D | ms_funcs.c | 26 * @peer_challenge: 16-octet PeerChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 40 addr[0] = peer_challenge; 113 * @peer_challenge: 16-octet PeerChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 138 * @peer_challenge: 16-octet PeerChallenge (IN) 145 const u8 *peer_challenge, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 162 * @peer_challenge 144 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
H A D | ms_funcs.c | 73 * @peer_challenge: 16-octet PeerChallenge (IN) 80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 88 addr[0] = peer_challenge; 160 * @peer_challenge: 16-octet PeerChallenge (IN) 168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 176 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @peer_challenge: 16-octet PeerChallenge (IN) 197 const u8 *peer_challenge, 204 if (challenge_hash(peer_challenge, auth_challenge, 217 * @peer_challenge 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
H A D | ms_funcs.c | 73 * @peer_challenge: 16-octet PeerChallenge (IN) 80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 88 addr[0] = peer_challenge; 160 * @peer_challenge: 16-octet PeerChallenge (IN) 168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 176 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @peer_challenge: 16-octet PeerChallenge (IN) 197 const u8 *peer_challenge, 204 if (challenge_hash(peer_challenge, auth_challenge, 217 * @peer_challenge 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
H A D | ms_funcs.c | 73 * @peer_challenge: 16-octet PeerChallenge (IN) 80 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument 88 addr[0] = peer_challenge; 160 * @peer_challenge: 16-octet PeerChallenge (IN) 168 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument 176 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @peer_challenge: 16-octet PeerChallenge (IN) 197 const u8 *peer_challenge, 204 if (challenge_hash(peer_challenge, auth_challenge, 217 * @peer_challenge 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_mschapv2.c | 54 u8 *peer_challenge; member in struct:eap_mschapv2_data 78 if (sm->peer_challenge) { 79 data->peer_challenge = os_malloc(CHALLENGE_LEN); 80 if (data->peer_challenge == NULL) { 84 os_memcpy(data->peer_challenge, sm->peer_challenge, 98 os_free(data->peer_challenge); 292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 318 peer_challenge = pos; 326 if (data->peer_challenge) { [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_mschapv2.c | 49 u8 *peer_challenge; member in struct:eap_mschapv2_data 73 if (sm->peer_challenge) { 74 data->peer_challenge = os_malloc(CHALLENGE_LEN); 75 if (data->peer_challenge == NULL) { 79 os_memcpy(data->peer_challenge, sm->peer_challenge, 93 os_free(data->peer_challenge); 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 314 peer_challenge = pos; 322 if (data->peer_challenge) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 49 u8 *peer_challenge; member in struct:eap_mschapv2_data 73 if (sm->peer_challenge) { 74 data->peer_challenge = os_malloc(CHALLENGE_LEN); 75 if (data->peer_challenge == NULL) { 79 os_memcpy(data->peer_challenge, sm->peer_challenge, 93 os_free(data->peer_challenge); 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 314 peer_challenge = pos; 322 if (data->peer_challenge) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 49 u8 *peer_challenge; member in struct:eap_mschapv2_data 73 if (sm->peer_challenge) { 74 data->peer_challenge = os_malloc(CHALLENGE_LEN); 75 if (data->peer_challenge == NULL) { 79 os_memcpy(data->peer_challenge, sm->peer_challenge, 93 os_free(data->peer_challenge); 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 314 peer_challenge = pos; 322 if (data->peer_challenge) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_ms_funcs.c | 27 u8 peer_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|