/hostap-3.6.0/src/eap_peer/ |
D | mschapv2.c | 39 const u8 *auth_challenge, in mschapv2_derive_response() argument 56 auth_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response() 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response() 83 auth_challenge, in mschapv2_derive_response()
|
D | eap_mschapv2.c | 90 u8 *auth_challenge; member 120 if (sm->auth_challenge) { in eap_mschapv2_init() 121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init() 123 if (data->auth_challenge == NULL) { in eap_mschapv2_init() 139 os_free(data->auth_challenge); in eap_mschapv2_deinit() 147 u8 mschapv2_id, const u8 *auth_challenge) in eap_mschapv2_challenge_reply() argument 200 if (data->auth_challenge) { in eap_mschapv2_challenge_reply() 203 auth_challenge = data->auth_challenge; in eap_mschapv2_challenge_reply() 206 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply()
|
D | mschapv2.h | 21 const u8 *auth_challenge,
|
D | eap_i.h | 366 u8 *peer_challenge, *auth_challenge; member
|
D | eap_fast.c | 354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method() 360 sm->auth_challenge = NULL; in eap_fast_init_phase2_method()
|
/hostap-3.6.0/src/crypto/ |
D | ms_funcs.c | 81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument 90 addr[1] = auth_challenge; in challenge_hash() 171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument 179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response() 198 int generate_nt_response_pwhash(const u8 *auth_challenge, in generate_nt_response_pwhash() argument 206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash() 229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument 263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash() 285 const u8 *auth_challenge, in generate_authenticator_response() argument 293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
|
D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *auth_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge, 36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
|
D | crypto_module_tests.c | 2199 u8 auth_challenge[] = { in test_ms_funcs() local 2242 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs() 2259 peer_challenge, auth_challenge, in test_ms_funcs()
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member 67 if (sm->auth_challenge) { in eap_mschapv2_init() 68 os_memcpy(data->auth_challenge, sm->auth_challenge, in eap_mschapv2_init() 105 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge() 129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge() 133 data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge() 366 if (challenge_hash(peer_challenge, data->auth_challenge, in eap_mschapv2_process_response() 390 res = generate_nt_response_pwhash(data->auth_challenge, in eap_mschapv2_process_response() 396 res = generate_nt_response(data->auth_challenge, in eap_mschapv2_process_response() 430 pw_hash, peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
|
D | eap_server_ttls.c | 700 *auth_challenge; in eap_ttls_process_phase2_mschapv2() local 761 auth_challenge = challenge; in eap_ttls_process_phase2_mschapv2() 767 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2() 772 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 777 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2() 789 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 805 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2() 811 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
|
D | eap_i.h | 179 u8 *auth_challenge; member
|
D | eap_server_fast.c | 961 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init() 967 sm->auth_challenge = NULL; in eap_fast_phase2_init()
|
/hostap-3.6.0/tests/hwsim/ |
D | test_eap_proto.py | 6268 def ChallengeHash(peer_challenge, auth_challenge, username): argument 6269 data = peer_challenge + auth_challenge + username 6273 auth_challenge, username): argument 6282 challenge = ChallengeHash(peer_challenge, auth_challenge, username.encode()) 6830 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff") 6831 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode()) 6835 auth_challenge, "user") 6878 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff") 6879 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode()) 6883 auth_challenge, "user") [all …]
|