Home
last modified time | relevance | path

Searched refs:peer_challenge (Results 1 – 25 of 28) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_mschapv2.c41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member
89 u8 *peer_challenge; member
111 if (sm->peer_challenge) { in eap_mschapv2_init()
112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init()
114 if (data->peer_challenge == NULL) { in eap_mschapv2_init()
138 os_free(data->peer_challenge); in eap_mschapv2_deinit()
151 u8 *peer_challenge; in eap_mschapv2_challenge_reply() local
189 peer_challenge = r->peer_challenge; in eap_mschapv2_challenge_reply()
190 if (data->peer_challenge) { in eap_mschapv2_challenge_reply()
[all …]
Dmschapv2.c40 const u8 *peer_challenge, in mschapv2_derive_response() argument
58 peer_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
82 peer_challenge, in mschapv2_derive_response()
Deap_leap.c31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
371 data->peer_challenge, LEAP_CHALLENGE_LEN); in eap_leap_getKey()
385 addr[3] = data->peer_challenge; in eap_leap_getKey()
Dmschapv2.h22 const u8 *peer_challenge,
Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
Deap_ttls.c516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
568 peer_challenge = pos; in eap_ttls_phase2_request_mschapv2()
574 peer_challenge, pos, data->auth_response, in eap_ttls_phase2_request_mschapv2()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_mschapv2.c41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member
89 u8 *peer_challenge; member
111 if (sm->peer_challenge) { in eap_mschapv2_init()
112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init()
114 if (data->peer_challenge == NULL) { in eap_mschapv2_init()
138 os_free(data->peer_challenge); in eap_mschapv2_deinit()
151 u8 *peer_challenge; in eap_mschapv2_challenge_reply() local
189 peer_challenge = r->peer_challenge; in eap_mschapv2_challenge_reply()
190 if (data->peer_challenge) { in eap_mschapv2_challenge_reply()
[all …]
Dmschapv2.c40 const u8 *peer_challenge, in mschapv2_derive_response() argument
58 peer_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
82 peer_challenge, in mschapv2_derive_response()
Deap_leap.c31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
371 data->peer_challenge, LEAP_CHALLENGE_LEN); in eap_leap_getKey()
385 addr[3] = data->peer_challenge; in eap_leap_getKey()
Dmschapv2.h22 const u8 *peer_challenge,
Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
Deap_ttls.c487 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
539 peer_challenge = pos; in eap_ttls_phase2_request_mschapv2()
545 peer_challenge, pos, data->auth_response, in eap_ttls_phase2_request_mschapv2()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_mschapv2.c49 u8 *peer_challenge; member
73 if (sm->peer_challenge) { in eap_mschapv2_init()
74 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init()
76 if (data->peer_challenge == NULL) { in eap_mschapv2_init()
92 os_free(data->peer_challenge); in eap_mschapv2_reset()
285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local
313 peer_challenge = pos; in eap_mschapv2_process_response()
321 if (data->peer_challenge) { in eap_mschapv2_process_response()
324 peer_challenge = data->peer_challenge; in eap_mschapv2_process_response()
327 peer_challenge, 16); in eap_mschapv2_process_response()
[all …]
Deap_server_ttls.c699 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local
762 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2()
769 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
772 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
777 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
789 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
805 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
811 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
Deap_i.h180 u8 *peer_challenge; member
Deap_server_fast.c962 sm->peer_challenge = data->key_block_p->client_challenge; in eap_fast_phase2_init()
968 sm->peer_challenge = NULL; in eap_fast_phase2_init()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_mschapv2.c49 u8 *peer_challenge; member
73 if (sm->peer_challenge) { in eap_mschapv2_init()
74 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init()
76 if (data->peer_challenge == NULL) { in eap_mschapv2_init()
92 os_free(data->peer_challenge); in eap_mschapv2_reset()
285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local
313 peer_challenge = pos; in eap_mschapv2_process_response()
321 if (data->peer_challenge) { in eap_mschapv2_process_response()
324 peer_challenge = data->peer_challenge; in eap_mschapv2_process_response()
327 peer_challenge, 16); in eap_mschapv2_process_response()
[all …]
Deap_server_ttls.c698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local
761 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2()
768 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
771 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
776 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
788 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
804 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
810 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
Deap_i.h182 u8 *peer_challenge; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dms_funcs.c81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
88 addr[0] = peer_challenge; in challenge_hash()
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
199 const u8 *peer_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument
263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash()
284 const u8 *peer_challenge, in generate_authenticator_response() argument
293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
Dcrypto_module_tests.c2054 u8 peer_challenge[] = { in test_ms_funcs() local
2093 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2110 peer_challenge, auth_challenge, in test_ms_funcs()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dms_funcs.c81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
88 addr[0] = peer_challenge; in challenge_hash()
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
199 const u8 *peer_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument
263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash()
284 const u8 *peer_challenge, in generate_authenticator_response() argument
293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
Dcrypto_module_tests.c2203 u8 peer_challenge[] = { in test_ms_funcs() local
2242 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2259 peer_challenge, auth_challenge, in test_ms_funcs()

12