/external/wpa_supplicant/ |
ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 23 const u8 *peer_challenge, 28 const u8 *peer_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
eap_mschapv2.c | 48 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 58 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 96 u8 *peer_challenge; member in struct:eap_mschapv2_data 122 if (sm->peer_challenge) { 124 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 125 if (data->peer_challenge == NULL) { 129 os_memcpy(data->peer_challenge, sm->peer_challenge, 152 os_free(data->peer_challenge); 184 const u8 *auth_challenge, const u8 *peer_challenge, 227 u8 *rpos, *peer_challenge; local [all...] |
ms_funcs.c | 26 * @peer_challenge: 16-octet PeerChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 40 addr[0] = peer_challenge; 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 145 const u8 *peer_challenge, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 162 * @peer_challenge: 16-octet PeerChallenge (IN) 171 const u8 *peer_challenge, const u8 *auth_challenge, 206 challenge_hash(peer_challenge, auth_challenge, username, username_len [all...] |
eap_leap.c | 36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data 112 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 353 data->peer_challenge, LEAP_CHALLENGE_LEN); 367 addr[3] = data->peer_challenge;
|
eap_ttls.c | 644 u8 *buf, *pos, *challenge, *username, *peer_challenge; local 683 peer_challenge = challenge + 1 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN; 696 os_memcpy(pos, peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 702 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: peer_challenge", 703 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 708 generate_nt_response(challenge, peer_challenge, 714 peer_challenge, challenge, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 46 const u8 *peer_challenge, 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 64 peer_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge,
|
mschapv2.h | 28 const u8 *peer_challenge,
|
eap_mschapv2.c | 46 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 56 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 94 u8 *peer_challenge; member in struct:eap_mschapv2_data 116 if (sm->peer_challenge) { 117 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 118 if (data->peer_challenge == NULL) { 122 os_memcpy(data->peer_challenge, sm->peer_challenge, 145 os_free(data->peer_challenge); 158 u8 *peer_challenge; local [all...] |
eap_leap.c | 36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data 108 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 357 data->peer_challenge, LEAP_CHALLENGE_LEN); 371 addr[3] = data->peer_challenge;
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 46 const u8 *peer_challenge, 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 64 peer_challenge, MSCHAPV2_CHAL_LEN); 72 generate_nt_response_pwhash(auth_challenge, peer_challenge, 76 password, peer_challenge, auth_challenge, 81 generate_nt_response(auth_challenge, peer_challenge, 85 peer_challenge, auth_challenge,
|
mschapv2.h | 28 const u8 *peer_challenge,
|
eap_mschapv2.c | 47 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 57 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 95 u8 *peer_challenge; member in struct:eap_mschapv2_data 117 if (sm->peer_challenge) { 118 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 119 if (data->peer_challenge == NULL) { 123 os_memcpy(data->peer_challenge, sm->peer_challenge, 146 os_free(data->peer_challenge); 159 u8 *peer_challenge; local [all...] |
eap_leap.c | 37 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data 109 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 370 data->peer_challenge, LEAP_CHALLENGE_LEN); 384 addr[3] = data->peer_challenge;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 23 const u8 *peer_challenge, 28 const u8 *peer_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 26 * @peer_challenge: 16-octet PeerChallenge (IN) 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 40 addr[0] = peer_challenge; 113 * @peer_challenge: 16-octet PeerChallenge (IN) 120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 138 * @peer_challenge: 16-octet PeerChallenge (IN) 145 const u8 *peer_challenge, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 162 * @peer_challenge: 16-octet PeerChallenge (IN [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 18 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 23 const u8 *peer_challenge, 28 const u8 *peer_challenge, 34 const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 25 * @peer_challenge: 16-octet PeerChallenge (IN) 32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 40 addr[0] = peer_challenge; 117 * @peer_challenge: 16-octet PeerChallenge (IN) 125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, 145 * @peer_challenge: 16-octet PeerChallenge (IN) 153 const u8 *peer_challenge, 160 if (challenge_hash(peer_challenge, auth_challenge, 173 * @peer_challenge: 16-octet PeerChallenge (IN [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 54 u8 *peer_challenge; member in struct:eap_mschapv2_data 78 if (sm->peer_challenge) { 79 data->peer_challenge = os_malloc(CHALLENGE_LEN); 80 if (data->peer_challenge == NULL) { 84 os_memcpy(data->peer_challenge, sm->peer_challenge, 98 os_free(data->peer_challenge); 292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 318 peer_challenge = pos; 326 if (data->peer_challenge) { [all...] |
eap_ttls.c | 806 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 861 peer_challenge = response + 2; 867 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 868 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 871 generate_nt_response_pwhash(auth_challenge, peer_challenge, 876 generate_nt_response(auth_challenge, peer_challenge, 916 peer_challenge, auth_challenge, 922 peer_challenge, auth_challenge, [all...] |
eap_i.h | 171 u8 *peer_challenge; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 55 u8 *peer_challenge; member in struct:eap_mschapv2_data 79 if (sm->peer_challenge) { 80 data->peer_challenge = os_malloc(CHALLENGE_LEN); 81 if (data->peer_challenge == NULL) { 85 os_memcpy(data->peer_challenge, sm->peer_challenge, 99 os_free(data->peer_challenge); 293 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 320 peer_challenge = pos; 328 if (data->peer_challenge) { [all...] |
eap_server_ttls.c | 784 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 839 peer_challenge = response + 2; 845 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 846 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 849 generate_nt_response_pwhash(auth_challenge, peer_challenge, 854 generate_nt_response(auth_challenge, peer_challenge, 894 peer_challenge, auth_challenge, 900 peer_challenge, auth_challenge, [all...] |
eap_i.h | 171 u8 *peer_challenge; member in struct:eap_sm
|
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 27 u8 peer_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 27 u8 peer_challenge[] = { local 64 challenge_hash(peer_challenge, auth_challenge, 78 generate_nt_response(auth_challenge, peer_challenge, 94 peer_challenge, auth_challenge,
|