Searched refs:auth_challenge (Results 1 - 11 of 11) sorted by relevance

/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Dmschapv2.c45 const u8 *auth_challenge,
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
62 auth_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h27 const u8 *auth_challenge,
H A Deap_mschapv2.c95 u8 *auth_challenge; member in struct:eap_mschapv2_data
126 if (sm->auth_challenge) {
127 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
128 if (data->auth_challenge == NULL) {
132 os_memcpy(data->auth_challenge, sm->auth_challenge,
146 os_free(data->auth_challenge);
154 u8 mschapv2_id, const u8 *auth_challenge)
207 if (data->auth_challenge) {
208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generate
152 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
[all...]
H A Deap_i.h330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_fast.c342 sm->auth_challenge = data->key_block_p->server_challenge;
348 sm->auth_challenge = NULL;
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h18 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
22 int generate_nt_response_pwhash(const u8 *auth_challenge,
29 const u8 *auth_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c26 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
42 addr[1] = auth_challenge;
116 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
144 * @auth_challenge: 16-octet AuthenticatorChallenge (IN)
152 int generate_nt_response_pwhash(const u8 *auth_challenge, argument
160 if (challenge_hash(peer_challenge, auth_challenge,
174 * @auth_challenge
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c52 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data
72 if (sm->auth_challenge) {
73 os_memcpy(data->auth_challenge, sm->auth_challenge,
112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) {
136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
140 data->auth_challenge, CHALLENGE_LEN);
376 res = generate_nt_response_pwhash(data->auth_challenge,
382 res = generate_nt_response(data->auth_challenge,
413 pw_hash, peer_challenge, data->auth_challenge,
[all...]
H A Deap_i.h170 u8 *auth_challenge; member in struct:eap_sm
H A Deap_server_ttls.c785 *auth_challenge; local
838 auth_challenge = challenge;
843 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
844 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
849 generate_nt_response_pwhash(auth_challenge, peer_challenge,
854 generate_nt_response(auth_challenge, peer_challenge,
894 peer_challenge, auth_challenge,
900 peer_challenge, auth_challenge,
H A Deap_server_fast.c956 sm->auth_challenge = data->key_block_p->server_challenge;
962 sm->auth_challenge = NULL;

Completed in 130 milliseconds