• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/contrib/wpa/src/eap_server/

Lines Matching refs:data

22 	/* followed by data */
60 struct eap_mschapv2_data *data;
62 data = os_zalloc(sizeof(*data));
63 if (data == NULL)
65 data->state = CHALLENGE;
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
70 data->auth_challenge_from_tls = 1;
74 data->peer_challenge = os_memdup(sm->peer_challenge,
76 if (data->peer_challenge == NULL) {
77 os_free(data);
82 return data;
88 struct eap_mschapv2_data *data = priv;
89 if (data == NULL)
92 os_free(data->peer_challenge);
93 bin_clear_free(data, sizeof(*data));
98 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
104 if (!data->auth_challenge_from_tls &&
105 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
107 "data");
108 data->state = FAILURE;
118 data->state = FAILURE;
128 if (!data->auth_challenge_from_tls)
129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
133 data->auth_challenge, CHALLENGE_LEN);
141 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
149 ms_len = sizeof(*ms) + 2 + 2 * sizeof(data->auth_response) + 1 + 2 +
156 data->state = FAILURE;
162 ms->mschapv2_id = data->resp_mschapv2_id;
169 wpabuf_put(req, sizeof(data->auth_response) * 2),
170 sizeof(data->auth_response) * 2 + 1,
171 data->auth_response, sizeof(data->auth_response));
185 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
199 data->state = FAILURE;
205 ms->mschapv2_id = data->resp_mschapv2_id;
220 struct eap_mschapv2_data *data = priv;
222 switch (data->state) {
224 return eap_mschapv2_build_challenge(sm, data, id);
226 return eap_mschapv2_build_success_req(sm, data, id);
228 return eap_mschapv2_build_failure_req(sm, data, id);
231 "buildReq", data->state);
241 struct eap_mschapv2_data *data = priv;
254 if (data->state == CHALLENGE &&
261 if (data->state == SUCCESS_REQ &&
269 if (data->state == FAILURE_REQ &&
281 struct eap_mschapv2_data *data,
308 data->state = FAILURE;
311 data->resp_mschapv2_id = resp->mschapv2_id;
321 if (data->peer_challenge) {
324 peer_challenge = data->peer_challenge;
366 if (challenge_hash(peer_challenge, data->auth_challenge,
382 data->state = FAILURE;
390 res = generate_nt_response_pwhash(data->auth_challenge,
396 res = generate_nt_response(data->auth_challenge,
404 data->state = FAILURE;
413 data->state = SUCCESS_REQ;
424 data->state = FAILURE;
430 pw_hash, peer_challenge, data->auth_challenge,
432 data->auth_response) < 0 ||
435 data->master_key)) {
436 data->state = FAILURE;
439 data->master_key_valid = 1;
441 data->master_key, MSCHAPV2_KEY_LEN);
446 data->state = FAILURE_REQ;
452 struct eap_mschapv2_data *data,
469 data->state = SUCCESS;
473 data->state = FAILURE;
479 struct eap_mschapv2_data *data,
501 data->state = FAILURE;
508 struct eap_mschapv2_data *data = priv;
512 data->state = FAILURE;
516 switch (data->state) {
518 eap_mschapv2_process_response(sm, data, respData);
521 eap_mschapv2_process_success_resp(sm, data, respData);
524 eap_mschapv2_process_failure_resp(sm, data, respData);
528 "process", data->state);
536 struct eap_mschapv2_data *data = priv;
537 return data->state == SUCCESS || data->state == FAILURE;
543 struct eap_mschapv2_data *data = priv;
546 if (data->state != SUCCESS || !data->master_key_valid)
554 if (get_asymetric_start_key(data->master_key, key, MSCHAPV2_KEY_LEN, 0,
556 get_asymetric_start_key(data->master_key, key + MSCHAPV2_KEY_LEN,
569 struct eap_mschapv2_data *data = priv;
570 return data->state == SUCCESS;