Home
last modified time | relevance | path

Searched refs:auth_challenge (Results 1 – 13 of 13) sorted by relevance

/hostap-3.6.0/src/eap_peer/
Dmschapv2.c39 const u8 *auth_challenge, in mschapv2_derive_response() argument
56 auth_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
83 auth_challenge, in mschapv2_derive_response()
Deap_mschapv2.c90 u8 *auth_challenge; member
120 if (sm->auth_challenge) { in eap_mschapv2_init()
121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
123 if (data->auth_challenge == NULL) { in eap_mschapv2_init()
139 os_free(data->auth_challenge); in eap_mschapv2_deinit()
147 u8 mschapv2_id, const u8 *auth_challenge) in eap_mschapv2_challenge_reply() argument
200 if (data->auth_challenge) { in eap_mschapv2_challenge_reply()
203 auth_challenge = data->auth_challenge; in eap_mschapv2_challenge_reply()
206 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply()
Dmschapv2.h21 const u8 *auth_challenge,
Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
Deap_fast.c354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method()
360 sm->auth_challenge = NULL; in eap_fast_init_phase2_method()
/hostap-3.6.0/src/crypto/
Dms_funcs.c81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
90 addr[1] = auth_challenge; in challenge_hash()
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
198 int generate_nt_response_pwhash(const u8 *auth_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument
263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash()
285 const u8 *auth_challenge, in generate_authenticator_response() argument
293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
Dcrypto_module_tests.c2199 u8 auth_challenge[] = { in test_ms_funcs() local
2242 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2259 peer_challenge, auth_challenge, in test_ms_funcs()
/hostap-3.6.0/src/eap_server/
Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member
67 if (sm->auth_challenge) { in eap_mschapv2_init()
68 os_memcpy(data->auth_challenge, sm->auth_challenge, in eap_mschapv2_init()
105 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge()
129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
133 data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
366 if (challenge_hash(peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
390 res = generate_nt_response_pwhash(data->auth_challenge, in eap_mschapv2_process_response()
396 res = generate_nt_response(data->auth_challenge, in eap_mschapv2_process_response()
430 pw_hash, peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
Deap_server_ttls.c700 *auth_challenge; in eap_ttls_process_phase2_mschapv2() local
761 auth_challenge = challenge; in eap_ttls_process_phase2_mschapv2()
767 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
772 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
777 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
789 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
805 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
811 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
Deap_i.h179 u8 *auth_challenge; member
Deap_server_fast.c961 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init()
967 sm->auth_challenge = NULL; in eap_fast_phase2_init()
/hostap-3.6.0/tests/hwsim/
Dtest_eap_proto.py6268 def ChallengeHash(peer_challenge, auth_challenge, username): argument
6269 data = peer_challenge + auth_challenge + username
6273 auth_challenge, username): argument
6282 challenge = ChallengeHash(peer_challenge, auth_challenge, username.encode())
6830 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
6831 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode())
6835 auth_challenge, "user")
6878 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
6879 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode())
6883 auth_challenge, "user")
[all …]