/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 39 const u8 *auth_challenge, 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 56 auth_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 83 auth_challenge,
|
mschapv2.h | 21 const u8 *auth_challenge,
|
eap_mschapv2.c | 90 u8 *auth_challenge; member in struct:eap_mschapv2_data 121 if (sm->auth_challenge) { 122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 123 if (data->auth_challenge == NULL) { 127 os_memcpy(data->auth_challenge, sm->auth_challenge, 141 os_free(data->auth_challenge); 149 u8 mschapv2_id, const u8 *auth_challenge) 202 if (data->auth_challenge) { 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated [all...] |
eap_i.h | 340 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
eap_fast.c | 351 sm->auth_challenge = data->key_block_p->server_challenge; 357 sm->auth_challenge = NULL; [all...] |
/external/chromium_org/net/http/ |
http_auth_cache.h | 49 const std::string auth_challenge() const { function in class:net::HttpAuthCache::Entry 62 void UpdateStaleChallenge(const std::string& auth_challenge); 150 const std::string& auth_challenge, 171 // |auth_challenge| and the nonce count is reset. 177 const std::string& auth_challenge);
|
http_auth_cache.cc | 138 const std::string& auth_challenge, 173 entry->auth_challenge_ = auth_challenge; 186 const std::string& auth_challenge) { 187 auth_challenge_ = auth_challenge; 259 const std::string& auth_challenge) { 263 entry->UpdateStaleChallenge(auth_challenge); 274 it->auth_challenge(), it->credentials(),
|
http_response_info.h | 121 scoped_refptr<AuthChallengeInfo> auth_challenge; member in class:net::HttpResponseInfo 125 // because it is similar to |auth_challenge|, but unlike HTTP authentication
|
http_response_info.cc | 123 auth_challenge(rhs.auth_challenge), 148 auth_challenge = rhs.auth_challenge;
|
proxy_client_socket.cc | 51 response->auth_challenge = auth->auth_info();
|
http_auth_cache_unittest.cc | 159 EXPECT_EQ("Basic realm=Realm3", entry->auth_challenge()); 171 EXPECT_EQ("Digest realm=Realm3", entry->auth_challenge()); 182 EXPECT_EQ("Basic realm=Realm2", entry->auth_challenge()); 281 const std::string auth_challenge = "Basic realm=MyRealm"; local 287 origin, handler->realm(), handler->auth_scheme(), auth_challenge, 289 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge, 291 cache.Add(origin, handler->realm(), handler->auth_scheme(), auth_challenge,
|
http_network_transaction_unittest.cc | 597 bool CheckBasicServerAuth(const AuthChallengeInfo* auth_challenge) { 598 if (!auth_challenge) 600 EXPECT_FALSE(auth_challenge->is_proxy); 601 EXPECT_EQ("www.google.com:80", auth_challenge->challenger.ToString()); 602 EXPECT_EQ("MyRealm1", auth_challenge->realm); 603 EXPECT_EQ("basic", auth_challenge->scheme); 607 bool CheckBasicProxyAuth(const AuthChallengeInfo* auth_challenge) { 608 if (!auth_challenge) 610 EXPECT_TRUE(auth_challenge->is_proxy); 611 EXPECT_EQ("myproxy:70", auth_challenge->challenger.ToString()) 9667 std::string auth_challenge = "Mock realm=proxy"; local 9681 std::string auth_challenge = "Mock realm=server"; local 9778 std::string auth_challenge = "Mock realm=server"; local [all...] |
http_network_transaction.cc | 546 response_.auth_challenge = proxy_response.auth_challenge; [all...] |
http_auth_controller.cc | 220 CreatePreemptiveAuthHandlerFromString(entry->auth_challenge(), target_, 507 // Populates response_.auth_challenge with the authentication challenge info.
|
http_cache_transaction.cc | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *auth_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 75 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 81 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 91 addr[1] = auth_challenge; 160 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 169 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 177 if (challenge_hash(peer_challenge, auth_challenge, username, 189 * @auth_challenge: 16-octet AuthenticatorChallenge (IN) 197 int generate_nt_response_pwhash(const u8 *auth_challenge, 205 if (challenge_hash(peer_challenge, auth_challenge, 219 * @auth_challenge: 16-octet AuthenticatorChallenge (IN [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 67 if (sm->auth_challenge) { 68 os_memcpy(data->auth_challenge, sm->auth_challenge, 106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 134 data->auth_challenge, CHALLENGE_LEN); 378 res = generate_nt_response_pwhash(data->auth_challenge, 384 res = generate_nt_response(data->auth_challenge, 418 pw_hash, peer_challenge, data->auth_challenge, [all...] |
eap_i.h | 164 u8 *auth_challenge; member in struct:eap_sm
|
eap_server_ttls.c | 658 *auth_challenge; local 719 auth_challenge = challenge; 724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 725 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 730 generate_nt_response_pwhash(auth_challenge, peer_challenge, 735 generate_nt_response(auth_challenge, peer_challenge, 751 peer_challenge, auth_challenge, 757 peer_challenge, auth_challenge,
|
eap_server_fast.c | 952 sm->auth_challenge = data->key_block_p->server_challenge; 958 sm->auth_challenge = NULL; [all...] |
/external/chromium_org/net/url_request/ |
url_request_ftp_job.cc | 305 *result = http_response_info_->auth_challenge;
|
url_request_http_job.cc | 346 DCHECK(!response_info_->auth_challenge.get()); [all...] |
/external/chromium_org/net/spdy/ |
spdy_network_transaction_unittest.cc | 5028 AuthChallengeInfo* auth_challenge = response_start->auth_challenge.get(); local [all...] |