Searched refs:peer_challenge (Results 1 - 13 of 13) sorted by relevance

/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Dmschapv2.c46 const u8 *peer_challenge,
63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
64 peer_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h28 const u8 *peer_challenge,
H A Deap_mschapv2.c46 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
56 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
94 u8 *peer_challenge; member in struct:eap_mschapv2_data
116 if (sm->peer_challenge) {
117 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
118 if (data->peer_challenge == NULL) {
122 os_memcpy(data->peer_challenge, sm->peer_challenge,
145 os_free(data->peer_challenge);
158 u8 *peer_challenge; local
[all...]
H A Deap_leap.c36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
108 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
368 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
369 data->peer_challenge, LEAP_CHALLENGE_LEN);
383 addr[3] = data->peer_challenge;
H A Deap_i.h330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_ttls.c644 u8 *buf, *pos, *challenge, *peer_challenge; local
677 peer_challenge = challenge + 1 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN;
690 os_memcpy(pos, peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
696 peer_challenge, pos, data->auth_response,
H A Deap_fast.c343 sm->peer_challenge = data->key_block_p->client_challenge;
349 sm->peer_challenge = NULL;
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h18 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
23 const u8 *peer_challenge,
28 const u8 *peer_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
H A Dms_funcs.c25 * @peer_challenge: 16-octet PeerChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, argument
40 addr[0] = peer_challenge;
117 * @peer_challenge: 16-octet PeerChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
145 * @peer_challenge: 16-octet PeerChallenge (IN)
153 const u8 *peer_challenge,
160 if (challenge_hash(peer_challenge, auth_challenge,
173 * @peer_challenge
152 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
181 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c54 u8 *peer_challenge; member in struct:eap_mschapv2_data
78 if (sm->peer_challenge) {
79 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 if (data->peer_challenge == NULL) {
84 os_memcpy(data->peer_challenge, sm->peer_challenge,
98 os_free(data->peer_challenge);
292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
319 peer_challenge = pos;
327 if (data->peer_challenge) {
[all...]
H A Deap_i.h171 u8 *peer_challenge; member in struct:eap_sm
H A Deap_server_ttls.c784 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
839 peer_challenge = response + 2;
845 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
846 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
849 generate_nt_response_pwhash(auth_challenge, peer_challenge,
854 generate_nt_response(auth_challenge, peer_challenge,
894 peer_challenge, auth_challenge,
900 peer_challenge, auth_challenge,
H A Deap_server_fast.c957 sm->peer_challenge = data->key_block_p->client_challenge;
963 sm->peer_challenge = NULL;

Completed in 249 milliseconds