HomeSort by relevance Sort by last modified time
    Searched refs:CHALLENGE_LEN (Results 1 - 4 of 4) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_md5.c 22 #define CHALLENGE_LEN 16
25 u8 challenge[CHALLENGE_LEN];
55 if (os_get_random(data->challenge, CHALLENGE_LEN)) {
61 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHALLENGE_LEN,
70 wpabuf_put_u8(req, CHALLENGE_LEN);
71 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
73 CHALLENGE_LEN);
128 data->challenge, CHALLENGE_LEN, hash);
eap_mschapv2.c 49 #define CHALLENGE_LEN 16
52 u8 auth_challenge[CHALLENGE_LEN];
74 CHALLENGE_LEN);
79 data->peer_challenge = os_malloc(CHALLENGE_LEN);
85 CHALLENGE_LEN);
112 os_get_random(data->auth_challenge, CHALLENGE_LEN)) {
119 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + os_strlen(name);
134 wpabuf_put_u8(req, CHALLENGE_LEN);
136 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
138 wpabuf_put(req, CHALLENGE_LEN);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 23 #define CHALLENGE_LEN 16
26 u8 challenge[CHALLENGE_LEN];
56 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
62 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHALLENGE_LEN,
71 wpabuf_put_u8(req, CHALLENGE_LEN);
72 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
74 CHALLENGE_LEN);
129 data->challenge, CHALLENGE_LEN, hash);
eap_server_mschapv2.c 50 #define CHALLENGE_LEN 16
53 u8 auth_challenge[CHALLENGE_LEN];
75 CHALLENGE_LEN);
80 data->peer_challenge = os_malloc(CHALLENGE_LEN);
86 CHALLENGE_LEN);
113 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
120 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + os_strlen(name);
135 wpabuf_put_u8(req, CHALLENGE_LEN);
137 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
139 wpabuf_put(req, CHALLENGE_LEN);
    [all...]

Completed in 55 milliseconds