HomeSort by relevance Sort by last modified time
    Searched refs:auth_challenge (Results 1 - 22 of 22) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
mschapv2.h 27 const u8 *auth_challenge,
eap_mschapv2.c 95 u8 *auth_challenge; member in struct:eap_mschapv2_data
126 if (sm->auth_challenge) {
127 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
128 if (data->auth_challenge == NULL) {
132 os_memcpy(data->auth_challenge, sm->auth_challenge,
146 os_free(data->auth_challenge);
154 u8 mschapv2_id, const u8 *auth_challenge)
207 if (data->auth_challenge) {
208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated
    [all...]
eap_i.h 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
eap_fast.c 342 sm->auth_challenge = data->key_block_p->server_challenge;
348 sm->auth_challenge = NULL;
    [all...]
  /external/wpa_supplicant/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
22 void generate_nt_response_pwhash(const u8 *auth_challenge,
29 const u8 *auth_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
ms_funcs.c 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
42 addr[1] = auth_challenge;
112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
144 void generate_nt_response_pwhash(const u8 *auth_challenge,
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
163 * @auth_challenge: 16-octet AuthenticatorChallenge (IN
    [all...]
eap_mschapv2.c 97 u8 *auth_challenge; member in struct:eap_mschapv2_data
133 if (sm->auth_challenge) {
134 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
135 if (data->auth_challenge == NULL) {
139 os_memcpy(data->auth_challenge, sm->auth_challenge,
153 os_free(data->auth_challenge);
184 const u8 *auth_challenge, const u8 *peer_challenge,
189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
190 auth_challenge, MSCHAPV2_CHAL_LEN)
    [all...]
eap_i.h 333 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
eap_fast.c 1098 sm->auth_challenge =
1111 sm->auth_challenge = NULL;
    [all...]
  /external/chromium/net/http/
http_response_info.h 47 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo
51 // because it is similar to |auth_challenge|, but unlike HTTP authentication
http_network_transaction_unittest.cc 782 // The password prompt info should have been set in response->auth_challenge.
783 EXPECT_FALSE(response->auth_challenge.get() == NULL);
785 EXPECT_EQ(L"www.google.com:80", response->auth_challenge->host_and_port);
786 EXPECT_EQ(L"MyRealm1", response->auth_challenge->realm);
787 EXPECT_EQ(L"basic", response->auth_challenge->scheme);
799 EXPECT_TRUE(response->auth_challenge.get() == NULL);
840 EXPECT_TRUE(response->auth_challenge.get() == NULL);
896 // The password prompt info should have been set in response->auth_challenge.
897 EXPECT_FALSE(response->auth_challenge.get() == NULL);
899 EXPECT_EQ(L"www.google.com:80", response->auth_challenge->host_and_port)
    [all...]
http_network_transaction.cc     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
22 void generate_nt_response_pwhash(const u8 *auth_challenge,
29 const u8 *auth_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
ms_funcs.c 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
42 addr[1] = auth_challenge;
112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
144 void generate_nt_response_pwhash(const u8 *auth_challenge,
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
163 * @auth_challenge: 16-octet AuthenticatorChallenge (IN
    [all...]
  /external/wpa_supplicant/tests/
test_ms_funcs.c 23 u8 auth_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 23 u8 auth_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 52 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
72 if (sm->auth_challenge) {
73 os_memcpy(data->auth_challenge, sm->auth_challenge,
112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) {
136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
140 data->auth_challenge, CHALLENGE_LEN);
375 generate_nt_response_pwhash(data->auth_challenge,
381 generate_nt_response(data->auth_challenge, peer_challenge,
407 pw_hash, peer_challenge, data->auth_challenge,
    [all...]
eap_i.h 170 u8 *auth_challenge; member in struct:eap_sm
eap_ttls.c 807 *auth_challenge; local
860 auth_challenge = challenge;
865 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
866 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
871 generate_nt_response_pwhash(auth_challenge, peer_challenge,
876 generate_nt_response(auth_challenge, peer_challenge,
916 peer_challenge, auth_challenge,
922 peer_challenge, auth_challenge,
    [all...]
eap_fast.c 952 sm->auth_challenge = data->key_block_p->server_challenge;
958 sm->auth_challenge = NULL;
    [all...]
  /external/chromium/net/url_request/
url_request_http_job.cc 306 *result = response_info_->auth_challenge;
564 DCHECK(!response_info_->auth_challenge.get());

Completed in 248 milliseconds