/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member 89 u8 *peer_challenge; member 111 if (sm->peer_challenge) { in eap_mschapv2_init() 112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init() 114 if (data->peer_challenge == NULL) { in eap_mschapv2_init() 138 os_free(data->peer_challenge); in eap_mschapv2_deinit() 151 u8 *peer_challenge; in eap_mschapv2_challenge_reply() local 189 peer_challenge = r->peer_challenge; in eap_mschapv2_challenge_reply() 190 if (data->peer_challenge) { in eap_mschapv2_challenge_reply() [all …]
|
D | mschapv2.c | 40 const u8 *peer_challenge, in mschapv2_derive_response() argument 58 peer_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response() 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response() 82 peer_challenge, in mschapv2_derive_response()
|
D | eap_leap.c | 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 371 data->peer_challenge, LEAP_CHALLENGE_LEN); in eap_leap_getKey() 385 addr[3] = data->peer_challenge; in eap_leap_getKey()
|
D | mschapv2.h | 22 const u8 *peer_challenge,
|
D | eap_i.h | 366 u8 *peer_challenge, *auth_challenge; member
|
D | eap_ttls.c | 516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 568 peer_challenge = pos; in eap_ttls_phase2_request_mschapv2() 574 peer_challenge, pos, data->auth_response, in eap_ttls_phase2_request_mschapv2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member 89 u8 *peer_challenge; member 111 if (sm->peer_challenge) { in eap_mschapv2_init() 112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init() 114 if (data->peer_challenge == NULL) { in eap_mschapv2_init() 138 os_free(data->peer_challenge); in eap_mschapv2_deinit() 151 u8 *peer_challenge; in eap_mschapv2_challenge_reply() local 189 peer_challenge = r->peer_challenge; in eap_mschapv2_challenge_reply() 190 if (data->peer_challenge) { in eap_mschapv2_challenge_reply() [all …]
|
D | mschapv2.c | 40 const u8 *peer_challenge, in mschapv2_derive_response() argument 58 peer_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response() 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response() 82 peer_challenge, in mschapv2_derive_response()
|
D | eap_leap.c | 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 371 data->peer_challenge, LEAP_CHALLENGE_LEN); in eap_leap_getKey() 385 addr[3] = data->peer_challenge; in eap_leap_getKey()
|
D | mschapv2.h | 22 const u8 *peer_challenge,
|
D | eap_i.h | 366 u8 *peer_challenge, *auth_challenge; member
|
D | eap_ttls.c | 487 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 539 peer_challenge = pos; in eap_ttls_phase2_request_mschapv2() 545 peer_challenge, pos, data->auth_response, in eap_ttls_phase2_request_mschapv2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_mschapv2.c | 49 u8 *peer_challenge; member 73 if (sm->peer_challenge) { in eap_mschapv2_init() 74 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init() 76 if (data->peer_challenge == NULL) { in eap_mschapv2_init() 92 os_free(data->peer_challenge); in eap_mschapv2_reset() 285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local 313 peer_challenge = pos; in eap_mschapv2_process_response() 321 if (data->peer_challenge) { in eap_mschapv2_process_response() 324 peer_challenge = data->peer_challenge; in eap_mschapv2_process_response() 327 peer_challenge, 16); in eap_mschapv2_process_response() [all …]
|
D | eap_server_ttls.c | 699 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 762 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2() 769 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2() 772 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 777 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 789 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 805 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 811 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
|
D | eap_i.h | 180 u8 *peer_challenge; member
|
D | eap_server_fast.c | 962 sm->peer_challenge = data->key_block_p->client_challenge; in eap_fast_phase2_init() 968 sm->peer_challenge = NULL; in eap_fast_phase2_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_mschapv2.c | 49 u8 *peer_challenge; member 73 if (sm->peer_challenge) { in eap_mschapv2_init() 74 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init() 76 if (data->peer_challenge == NULL) { in eap_mschapv2_init() 92 os_free(data->peer_challenge); in eap_mschapv2_reset() 285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local 313 peer_challenge = pos; in eap_mschapv2_process_response() 321 if (data->peer_challenge) { in eap_mschapv2_process_response() 324 peer_challenge = data->peer_challenge; in eap_mschapv2_process_response() 327 peer_challenge, 16); in eap_mschapv2_process_response() [all …]
|
D | eap_server_ttls.c | 698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 761 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2() 768 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2() 771 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 776 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 788 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 804 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 810 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
|
D | eap_i.h | 182 u8 *peer_challenge; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | ms_funcs.c | 81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument 88 addr[0] = peer_challenge; in challenge_hash() 171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument 179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response() 199 const u8 *peer_challenge, in generate_nt_response_pwhash() argument 206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash() 229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument 263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash() 284 const u8 *peer_challenge, in generate_authenticator_response() argument 293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
|
D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge, 36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
|
D | crypto_module_tests.c | 2054 u8 peer_challenge[] = { in test_ms_funcs() local 2093 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs() 2110 peer_challenge, auth_challenge, in test_ms_funcs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | ms_funcs.c | 81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument 88 addr[0] = peer_challenge; in challenge_hash() 171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument 179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response() 199 const u8 *peer_challenge, in generate_nt_response_pwhash() argument 206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash() 229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument 263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash() 284 const u8 *peer_challenge, in generate_authenticator_response() argument 293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
|
D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge, 36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
|
D | crypto_module_tests.c | 2203 u8 peer_challenge[] = { in test_ms_funcs() local 2242 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs() 2259 peer_challenge, auth_challenge, in test_ms_funcs()
|