Home
last modified time | relevance | path

Searched refs:auth_challenge (Results 1 – 13 of 13) sorted by relevance

/hostap-latest/src/eap_peer/
Dmschapv2.c39 const u8 *auth_challenge, in mschapv2_derive_response() argument
56 auth_challenge, MSCHAPV2_CHAL_LEN); in mschapv2_derive_response()
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
77 if (generate_nt_response(auth_challenge, peer_challenge, in mschapv2_derive_response()
83 auth_challenge, in mschapv2_derive_response()
Deap_mschapv2.c90 u8 *auth_challenge; member
113 sm->peer_challenge && sm->auth_challenge ? in eap_mschapv2_init()
126 if (sm->auth_challenge) { in eap_mschapv2_init()
127 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
129 if (data->auth_challenge == NULL) { in eap_mschapv2_init()
145 os_free(data->auth_challenge); in eap_mschapv2_deinit()
153 u8 mschapv2_id, const u8 *auth_challenge) in eap_mschapv2_challenge_reply() argument
206 if (data->auth_challenge) { in eap_mschapv2_challenge_reply()
209 auth_challenge = data->auth_challenge; in eap_mschapv2_challenge_reply()
212 password_len, pwhash, auth_challenge, in eap_mschapv2_challenge_reply()
Dmschapv2.h21 const u8 *auth_challenge,
Deap_i.h366 u8 *peer_challenge, *auth_challenge; member
Deap_fast.c354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method()
361 sm->auth_challenge = NULL; in eap_fast_init_phase2_method()
/hostap-latest/src/crypto/
Dms_funcs.c81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() argument
90 addr[1] = auth_challenge; in challenge_hash()
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
198 int generate_nt_response_pwhash(const u8 *auth_challenge, in generate_nt_response_pwhash() argument
206 if (challenge_hash(peer_challenge, auth_challenge, in generate_nt_response_pwhash()
229 const u8 *peer_challenge, const u8 *auth_challenge, in generate_authenticator_response_pwhash() argument
263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash()
285 const u8 *auth_challenge, in generate_authenticator_response() argument
293 password_hash, peer_challenge, auth_challenge, in generate_authenticator_response()
Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *auth_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
Dcrypto_module_tests.c2479 u8 auth_challenge[] = { in test_ms_funcs() local
2522 if (generate_nt_response(auth_challenge, peer_challenge, in test_ms_funcs()
2539 peer_challenge, auth_challenge, in test_ms_funcs()
/hostap-latest/src/eap_server/
Deap_server_mschapv2.c47 u8 auth_challenge[CHALLENGE_LEN]; member
69 sm->peer_challenge && sm->auth_challenge ? in eap_mschapv2_init()
73 if (sm->auth_challenge) { in eap_mschapv2_init()
74 os_memcpy(data->auth_challenge, sm->auth_challenge, in eap_mschapv2_init()
111 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge()
135 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
139 data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
372 if (challenge_hash(peer_challenge, data->auth_challenge, in eap_mschapv2_process_response()
396 res = generate_nt_response_pwhash(data->auth_challenge, in eap_mschapv2_process_response()
402 res = generate_nt_response(data->auth_challenge, in eap_mschapv2_process_response()
[all …]
Deap_server_ttls.c701 *auth_challenge; in eap_ttls_process_phase2_mschapv2() local
762 auth_challenge = challenge; in eap_ttls_process_phase2_mschapv2()
768 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_process_phase2_mschapv2()
773 generate_nt_response_pwhash(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
778 generate_nt_response(auth_challenge, peer_challenge, in eap_ttls_process_phase2_mschapv2()
790 if (challenge_hash(peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
806 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
812 peer_challenge, auth_challenge, in eap_ttls_process_phase2_mschapv2()
Deap_i.h181 u8 *auth_challenge; member
Deap_server_fast.c950 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init()
957 sm->auth_challenge = NULL; in eap_fast_phase2_init()
/hostap-latest/tests/hwsim/
Dtest_eap_proto.py6310 def ChallengeHash(peer_challenge, auth_challenge, username): argument
6311 data = peer_challenge + auth_challenge + username
6315 auth_challenge, username): argument
6324 challenge = ChallengeHash(peer_challenge, auth_challenge, username.encode())
6876 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
6877 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode())
6881 auth_challenge, "user")
6924 auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
6925 logger.info("auth_challenge: " + binascii.hexlify(auth_challenge).decode())
6929 auth_challenge, "user")
[all …]