/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 45 const u8 *auth_challenge, 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 62 auth_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge,
|
mschapv2.h | 27 const u8 *auth_challenge,
|
eap_mschapv2.c | 95 u8 *auth_challenge; member in struct:eap_mschapv2_data 126 if (sm->auth_challenge) { 127 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 128 if (data->auth_challenge == NULL) { 132 os_memcpy(data->auth_challenge, sm->auth_challenge, 146 os_free(data->auth_challenge); 154 u8 mschapv2_id, const u8 *auth_challenge) 207 if (data->auth_challenge) { 208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated [all...] |
eap_i.h | 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
eap_fast.c | 342 sm->auth_challenge = data->key_block_p->server_challenge; 348 sm->auth_challenge = NULL; [all...] |
/external/wpa_supplicant/ |
ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 22 void generate_nt_response_pwhash(const u8 *auth_challenge, 29 const u8 *auth_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 42 addr[1] = auth_challenge; 112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 144 void generate_nt_response_pwhash(const u8 *auth_challenge, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 163 * @auth_challenge: 16-octet AuthenticatorChallenge (IN [all...] |
eap_mschapv2.c | 97 u8 *auth_challenge; member in struct:eap_mschapv2_data 133 if (sm->auth_challenge) { 134 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 135 if (data->auth_challenge == NULL) { 139 os_memcpy(data->auth_challenge, sm->auth_challenge, 153 os_free(data->auth_challenge); 184 const u8 *auth_challenge, const u8 *peer_challenge, 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 190 auth_challenge, MSCHAPV2_CHAL_LEN) [all...] |
eap_i.h | 333 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
eap_fast.c | 1098 sm->auth_challenge = 1111 sm->auth_challenge = NULL; [all...] |
/external/chromium/net/http/ |
http_response_info.h | 47 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo 51 // because it is similar to |auth_challenge|, but unlike HTTP authentication
|
http_network_transaction_unittest.cc | 782 // The password prompt info should have been set in response->auth_challenge. 783 EXPECT_FALSE(response->auth_challenge.get() == NULL); 785 EXPECT_EQ(L"www.google.com:80", response->auth_challenge->host_and_port); 786 EXPECT_EQ(L"MyRealm1", response->auth_challenge->realm); 787 EXPECT_EQ(L"basic", response->auth_challenge->scheme); 799 EXPECT_TRUE(response->auth_challenge.get() == NULL); 840 EXPECT_TRUE(response->auth_challenge.get() == NULL); 896 // The password prompt info should have been set in response->auth_challenge. 897 EXPECT_FALSE(response->auth_challenge.get() == NULL); 899 EXPECT_EQ(L"www.google.com:80", response->auth_challenge->host_and_port) [all...] |
http_network_transaction.cc | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 22 void generate_nt_response_pwhash(const u8 *auth_challenge, 29 const u8 *auth_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 27 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 42 addr[1] = auth_challenge; 112 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 137 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 144 void generate_nt_response_pwhash(const u8 *auth_challenge, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 163 * @auth_challenge: 16-octet AuthenticatorChallenge (IN [all...] |
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 23 u8 auth_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 23 u8 auth_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 52 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 72 if (sm->auth_challenge) { 73 os_memcpy(data->auth_challenge, sm->auth_challenge, 112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) { 136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 140 data->auth_challenge, CHALLENGE_LEN); 375 generate_nt_response_pwhash(data->auth_challenge, 381 generate_nt_response(data->auth_challenge, peer_challenge, 407 pw_hash, peer_challenge, data->auth_challenge, [all...] |
eap_i.h | 170 u8 *auth_challenge; member in struct:eap_sm
|
eap_ttls.c | 807 *auth_challenge; local 860 auth_challenge = challenge; 865 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 866 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 871 generate_nt_response_pwhash(auth_challenge, peer_challenge, 876 generate_nt_response(auth_challenge, peer_challenge, 916 peer_challenge, auth_challenge, 922 peer_challenge, auth_challenge, [all...] |
eap_fast.c | 952 sm->auth_challenge = data->key_block_p->server_challenge; 958 sm->auth_challenge = NULL; [all...] |
/external/chromium/net/url_request/ |
url_request_http_job.cc | 306 *result = response_info_->auth_challenge; 564 DCHECK(!response_info_->auth_challenge.get());
|