/hostap-latest/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 204 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/hostap-latest/src/eap_peer/ |
D | eap_ttls.c | 541 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 566 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 568 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 577 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 583 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 587 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 598 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 601 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 610 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 635 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap() [all …]
|
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 102 challenge = pos; in eap_leap_process_request() 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
|
D | eap_mschapv2.c | 249 const u8 *pos, *challenge; in eap_mschapv2_challenge() local 283 challenge = data->passwd_change_challenge; in eap_mschapv2_challenge() 285 challenge = pos; in eap_mschapv2_challenge() 297 challenge); in eap_mschapv2_challenge()
|
/hostap-latest/src/eap_server/ |
D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
D | eap_server_ttls.c | 558 const u8 *challenge, in eap_ttls_process_phase2_chap() argument 565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 593 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 605 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap() 621 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument 626 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 657 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 660 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap() 671 challenge_response(challenge, sm->user->password, nt_response)) || in eap_ttls_process_phase2_mschap() 673 nt_challenge_response(challenge, sm->user->password, in eap_ttls_process_phase2_mschap() [all …]
|
D | eap_server_mschapv2.c | 370 u8 challenge[8]; in eap_mschapv2_process_response() local 373 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 376 challenge, nt_response); in eap_mschapv2_process_response()
|
D | eap.h | 302 const u8 *challenge, const u8 *response);
|
D | eap_server.c | 2076 const u8 *challenge, const u8 *response) in eap_server_mschap_rx_callback() argument 2086 challenge, sizeof(challenge), ':'); in eap_server_mschap_rx_callback()
|
/hostap-latest/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 25 addr[2] = challenge; in chap_md5()
|
D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_cli.sgml | 49 challenge-response that uses an external device for generating the 78 case of OTP request, it includes the challenge from the 101 <para>Example request for generic token card challenge-response:</para>
|
/hostap-latest/src/ap/ |
D | ieee802_11.c | 349 u16 auth_transaction, const u8 *challenge, in auth_shared_key() argument 358 if (!sta->challenge) { in auth_shared_key() 362 sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN); in auth_shared_key() 363 if (sta->challenge == NULL) in auth_shared_key() 367 os_free(sta->challenge); in auth_shared_key() 368 sta->challenge = NULL; in auth_shared_key() 373 sta->challenge, WLAN_AUTH_CHALLENGE_LEN); in auth_shared_key() 382 if (!iswep || !sta->challenge || !challenge || in auth_shared_key() 383 os_memcmp_const(sta->challenge, challenge, in auth_shared_key() 397 os_free(sta->challenge); in auth_shared_key() [all …]
|
D | sta_info.h | 190 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member
|
D | sta_info.c | 389 os_free(sta->challenge); in ap_free_sta()
|
/hostap-latest/src/common/ |
D | ieee802_11_common.h | 44 const u8 *challenge; member
|
D | ieee802_11_common.c | 482 elems->challenge = pos; in __ieee802_11_parse_elems() 747 elems->challenge = NULL; in ieee802_11_elems_clear_ids()
|
/hostap-latest/wpa_supplicant/ |
D | README | 696 challenge-response that uses an external device for generating the 724 it includes the challenge from the authentication server. 742 Example request for generic token card challenge-response:
|
D | ChangeLog | 978 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2
|
/hostap-latest/tests/hwsim/ |
D | test_eap_proto.py | 6324 challenge = ChallengeHash(peer_challenge, auth_challenge, username.encode()) 6326 data = digest + challenge + magic2
|